Habia Cable - wires, cables and cable systems for demanding applications
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
-
Upload
juliette-bernard -
Category
Documents
-
view
26 -
download
1
description
Transcript of SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
© 2
002
Vin
dica
tor
Tec
hnol
ogie
s
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
NDIA SECURITY EXPO - 2003
MISSION CRITICAL PROCESSINGMISSION CRITICAL PROCESSING
PresentationPresentation
Daniel SkretDaniel Skret
Vindicator Technologies, IncVindicator Technologies, Inc
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
© 2
002
Vin
dica
tor
Tec
hnol
ogie
s
Mission Critical ProcessingMission Critical Processing
Enforcing Security Policy
Situational Awareness
Automatic Behaviors
Systems Integration
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
© 2
002
Vin
dica
tor
Tec
hnol
ogie
s
Mission ExecutionMission Execution
Reduce PC’s Role to User Interface
Perform Mission via Security Appliances
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
© 2
002
Vin
dica
tor
Tec
hnol
ogie
s
Platform EvolutionPlatform Evolution
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
© 2
002
Vin
dica
tor
Tec
hnol
ogie
s
ArchitecturesArchitectures
Security Application and User Interface
ActiveX ATL
Native & 3rd Party DLL
OLE ADO OLE-DB ODBC DAO
DirectXGDI
.NET
NetBIOS
TCP/IP
RPC WinSock
NetBEUI IPX DLC
Windows API
Native & 3rd Party Device Drivers
Security Application
RTOS Network(TCP/IP)
FileSystem
Platform Device Drivers
DataBase
Office Suite Data Base System
1000MB
180 to420 MB
<10 MB
Typical PC Environment
Security Appliance
HTTPServer
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
© 2
002
Vin
dica
tor
Tec
hnol
ogie
s
Software ComparisonSoftware Comparison
Security Appliance Personal Computer
Mission-Specific General Purpose
RTOS-Based OS-Based
Low Virus Vulnerability Extremely Vulnerable
<10 MB Code >1,000 MB Code
Stable Platform Constantly Changing
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
© 2
002
Vin
dica
tor
Tec
hnol
ogie
s
Hardware ComparisonHardware Comparison
Security Appliance Personal Computer
Low Power (20W) LV UPS
200-1500W Mains UPS
100% Solid State Fans & Disks
>100,000 hr MTBF <10,000 hr MTBF
Hardened I/O External Adapters
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
© 2
002
Vin
dica
tor
Tec
hnol
ogie
s
Attack VulnerabilityAttack Vulnerability
Security Appliance Personal Computer
Mission-Specific Protocols “Unused” GP Protocols
Cannot Host Programs Raison d’être…Scripts, Macros, Programs, etc.
Application-Level Encryption External VPN
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
© 2
002
Vin
dica
tor
Tec
hnol
ogie
s
Enterprise DeploymentEnterprise Deployment
WAN
Site LAN
Site LAN
Site LAN
Site w/oLAN
HumanResourcesDepartment
Access Control
Local Management
Remotely Managed
Boston
Tampa
RS-485
RS-485
RS-485
RS-485
RS-485
RS-485
London
Los Angeles
Router
Router
RouterRouter
Alarm Management
SECURITY SOLUTIONS FOR DEMANDING APPLICATIONS
© 2
002
Vin
dica
tor
Tec
hnol
ogie
s
Systems SummarySystems Summary
Core Processing via Appliances
PC’s for User Interface + Clerical Work
Questions?
Daniel [email protected]