+ All Categories
Home > Documents > Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design...

Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design...

Date post: 15-Jan-2016
Category:
Upload: carmella-quinn
View: 218 times
Download: 0 times
Share this document with a friend
Popular Tags:
34
Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design www.accord.ru [email protected]
Transcript
Page 1: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Moscow, 2007

OKB SAPR

Information Security Policythat Accords Protection

OKB SAPRSpecial Design Bureau for Computer-Aided Design

[email protected]

Page 2: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

A personal computer

is only an instrument.

Page 3: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Are you sure that YOUR PC

is only YOUR instrument?

Page 4: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Are you sure about it EACH TIME

that you turn it on?

Page 5: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

You need the assurance

no PC hardware has been changed;

no PC software has been changed; no data, stored on your PC, has been changed or became known to an intruder.

that while you were away

Page 6: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

The first task of information protection is

protecting your PC from an unauthorized access (UA).

Page 7: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

What should an UA protection tool be like?

Checking the integrity of the software environment with the help of some program — can we be sure in its own integrity?

First, we need to check that program.

And before that — check the program that is going to check it…

Page 8: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Can you pull yourself out of a swamp?

You can.

If you have a support point, which is outside of the swamp.

What should an UA protection tool be like?

Page 9: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

What should an UA protection tool be like?

independent from the PC operating and file system

inaccessible for the introduction of modifications

hardware-based.

Page 10: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

At the end of last century, we have

developed a concept of hardware

protection and an data security system

(DSS),

which became and still remains a

standard for all of the developers.

Page 11: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Provides a secure boot of the operating system, irrespective of its type, for an authenticated user.

Accord-TSHM:

Trusted Startup Hardware

Module

Page 12: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

What is secure boot?

the user identification/authentication.

integrity checking of the PC hardware and the software utilities, using a step-by-step integrity inspection algorithm; blocking the operating system boot from the external storage mediums;

The operating system boot is performed only after a successful completion of the following procedures:

Page 13: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Accord-TSHM:

has been patented has 18 conformance certificates

and has about 200 000 implementations in the governmental authorities and commercial organizations.

Page 14: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

The main versions of Accord-TSHM include the controllers:

Accord-5MX,

Accord-5.5 with a powerful cryptographic subsystem.

for PCs with bussed interface PCI

Page 15: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Accord-TSHM may also include the controllers:

Accord-5.5.e

for PCs with bussed interface PCI-Express;

Accord-5.5 mini-PCIfor notebooks and other computers with bussed interface mini-PCI;

Accord-5.5 mini-PCIefor PCs with mini-PCI-Express standard.

Page 16: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Accord-TSHMAccord-6 controller-based

In addition to the Accord-5.5 characteristics, also has a hardware communication subsystem: Ethernet; USB-host and USB-slave.

Page 17: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Individual packaging:

TM-identifiers (standard packaging),

smart-cards,

fingerprint reading devices,

PCDST (personal cryptographic data security tool) SHIPKA.

in accordance with the customer’s requirement, Accord-TSHM and Accord-TSHM-based systems may use various identifiers:

Page 18: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

introducing modification into the Accord-TSHM firmware is impossible;

the controller’s even log is accessible only to the information security administrator, that is why concealing an attempt of UA from him is impossible;

on the basis of Accord-TSHM, there have been developed the access delimitation and information protection control systems (when installing special software).

Reliability in an unreliable world:

Page 19: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Information access isolation

Accord-1.95 – for the MS DOS, Windows 9x and Windows Millenium operating systems;

Accord-NT/2000 – for the Windows NT, Windows 2000, Windows XP, Windows 2003 and Vista operating systems;

is provided by the hardware/software complexes, based on Accord-TSHM and special software

Page 20: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Data Security Management

is provided by the Accord-DAC (distributed audit and control) subsystem, which combines an information security administrator's workstation (ISA WKS) and workstations equipped with DSS (data security systems) belonging to the ACCORD family .

based on the protected network data exchange

Page 21: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

PERSONAL cryptographic data security tool (PCDST)

SHIPKA-1.5

OKB SAPRSpecial Design Bureau for Computer-Aided Design

[email protected]

Page 22: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Ideal information interoperability:

Mobile User-friendly

and Protected

Page 23: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Real life confronts you with an alternative:

Mobile User-friendly

OR Protected

Page 24: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Of two evils choose the lesser!

Page 25: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Of two evils choose the lesser!

Page 26: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

PCDST SHIPKA-1.5

Mobility: doesn’t require software installation from additional carriers; may be used at any PC, which has an USB-plug.

User-friendliness: doesn’t require cryptographic libraries installation on PC; provides safe storage and application of the personal confidential data; doesn’t require any special skills when operating on PC or in the Internet.

Protectability: hardware implementation of the cryptographic algorithms, protected random number generator, protected permanent memory, applying the keys without transferring them to PC.

Page 27: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

The advantages of using SHIPKA-1.5 as a smart-card

Being an USB-device (Vendor ID USB-association — 17e4), SHIPKA doesn’t require using the card-readers.

The characteristics of the SHIPKA-1.5 device are just as good as the characteristics of the smart-cards.

Using the device as a smart-card doesn’t exhaust the possibilities of PCDST SHIPKA-1.5.

Page 28: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

OKB SAPR solutions, using SHIPKA-1.5

for the encryption and/or signing of the files;

OKB SAPR offers using PCDST SHIPKA-1.5:

Page 29: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

OKB SAPR solutions, using SHIPKA-1.5

for the automatic filling of the WEB-forms of various WEB-services and for storing passwords and other data, required for that;

OKB SAPR offers using PCDST SHIPKA-1.5:

Page 30: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

OKB SAPR solutions, using SHIPKA-1.5

for the hardware identification and authentication on PCs and notebooks when booting OS Windows, as well as in the terminal solutions;

OKB SAPR offers using PCDST SHIPKA-1.5:

Page 31: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

OKB SAPR solutions, using SHIPKA-1.5

as a keys storage and a hardware-based random number monitor for the cryptographic applications;

OKB SAPR offers using PCDST SHIPKA-1.5:

Page 32: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

OKB SAPR solutions, using SHIPKA-1.5

as a “smart-card” in the template solutions, for example, the authorization when entering the Windows domain, encryption and/or signing of the messages in the mail programs (Outlook Express and so on), for obtaining the Verification Center certificates;

OKB SAPR offers using PCDST SHIPKA-1.5:

Page 33: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

PCCARDExpressCardCompact Flash

Today PCDST SHIPKA is not only USB-device

But also

Page 34: Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design  1@accord.ru.

Moscow, 2007

OKB SAPR

Information Security Policythat Accords Protection

OKB SAPRSpecial Design Bureau for Computer-Aided Design

[email protected]


Recommended