The Cloud offers great opportunity for disruption in the business world by offering ways to create, test, and deploy applications with greater reach and more simplicity than ever before. Come learn about the Cloud and how Rocket MV is helping you get SaaS-y with capabilities such as Account Based Licensing, RESTful APIs, and micro-services.
21. 21
Top Threats for 2015
5. Third-party attacks
4. Mobile malware
3. Social media attacks
2. Sophisticated DDoS attacks
1. IoT: The Insecurity of Things
22. 22
APT (Advanced Persistent Threat)
“Hackers Don't Need Sophisticated Attacks If You
Leave Your Door Unlocked”
23. 23
APT (Advanced Persistent Threat)
Set of stealthy and continuous computer
hacking processes
Usually targets organizations and/or nations for
business or political motives
Processes require a high-degree of stealth over a
long period of time
Example of APT - Stuxnet computer worm
24. 24
APT (Advanced Persistent Threat)
APT Life Cycle
Targets specific organizations for a singular objective
Attempt to gain a foothold in the environment (common
tactics include spear phishing emails)
Use the compromised systems as access into the target
network
Deploy additional tools that help fulfill the attack objective
Cover tracks to maintain access for future initiatives
26. 26
MV Software Solution – The Key Paradigm
Confidentiality, integrity and availability
Confidentiality
• Limiting information access and disclosure to authorized
users
Integrity
• The trustworthiness of information resources
Availability
• The availability of information resources
30. 30
Automatic Data Encryption
U2 BASIC Engine
U2 Applications
Data Access
Key Manager
Key Cache
Encryption
Engine
U2 Engine
Unencrypted
Data
Master Key Key Store
Encryption Meta
DataAudit Trail
Encrypted
Data
Users through U2 clients
XAdmin
DB / Sys
Admin
uvregen
Wallet
confcmd
Query Processing
encman
33. 33
Client
Application
U2
Restful
Service
CUSTOMER
U2
Server
SSL
SSL
SSL
SSL
SSL
Encrypt()
KEY, IV
ADD, DOB, SSN
Encrypt
Encode
Data at rest
@ID ASCII
FNAME ASCII
LNAME ASCII
ADDRESS Encrypted
CITY ASCII
STATE ASCII
ZIP ASCII
PHONE ASCII
DOB Encrypted
SSN Encrypted
Customer
record
Customer
recordCan be any technology on the client
Decrypt
subroutine
Extranet
Internet
U2 JPA
Server
SSLSSL
Telnet
Client
Intranet
jfgafgfafasf djdwjhdqwd
78gcagfc7 efewhfvb78yfb
mcgcgwufg cnmgsdc724n
af343rdeff 3erjcgasc763e4hvd73en
sff2r121e sfdfwefe2f
Smnb HDJ efewf2f33
87hgdyhd8 Fwefvv cb34r
338dhgdgg 3erfvdfgv2r2fg
3ervv44fda e13rwdvergvb2
387agdddq 3r2eff13r123
Securing Data in Use, Transit, and at Rest
SSL
or
SSH
4 World Process
@ID ASCII
FNAME ASCII
LNAME ASCII
ADDRESS Encrypted
CITY ASCII
STATE ASCII
ZIP ASCII
PHONE ASCII
DOB Encrypted
SSN Encrypted
Scripts
BASICBASIC
C#
Java
KEY
IV
Encryption
process
@ID 104357
FNAME Neddy
LNAME Seagoon
ADDRESS Fn6umnvm6rjkm bnm 6
CITY Denver
STATE CO
ZIP 80237
PHONE 800-426-4357
DOB t3thfdbrhbhfh4
SSN fdgtg45y4hhdh
@ID ASCII
FNAME ASCII
LNAME ASCII
ADDRESS Encrypted
CITY ASCII
STATE ASCII
ZIP ASCII
PHONE ASCII
DOB Encrypted
SSN Encrypted
@ID 104357
FNAME Neddy
LNAME Seagoon
ADDRESS 4700 S Syracuse St
CITY Denver
STATE CO
ZIP 80237
PHONE 800-426-4357
DOB 12/31/1967
SSN 123-45-6789
U2
WebDE
SSL
U2 Web
Services
49. 49
Summary
Information security is vital to all business
Security starts from the top and everyone must pitch in
Education and training is key to success
Choose solutions in line with your business goals
Know the threats
Use proper countermeasures
Implement defense-in-depth and defense-in-layers
Familiarize yourself with MV security features
MV Premier Services and MV Professional Services have
experience of implementing secure solutions