protecting network data - jm fiber · pdf filezunited states air force tempest certified ......

23
… Protecting Network Data ®

Upload: doandang

Post on 18-Mar-2018

216 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

®

Page 2: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

Fiber Optic Fiber Optic Network & Cabling Network & Cabling

Infrastructure Security Infrastructure Security Sensor SystemSensor System

Page 3: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

Product ApplicationsProduct Applications

Physical Network Protection and Equipment Security• Protecting the Physical Layer of the Network• Protecting vital and sensitive information• Downtime, tapping, accidental intrusion• Alternative to Encryption (in select environments)

Data Centers & Server RoomsOptical Fiber Cable InfrastructureMilitary and DOD PDS (Protected Distribution Systems)

Classified Networks / SIPRNET

Page 4: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

CertificationsCertificationsUnited States Air Force TEMPEST Certified• Technical Authority Approval (CTTA)• FD-208 sensor for PDS applications

Headquarters Air Force Communications Agency• Approved 21 March 2003

Air Force Manual 33-201• Protected Distribution Systems (PDS) and NSTISSI 7003

Department of Air Force Approval• for Priority Level 1 Facilities• Approved 3 April 2003

SPAWAR Approval – IA Pub 5239-22 U.S. Navy• 31 October 2004

Page 5: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

System OverviewSystem Overview

Alarm System with Headend OptionSensor Cable immune to EMI, RFI, and lightningDetection Zones up to 5 kmInteroperability with Alarm PanelsHighly ScalableHighly-configurable control softwareLocal or email alarm notification

Page 6: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

System ComponentsSystem Components

Specially configured Optical Fiber Cable & Connectors

FD-208 sensor (Alarm Processor Unit)

SMS 2000 Software (optional)

Intelligent Field Panel (502 or 508 controller) (Headend)

• Central connection and control point for all the hardware.• All system functions are controlled by this unit

Page 7: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

How the Sensor Works…How the Sensor Works…Fiber optic sensing cable is glass.

• Inner conductor, called the core, conducts light

(No Data)

Page 8: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

If the fiber optic cable is disturbed, the pattern of conducted light changes.

• Sensitivity to motion, vibration, or pressure

Page 9: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

The Alarm Processor UnitThe Alarm Processor Unit

Allows direct or remote mounting of the electronics away from the fiber-optic sensing zone.

Models include:• Stand alone systems• Rack mount systems

Page 10: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

The system uses optical fiber as a sensing cable to detect the presence of an intruder.

FD-208

FD-208 R

Page 11: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

• Laser light from the APU transmits through the cable• The system detects shifts in the return light pattern

Max. 20 KM Max. 5 KM

Page 12: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

Protected Distribution Systems (PDS)Protected Distribution Systems (PDS)

Wire or Fiber-Optic distribution system used to transmit un-encrypted classified NSI or military information through an area of lesser classification or control.

U.S. Air Force Regulations

U.S. Navy (via certifying authority)

U.S. Army and U.S. Marines

DOD Contractors; DHS

Page 13: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

Benefits of Alarmed PDSBenefits of Alarmed PDS

Certified / meets PDS requirementsInexpensiveEliminates Need for Encryption (expensive, slow, key-based)Can be used on long runsEliminates inspection requirementImmediate intrusion detectionConfigurable Parameters• Eliminates Nuisance Alarms

Page 14: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

Information AssuranceInformation AssurancePhysical SecurityPhysical Security

Addresses Layer One Network VulnerabilitiesStructured Cabling and Data CentersReliabilityUptimePhysical Intrusion (accidental or intentional)Physical Equipment and Wireless AP’s

Page 15: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

Threat

Trojans, Viruses, Worms, Spyware, Key Loggers

Unicode Vulnerabilities

TCP Session Hijacking, DoS attacks, “Man in the Middle”

Port Scanning, NMAP

Router Password buffer attack, IP Spoof

MAC Spoof, ARP Cache Poisoning

Tapping, Cable Cuts, Cable Tamper, Backhoe, Accidental Intrusion

Security

Anti-Virus, Spyware detection and removal

Patches

Authentication, SSL, SSH, IPSEC, Kerberos, strong passwords

Firewalls, Scan Log d

Software updates & patches, restrict console port access

Physical Security (SecurLANoptions), Static ARP cache

SecurLAN, UPS Power Measures, Microwave Emission Analyzer

OSI Model

Source: SANS Institute *

Page 16: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

Multiple FloorsMultiple Floors

?

?

SecurLAN installed in / on data conduit

Example:Organization

occupies floors 3, 4 and 9

Page 17: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

Multiple BuildingsMultiple Buildings

SecurLAN installed in / on data conduit

Page 18: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

Advantages of Using Advantages of Using Fiber Optic Sensors …Fiber Optic Sensors …

You can detect any unauthorized trenching, boring, core drilling or any other digging methods along your cable route.

Page 19: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

You can detect any unauthorized intrusion at your MPOE/DEMARC, MDF, IDF or Network Operations Center.

Page 20: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

The sensing cable can be deployed along a fence or buried under sod or gravel.

• Intruders compromising these barriers are detected

Page 21: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

Response OptionsResponse OptionsOptical cutoff switch – Provides shutdown of all connections within the affected zone to deny access to sensitive data.

AC cutoff switch – An alternative method of network shutdown that cuts power to the router, hub, or PC denying access to sensitive data.

E-mail alert – Notify key personnel of intrusion attempts

Auto dialer – contact key personnel through pagers, cell phones, etc.

You name it – integrates with any system that accepts relay inputs (cameras, audible alarms, lights, etc.)

Page 22: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

Product SummaryProduct Summary

• Versatile Applications of the Base Technology• IT Physical Security, Data Centers, PDS, Infrastructure

• Physical Layer LAN and MAN Protection• Fiber-Optic Sensitivity• Detects Movement, Pressure and Vibration• Nuisance Alarm Discrimination • Defined Zone Detection• Complimentary to Existing Security Systems• Customizable Response Options

Page 23: Protecting Network Data - JM Fiber  · PDF filezUnited States Air Force TEMPEST Certified ... attacks, “Man in the Middle ... Protecting Network Data Response Options

… Protecting Network Data

For more information or to arrange a For more information or to arrange a demonstration, please contact:demonstration, please contact:

Ken RiveraKen Rivera -- 909909--628628--3445 x 113445 x 11

www.jmfiberoptics.comwww.jmfiberoptics.com