SlideShare a Scribd company logo
1 of 14
Mammoth, Inc. White Paper 
(DRAFT) 
Prepared for: 
Medsoft Medical Systems, Inc. 
· This is the first draft of a “living document” representing Mammoth’s input to 
Medsoft. It includes the following sections: 
 Requirements Compliance Matrix 
 Proposed System Architecture 
 Concept of Operations (CONOPS) 
 Proposed Privacy Policy (Exhibit A) 
 Proposed Security Policy (Exhibit B) 
 Draft Risk Analysis – TBD 
 Attack Tree – TBD
Mammoth, Inc. White Paper 
(DRAFT) 
Requirements Compliance Matrix 
The matrix below describes Mammoth’s proposed compliance with customer (Medsoft) 
provided system requirements. Note that details, including a technical explanation of 
compliance with these requirements are included in the System Architecture, Concept of 
Operations and other sections of this White Paper. Requirements will be referred to, in 
subsequent sections, by the Requirement ID in the matrix below. 
Requirement 
ID 
Requirement Text Explanation of Mammoth Compliance 
R1. The system shall 
provide secure end-to- 
end 
communications. 
All communications, including those between 
computers in controlled areas, are encrypted using 
the Advanced Encryption Standard algorithm 
implemented in hardware on Mammoth’s Security 
Cards (SCs). SCs include PCMCIA cards for user 
devices, a PCI version for desktop PCs and 
Servers and a PCI Server Security Card (SSC) for 
secure servers. 
R2. The system shall 
provide an easy to 
use interface. 
Users will access the system via a web-based 
interface. 
R3. The system shall 
provide 
connectionless 
integrity. 
As stated in our response to R2, above, a web-based 
interface will be used to support ease of use 
for users. The encrypted connection provided by 
the SCs will ensure the integrity of 
communications over the underlying 
connectionless IP network. 
As explained in detail in the response to 
Requirement R5, below, users are authenticated 
by the SC, and an AES encrypted session is 
established between the SC on the user’s device 
and the SSC on the Security Server. 
In addition, SCs and SSCs provide the function of 
a simple yet effective firewall. As explained in 
detail in later sections, Mammoth proposes to use 
the Internet as a ubiquitous (but un-trusted) 
communications medium. However, since access 
to the Medsoft applications software is limited to 
a small set of users and not offered to the public 
on the Internet, SSCs only “listen” on non-standard 
TCP ports. Accesses from a browser on
Mammoth, Inc. White Paper 
(DRAFT) 
the user’s device to the URL for secure Medsoft 
servers (which will be directed to port 80) are 
translated in the SC to a non-standard port 
number. Port numbers are changed daily. Each 
SC knows the correct port number to use based on 
a Mammoth algorithm similar to that in a 
SecureID® Card. The SC uses the AES hardware 
to generate a new port number each day. 
The SSC converts HTTP messages on this private 
port number back to port 80 before sending the 
http request to the web server. When a Medsoft 
web server responds to the user’s browser request, 
as with most web servers, another port number 
will be assigned. This port number is mapped by 
the SSC to yet another port number (other than 
the daily number) for use in the session. This port 
number is also established using an AES 
cryptographic exchange between the user’s SC 
and the SSC. 
R4. The system shall 
provide Non-repudiation. 
As explained in the response to R5, below, user 
identity is authenticated by the SC at the point of 
origination. All messages between SCs (and 
SSCs) are check-summed using AES and this 
check sum is included in every message. This 
ensures that messages originate from (and 
responses are delivered to) authorized users with 
any tampering detected. (See response to R6 
below). Furthermore, SSCs log all transactions to 
in an encrypted form on disk on Mammoth 
Security Servers at Medsoft. 
Thus, users may not repudiate transactions, which 
they execute. 
R5. The system shall 
provide data origin 
authentication. 
User identity is authenticated at the point of 
origination by the SC using a biometric 
fingerprint scanner integral to the SC. In addition, 
a login with User ID and password is required. 
Once user identity is verified, an AES encrypted 
session is established between the SC on the 
user’s device and the SSC. 
Each message includes the serial number of the
Mammoth, Inc. White Paper 
(DRAFT) 
originating SC/SSC to verify the point of origin of 
the message. Distribution of SCs is controlled. 
User SCs are distributed only to authorized users 
using authorized couriers. The serial number of 
each SC and the identity of the user the SC has 
