Transitioning security software and hardware systems for use on unsecured or externally connected networks

R. Kulchyski
{"title":"Transitioning security software and hardware systems for use on unsecured or externally connected networks","authors":"R. Kulchyski","doi":"10.1109/CCST.2016.7815721","DOIUrl":null,"url":null,"abstract":"The threat of online attacks has become a growing concern in technological environments across the globe. As is quite obvious, having a physical security system tampered with maliciously over an internet connection can be an enormous threat. Historically many security sensor companies have avoided this concern by leaving their security networks isolated from the external internet Presently we approach an age where operating an isolated network on a client site will become less and less appealing to the client With the added benefits of monitoring from their own network, use of existing infrastructure, remote connectivity options and the threat and or fear of an uncontrolled network on their site, many customers have a desire to have their security system on their own monitored, externally connected network An exploration is taken into the process of converting a product using its isolation for network security, into a product that can be dropped with confidence into an externally connected or potentially unsecure network environment. A range of concepts are covered at varying depths, including testing tools for getting started, encryption and reverse engineering, penetration testing, tools used for adding security and the difficulties and logistics of keeping patches up to date and virus definitions current.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"120 1","pages":"1-3"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2016.7815721","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The threat of online attacks has become a growing concern in technological environments across the globe. As is quite obvious, having a physical security system tampered with maliciously over an internet connection can be an enormous threat. Historically many security sensor companies have avoided this concern by leaving their security networks isolated from the external internet Presently we approach an age where operating an isolated network on a client site will become less and less appealing to the client With the added benefits of monitoring from their own network, use of existing infrastructure, remote connectivity options and the threat and or fear of an uncontrolled network on their site, many customers have a desire to have their security system on their own monitored, externally connected network An exploration is taken into the process of converting a product using its isolation for network security, into a product that can be dropped with confidence into an externally connected or potentially unsecure network environment. A range of concepts are covered at varying depths, including testing tools for getting started, encryption and reverse engineering, penetration testing, tools used for adding security and the difficulties and logistics of keeping patches up to date and virus definitions current.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
将安全软件和硬件系统转换为在不安全或外部连接的网络上使用
网络攻击的威胁已成为全球技术环境日益关注的问题。很明显,通过互联网连接恶意篡改物理安全系统可能是一个巨大的威胁。从历史上看,许多安全传感器公司通过将其安全网络与外部互联网隔离来避免这种担忧。现在我们接近这样一个时代,在客户端站点上运行一个孤立的网络对客户的吸引力越来越小,因为客户可以从自己的网络进行监控,使用现有的基础设施,远程连接选项以及威胁或担心他们站点上不受控制的网络。许多客户都希望自己的安全系统受到监控,外部连接的网络。探索将使用其网络安全隔离的产品转换为可以放心地放入外部连接或可能不安全的网络环境的产品的过程。本书从不同的深度涵盖了一系列概念,包括用于入门的测试工具、加密和逆向工程、渗透测试、用于增加安全性的工具,以及保持补丁更新和病毒定义最新的困难和后勤。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
AI facial recognition and biometric detection: balancing consumer rights and corporate interests Radar Error Calculation and Correction System Based on ADS-B and Business Intelligent Tools MIMO Cable Guided Radar Assessing the common authorship of a set of questioned signature images A fuzzy interval valued fusion technique for multi-modal 3D face recognition
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1