No Slide Title

Download Report

Transcript No Slide Title

Protocol Usage in Secure Networks
Matthew G. Marsh
Chief Scientist, NEbraskaCERT
President, Paktronix Systems LLC
Note: Use of this material is restricted to acceptable use as defined in the document titled "Acceptable Use of NEbraskaCERT Educational Materials"
NEbraskaCERT
Slide 1
Overview
•
•
•
•
•
•
•
•
•
•
•
•
NEbraskaCERT
Principle of Inviolability
PoI - Definitions
Risk Boundary Analysis
Integrated Security Network
ISO/OSI 7-Layer Model
Physical/Logical Network Structures
Protocols vs. Transports
CIA
World Oyster Views
Secure Protocols - Definitions
Secure Protocols - Defined
Example
Slide 2
Principle of Inviolability
An object is considered Inviolate when all
communication with that object is provably
limited to the scope of service provided by that
object.
NEbraskaCERT
Slide 3
PoI - Definitions
•
Object
•
•
Communication
•
•
Both theory AND practice confirm the Communication and
Boundary scopes.
Scope of Service
•
NEbraskaCERT
Any Input/Output through the boundary
Provably Limited
•
•
The entire set of devices/networks/etc that can be
encapsulated by a defined boundry.
What the object provides through the boundary
Slide 4
Risk Boundary Analysis
•
Define Boundary
•
PoI vs. Connectivity
Finite vs. Infinite
• Discrete Structure
• Quanta and Tao
•
NEbraskaCERT
Slide 5
Integrated Security Network
Fulfills PoI as an Object
• Internally PoI consistent
•
•
NEbraskaCERT
Each internal object fulfills PoI
Slide 6
ISO/OSI
All People Seem To Need Diet Pepsi
• Tastes Great! - Less Filling!
•
NEbraskaCERT
Slide 7
PhysiLog Networks
•
What is a Network?
•
•
What is the structure?
•
•
NEbraskaCERT
Bus & Tag & Pipe & Ring...
What is your favorite colour?
•
•
Protocol, Communication, Scope
Oh - wrong scene - try again:
What is the PhysioLog Structure?
Slide 8
Protocols vs. Transports
•
What is a Protocol?
•
•
What is a Transport?
•
•
And how far down do you go in the stack?
Tunnels, Encapsulations, Raw
Remember the PhysioLog definitions
NEbraskaCERT
Slide 9
CIA
•
Confidentiality
•
•
Integrity
•
•
NEbraskaCERT
Verify the data is not modified
Authenticity
•
•
Verify who saw the data
Verify the data owner
Cranial Inspection Authority
Slide 10
World Oyster View
•
NEbraskaCERT
Integrated Security Network
• Internal Protocol Structures
• Why Use other protocols
Slide 11
Secure Protocols
•
Network Transport
•
Routable
•
•
Encapsulable
•
•
Capable of filter application within endpoint structure
Non Network Transport
•
•
NEbraskaCERT
Routable through inclusion within a routable transport
Fine Grained
•
•
Capable of extending across physical and logical boundaries
Encapsulable
Fine Grained
Slide 12
Secure Protocols - Cont'd
•
IP/IPX
•
•
NetB{IOS/UEI}
•
•
Encapsulable, Fine Grained
Serial/Parallel
•
NEbraskaCERT
Routable, Encapsulable, Fine Grained
Non Network, Encapsulable
Slide 13
Example
NEbraskaCERT
Slide 14
Protocol Usage
Matthew G. Marsh
Chief Scientist, NEbraskaCERT
President, Paktronix Systems LLC
[email protected]
NEbraskaCERT
Slide 15