been provided to are recorded in a protected 
database at Mammoth. This same information, 
for Medsoft and Medsoft customers with SCs is 
cached on a Security Server at Medsoft. 
R6. The system shall 
provide Protection 
against replay 
attacks. 
Each SC and SSC has an internal date time clock. 
The date and time of day (to the nearest 
millisecond) and Time Zone for the Date/Time, 
are included in the message, which is check-summed 
along with a message sequence number 
ant the message text using AES and then AES 
encrypted for transmission. 
Thus, if an attacker attempts to replay a 
transaction, it will be rejected (and logged) by the 
SSC that receives it. If an attacker attempts to 
replay a message from an SSC to a user, the SC at 
the user end will also reject the transaction. 
Rather than passing such a message to the user’s 
handheld device (or laptop/desktop PC), the 
message will be sent instead to an SSC for 
logging and will not be passed to application 
software in the user device.
Mammoth, Inc. White Paper 
(DRAFT) 
System Architecture 
Doctors will be provided with a special hand held terminal (we’ll use the photo Steven 
sent around). This device will be COTS (running Windows or Linux as we decide later). 
It will be provided with a PCMCIA Security card which is made by Mammoth, Inc. and 
available as COTS (note that the handout says Mammoth is a large electronics 
manufacturer). A laptop or palmtop with the appropriate software and PCMCIA card 
will also work. Because the PCMCIA Security Card (SC) is produced in large volumes 
for Mammoth’s other corporate and Government customers, the cost is only $450. 
Connection from a doctor’s device to the applications server will be via the Internet. 
However, we will consider the Internet a hostile communications medium and our 
Medical Group 
Referred to 
Member of 
Doctor 
Hospital 
Practices at 
Outsources Tests to 
Outsources Tests to 
Independent Laboratory 
Is Tested by 
Patient 
Outpatient at 
Inpatient at 
Patient of 
Primary Care Provider of 
Specialist Care Provider of 
architecture protects against exposure from the public Internet. Since wireless operation 
is needed the SC provides IEEE 802.11b and wireless Internet from AT&T or Sprint 
(depending on which has better coverage in an area).
Mammoth, Inc. White Paper 
(DRAFT) 
To ensure security is maintained when the user device is connected to a LAN, the SC also 
includes an Ethernet port. All communications between the user hand held unit and 
the outside world is mitigated by the SC. The applications software on the user device 
includes a monitor which reports if any other connections (via dial up, parallep port, or 
another Ethernet port, for example). This status is reported every 10 seconds to the SC. 
Once per minute the SC checksums all the Medsoft application software in RAM and 
disk and compares the cryptographically generated signature to that in EEPROM on the 
SC. All Medsoft applications software is loaded to disk on the user device using the SC. 
In the process, the validity of the software is verified cryptographically (verifying the 
checksums in the new download using the on board AES chip). 
The Mammoth Security Card (SC) for user devices is a PCMCIA card as illustrated 
below. The software in the SC totals less that 50,000 lines, which includes a 5000 line 
Micro-Kernel (a Reference Monitor) and other software modules. About 35,000 lines of 
code are “trusted” software (developed under strict rigor at Mammoth Labs in White 
Plains, NY). However, all software functions, including hardware drivers, executes in 
restricted mode under the control of the Micro-Kernel. 
The original code for the Micro-Kernel was obtained when Mammoth bought out a 
computer security company in Urbana, IL in 1986. The “Urbana Kernel”, as it was 
known, had been developed for a highly classified Government project as a Secure 
Network Front End and successfully passed the very strict verification process of the 
classified customer. While it was not placed on the Evaluated Products List associated 
with the Orange Book, it passed all the requirements for A1 certification. Of course, it 
would have been much more difficult to pass this verification if the Urbana Kernel had 
been more than a Real-Time Executive. For example, no file system is included in the
Mammoth, Inc. White Paper 
(DRAFT) 
Kernel (or any software in the SC). All disk storage is provided by untrusted host 
computers. All data on the such untrusted hosts includes a security label which, along 
with the data itself, is cryptographically check summed before being written to disk. 
Depending on the type of data, it may be stored in encrypted form or in the clear on the 
