Title: The Verizon HIPAA Opportunity
1Beyond CIPA Compliance - Planning a Truly Secure
Network Infrastructure CoSN, February 28, 2002,
Session 4Apeter.haigh_at_verizon.comReproduction
of this material is permitted, with attribution,
for non-commercial purposes. This presentation
represents the professional opinion of the
author. Verizon accepts no liability, expressed
or implied, for the material contained herein.
2Todays Agenda
- Whats your SecurityQ?
- Why Network Security?
- What is Network Security
- Where can Verizon help you?
3Why should I care about Security?
- Its important to ensure that Students Staff
experience a safe computing environment - If you dont comply with CIPA, YOU LOSE E-RATE
DISCOUNTS, AND MUST REPAY ANY DISCOUNTS ALREADY
RECEIVED - Citizens care about security
- Heightened by 9/11
- Security breaches are widely frequently
reported - Many laws (other than CIPA) deal with security
privacy - Individuals have right of action under Tort
4What is CIPA Compliant?
- Internet Safety Policy
- The Internet Safety Policy must address the
following issues - access by minors to inappropriate matter on the
Internet and World Wide Web - the safety and security of minors when using
electronic mail, chat rooms, and other forms of
direct electronic communications - unauthorized access, including so-called
"hacking," and other unlawful activities by
minors online - unauthorized disclosure, use, and dissemination
of personal information regarding minors and - measures designed to restrict minors' access to
materials harmful to minors.
5 6- State of the Art Security
- pre-Gunpowder!
7What is Security?
- Classical definition
- Confidentiality
- Integrity
- Availability
- How privacy can be assured
- Administratively
- Physically
- Technically
8Information Security Lifecycle
Security Assurance Testing Reporting Monitoring Tr
aining
Building Blocks Security is aprocessnot
aproduct...
Policy andArchitecture Risk Assessment Security
Policy
Technology Implementation VPN,Encryption,
Firewalls, Authentication, IDS
Business Applications and Services
Networks, Intranet, Internet, Remote Access
Hardware and Operating Systems
Solution Design and Selection Security
Design Technology Selection
- People
- Process
- Technology
9What is Privacy?
- The right to be left alone is the most
comprehensive of rights... US Supreme Court
Justice Brandeis, 1928 - You already have zero privacy. Get over it.
Scott McNealy, CEO Sun Microsystems, 1999 - Consumer attitudes - The Pew Internet American
Life Project, 2000 - 86 favor opt-in privacy policies, requiring
permission for use - 54 view web-site tracking of users as invasion
of privacy - 54 have provided personal info. to use a web
site - 48 have bought on-line using a credit card
- 55 have sought medical info. on the web
- 43 have sought financial info.
- 27 will never divulge personal information
on-line
10Privacy versus Security
- Privacy is what you promise to do
- Security is about how you fulfil the promise
- Networks are how the authorized (and
unauthorized) get access - Therefore network security is of paramount
importance
115 Principles of Fair Information Practices
- Openness
- Existence and purpose of record-keeping systems
must be publicly known. - Individual Participation
- Individual right to see records and assure
quality of information. - Security
- Reasonable safeguards for confidentiality,
integrity, and availability of information. - Accountability
- Violations result in reasonable penalties and
mitigation. - Limits on Collection, Use, and Disclosure
- Information collected only with knowledge and
consent of subject. - Information used only in ways relevant to the
purpose for which the data was collected. - Information disclosed only with consent or legal
authority.
12Physical Security
- Card Access Systems
- Closed Circuit TV (CCTV)
- Fire Suppression Systems
- Alarm Systems
- Power Systems
13Two-Factor Authentication
- 3 ways to authenticate a person
- What they know Password
- What they have Token
- Who they are - Biometrics
14Biometrics
- Fingerprint / Palm Print
- Hand Geometry
- Iris Scanning
- Keyboard Dynamics
- Signature Characteristics
- Facial Recognition
- Voice Recognition
15PKI / LDAP / X.500
- Digital Certificates PKI (X.509 v3)
- Digital document attesting to the binding of a
public key to an individual or other entity. Use
two encrypted soft keys public private keys,
need certificate authority (notary), strong
authentication
16RADIUS
17More communications/network controls
- Firewalls for Internet (and other) connections
- The DMZ concept
- Importance of proper installation maintenance
- Strong encryption digital signature on public
network - Encryption on private networks (?)
- Regular virus checking
- Standardized client server configurations
- Periodic census of network software hardware
- Vulnerability assessment intrusion detection
18Firewalls Intrusion Detection Systems
Internet
19Encryption
- Encryption provides confidentiality
- Symmetric (Secret) Key
- Asymmetric (Public) Key
- VPNs provide a secure channel
Network
20Areas of unusual concern
- E-mail fax
- Telecommuting
- IT applications
- Logging Audit trails
- Suspect activity security incidents
21IT Applications
- What enhanced security features will vendors
provide? - Interoperability in best of breed environment
- Audit trails logs
- Access authorization controls
- Single sign-on
- Valuable protection, or
- A more attractive target?
22Suspect Activity Incidents
- Suspect activity
- Regular vulnerability assessments
- Intrusion detection
- Surveillance of traffic
- Incident response
- Treat like crime!
- Get forensic help - evidence gathering
protection - Change policy, procedure technology as
appropriate - How incidents are identified
- Ensuring staff report incidents
- Knowing what is unauthorized
23You Can be more Secure!
- Services for a Trusted Environment
- Confidentiality
- Integrity
- Availability
- Identification Authentication
- Authorization Access Control
- Non-repudiation
- Forensics
24Vulnerability Testing Services
- External Port Scan
- Vulnerability Scan of External Network
- Penetration Testing
- Phone Sweep
25Security Assessment Services
- Comprehensive review of a clients security
- Designed to assess and prioritize a clients
- security risks and develop a comprehensive
- action plan
26Technology Planning
27Training Programs
- Security Awareness Program
- Technical Training
- Intelligence Programs
28Thank you for your time, please contact your
Verizon Account Manager for further information
regarding solutions for your Security needs.