host’s disk. If only the data is 
The Mammoth PCMCIA SC includes: 
· On card 802.11b Ethernet (with unique Ethernet MAC address). This will be used 
when doctors are on site at equipped hospitals or doctor’s offices. 
· On card RJ-45 10/100MB Ethernet interface (with a separate MAC address). 
· On card wireless Internet access via either, AT&T or Sprint. The selection of 
wireless carrier is made based on best coverage in the area the doctor resides and 
works. The doctor selects AT&T or Sprint when signing up for the card (see 
procedure below). 
· The SC protrudes about 1 inch from the PCMCIA slot. This portion of the card 
contains: 
o The antenna portion of the SC, 
o The external Ethernet connector, 
o A status LED and 
o A biometric fingerprint scanner (whenever an SC is powered up a 
fingerprint scan is required to authenticate the user) 
· On card AES encryption, in hardware 
· Date/Time clock (preset at factory, battery life 1.5 years) 
· 4K of Volatile (battery powered) Random Access Memory (RAM) which is 
preprogrammed at the factory with: 
o A unique (per card) 256 bit AES key for use for remotely administering 
the PCMCIA card. 
o A unique (per card) 2048 bit RSA key for the doctor to whom the card is 
assigned 
· Flash EEPROM (Electronically Erasable, Programable Read Only Memory) 
which: 
o Is preprogrammed with a unique serial number for each PCMCIA card 
This serial number keys into a database at Mammoth that contains: 
 The card model 
 The card hardware revision level 
 The card firmware revision level 
 The date of manufacture 
o Contains the firmware for the card
Mammoth, Inc. White Paper 
(DRAFT) 
Notes: 
· None of the information from the EEPROM or Battery powered RAM are made 
directly accessible to software on the hand held device. Some information can be 
accessed, but this is done via a transaction with the Security Server. 
· Except for battery replacement, the card is sealed to prevent physical tampering. 
Any tampering (such as trying to remove the metal case around the SC will cause all 
volatile information (keys) to be lost and will likely destroy the card. 
All desktop PCs that will access information protected by Mammoth’s technology will 
use a PCI version of the SC. Actually this unit merely provides a PCI to PCMCIA 
physical interface with the PCMCIA SC inserted. An external biometric fingerprint 
scanner is included which interfaces to the PCI board to allow easy access for operations 
personnel. This interface is to the PCMCIA SC and not directly to the PCI bus. 
All servers that will access and manipulate information protected by Mammoth’s security 
technology will use an enhanced server version of the PCI based SC called the Server SC 
(SSC). The SSC does not use the PCMCIA SC, but includes: 
 The same tamper proof design as the SC 
 An interface to an external biometric fingerprint scanner 
 No RF interfaces 
 An on board Pentium CPU and 100MB RAM (expandable to 1Gbytes) 
This CPU is totally under control of the SC’s internal CPU and does not interface 
directly to the server’s PCI bus. The operation of the Server SSC is explained 
elsewhere.
Mammoth, Inc. White Paper 
(DRAFT) 
Mammoth provides a minimum of two redundant Security Servers, which provide the 
only external access from the client’s LAN to the Internet. These servers control access 
to all: 
 External user clients (doctor’s hand held units, etc.) 
 Other databases (such as those in hospitals) 
 Mammoth’s Network Management Center 
 All server racks (using biometric fingerprint scanners)
Mammoth, Inc. White Paper 
(DRAFT) 
Concept of Operations (CONOPS) 
Since Mammoth has been successfully providing secure systems based on its SC 
technology for several years, Mammoth has obtained insurance protection, which it offers 
to its clients who use the SC. So long as the client contracts for continuing management 
and support services from Mammoth and submits to random security audits by Mammoth 
to verify security conformance by the client (Medsoft), Mammoth’s insurer will 
indemnify the client and the client’s customers against security breaches caused by a 
failure of Mammouth’s security technology. Coverage is up to $1 million per incident, 
with a maximum exposure of $10 million. 
As part of Mammoth’s on-site interactions with Medsoft, Mammoth does the following: 
 Obtains background checks of Medsoft personnel who will support customers 
using the SC 
 Verifies that adequate physical security is provided for SC related operations at 
Medsoft 
 Provides SC’s for designated operations personnel 
 Ensures that Medsoft’s Applications Servers are on a separate LAN which is in a 
physically controlled area and which only communicate using Server SCs (see 
below) 
 Ensures that servers are in Mammoth certified racks with front and rear doors that 
prevent unauthorized access (access to racks is controlled by biometric fingerprint 
scanner and then logon via User ID/ password)
Exhibit A 
Privacy Policy 
No automated access to any information will be provided to any unauthorized person. 
Practices at 
Outsources Tests to 
Outsources Tests to 
Is Tested by 
Medical Group 
Referred to 
Member of 
Patient of 
Individual client organizations (Doctors’ Offices) may exercise their own Privacy Policy. 
Individual users, who are certified by the procedures and mechanisms described 
elsewhere in this document, are at liberty to reveal or protect information obtained from 
automated systems just as they are with existing paper and automated records. However, 
as with existing personal or otherwise confidential information to which these authorized 
individuals have access, the individual is responsible personally for protecting such 
information. 
A-1 
Mammoth, Inc. Proprietary Information 
Doctor 
Hospital 
Independent Laboratory 
Patient 
Outpatient at 
Inpatient at 
Primary Care Provider of 
Specialist Care Provider of
Exhibit B 
Security Policy 
All access to and modification to information secured under this Security Policy will: 
· Be limited to authorized individuals and procedures protected under the Security 
Mechanisms, which implement this Security Policy. 
Be in accordance with the Clark-Wilson Integrity Model, which is restated below 
Clark-Wilson Integrity Model 
Definitions 
Acronym Expansion Meaning 
CDI Constrained 
Data Item 
A set of data items that have been validated 
(by a TP) and are in accordance with 
specifications. 
IVP Integrity 
Verification 
Procedure 
An integrity verification procedure is used to 
demonstrate that CDIs are valid and are in 
accordance with specifications. IVPs can be 
computer code or they can be manual 
procedures. Audit work programs are classic 
examples of IVPs, as are input validation 
programs. 
TP Transformation 
Procedure 
A transformation procedure transforms a set 
of valid data items (CDI) into another valid 
set. It may also transform non-validated data 
items (UDI) into valid data (CDI). This 
means that a transformation procedure must 
itself have the properties of a CDI. 
UDI Unconstrained 
Data Item 
A UDI is a set of data items that have not 
been validated or proved to comply with 
specifications. 
B-1 
Mammoth, Inc. Proprietary Information
Exhibit B 
Security Policy 
Clark-Wilson Integrity Model 
The Five Certification Rules 
Rule Number Rule 
C1 All IVP’s must properly ensure that all CDI’s are in a valid state at 
the time the IVP is run. 
C2 All TP’s must be certified to be valid. That is, they must take a 
CDI to a valid final state, given that it is in a valid state to begin 
with. For each TP, and each set of CDI’s that it may manipulate, 
the Security Officer must specify a “relation”, defines that 
execution. A relation is thus of the form: (TPi, (CDIa, CDIb, 
CDIc...)), where the list of CDI’s defines a particular set of 
arguments for which the TP has been certified. 
C3 The list of relations in E2 must be certified to meet the separation 
of duty requirement. 
C4 All TP’s must be certified to write to an append-only CDI (the log) 
all information necessary to permit the nature of the operation to 
be reconstructed. 
C5 Any TP that takes a UDI as an input value must be certified to 
perform only valid transformation, or else no transformations, for 
any possible value of the UDI. The transformation should take the 
input from a UDI to a CDI, or the UDI commercial is rejected. 
B-2 
Mammoth, Inc. Proprietary Information
Exhibit B 
Security Policy 
Clark-Wilson Integrity Model 
The Four Enforcement Rules 
Rule Number Rule 
E1 The system must maintain the list of relations specified in rule C2, 
and must ensure that the only manipulation of any CDI is by a TP, 
where the TP is operating on the CDI as specified in some 
relation. 
E2 The system must maintain a list of relationships of the form: 
(UserID, TPi, (CDIa, CDIb, CDIc.)), which relates to a user, a TP, 
and the data objects that TP may reference on behalf of that user. 
It must ensure that only executions described in one of the 
relations are performed. 
E3 The system must authenticate the identity of each user attempting 
to execute a TP. 
E4 Only the agent permitted to certify entities may change the list of 
such entities associated with other entities: specifically, the list of 
TP’s associated with a CDI and the list of users associated with a 
TP. An agent that can certify an entity may not have any execute 
rights with respect to that entity. 
B-3 
Mammoth, Inc. Proprietary Information

More Related Content

Viewers also liked

Final exam. ps lecture 15 28
Final exam. ps lecture 15 28Final exam. ps lecture 15 28
Final exam. ps lecture 15 28A K DAS's | Law
 
Avoimesta datasta palveluja: Missa ollaan - mihin ollaan menossa avoimen data...
Avoimesta datasta palveluja: Missa ollaan - mihin ollaan menossa avoimen data...Avoimesta datasta palveluja: Missa ollaan - mihin ollaan menossa avoimen data...
Avoimesta datasta palveluja: Missa ollaan - mihin ollaan menossa avoimen data...Jaakko J. Korhonen
 
Competencias ciudadanas
Competencias ciudadanasCompetencias ciudadanas
Competencias ciudadanasSusy Landa
 
Cyber security innovation imho
Cyber security innovation imhoCyber security innovation imho
Cyber security innovation imhoW Fred Seigneur
 
Kick starter project secure computing infrastructure for real-time embedded ...
Kick starter project  secure computing infrastructure for real-time embedded ...Kick starter project  secure computing infrastructure for real-time embedded ...
Kick starter project secure computing infrastructure for real-time embedded ...W Fred Seigneur
 
Cyber security innovation_imho v4
Cyber security innovation_imho v4Cyber security innovation_imho v4
Cyber security innovation_imho v4W Fred Seigneur
 
Secure Computing Architecture for Medical Software System Application
Secure Computing Architecture for Medical Software System ApplicationSecure Computing Architecture for Medical Software System Application
Secure Computing Architecture for Medical Software System ApplicationW Fred Seigneur
 
Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4W Fred Seigneur
 
Cyber security innovation imho v5
Cyber security innovation imho v5Cyber security innovation imho v5
Cyber security innovation imho v5W Fred Seigneur
 
Fred GWU Grad Certificate class project
Fred GWU Grad Certificate class projectFred GWU Grad Certificate class project
Fred GWU Grad Certificate class projectW Fred Seigneur
 
Amc sweaters ltd. profile
Amc sweaters ltd. profileAmc sweaters ltd. profile
Amc sweaters ltd. profileRajib Sardar
 
Amc sweaters ltd. profile
Amc sweaters ltd. profileAmc sweaters ltd. profile
Amc sweaters ltd. profileRajib Sardar
 
Skypedrive y dropbox
Skypedrive y dropboxSkypedrive y dropbox
Skypedrive y dropboxGrace León
 
Study the scope of kara wipes in horeca
Study the scope of kara wipes in horecaStudy the scope of kara wipes in horeca
Study the scope of kara wipes in horecaananthu001
 

Viewers also liked (20)

Lesson3
Lesson3Lesson3
Lesson3
 
酒店2a
酒店2a酒店2a
酒店2a
 
Final exam. ps lecture 15 28
Final exam. ps lecture 15 28Final exam. ps lecture 15 28
Final exam. ps lecture 15 28
 
Avoimesta datasta palveluja: Missa ollaan - mihin ollaan menossa avoimen data...
Avoimesta datasta palveluja: Missa ollaan - mihin ollaan menossa avoimen data...Avoimesta datasta palveluja: Missa ollaan - mihin ollaan menossa avoimen data...
Avoimesta datasta palveluja: Missa ollaan - mihin ollaan menossa avoimen data...
 
Competencias ciudadanas
Competencias ciudadanasCompetencias ciudadanas
Competencias ciudadanas
 
Viii programa de vacunación
Viii programa de vacunaciónViii programa de vacunación
Viii programa de vacunación
 
Cyber security innovation imho
Cyber security innovation imhoCyber security innovation imho
Cyber security innovation imho
 
Kick starter project secure computing infrastructure for real-time embedded ...
Kick starter project  secure computing infrastructure for real-time embedded ...Kick starter project  secure computing infrastructure for real-time embedded ...
Kick starter project secure computing infrastructure for real-time embedded ...
 
Cyber security innovation_imho v4
Cyber security innovation_imho v4Cyber security innovation_imho v4
Cyber security innovation_imho v4
 
Secure Computing Architecture for Medical Software System Application
Secure Computing Architecture for Medical Software System ApplicationSecure Computing Architecture for Medical Software System Application
Secure Computing Architecture for Medical Software System Application
 
Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4
 
Cyber security innovation imho v5
Cyber security innovation imho v5Cyber security innovation imho v5
Cyber security innovation imho v5
 
Fred GWU Grad Certificate class project
Fred GWU Grad Certificate class projectFred GWU Grad Certificate class project
Fred GWU Grad Certificate class project
 
Amc sweaters ltd. profile
Amc sweaters ltd. profileAmc sweaters ltd. profile
Amc sweaters ltd. profile
 
Amc sweaters ltd. profile
Amc sweaters ltd. profileAmc sweaters ltd. profile
Amc sweaters ltd. profile
 
Skypedrive y dropbox
Skypedrive y dropboxSkypedrive y dropbox
Skypedrive y dropbox
 
Ato i frei luis de sous
Ato i frei luis de sousAto i frei luis de sous
Ato i frei luis de sous
 
Ficha isometrias 6ºano
Ficha isometrias 6ºanoFicha isometrias 6ºano
Ficha isometrias 6ºano
 
Study the scope of kara wipes in horeca
Study the scope of kara wipes in horecaStudy the scope of kara wipes in horeca
Study the scope of kara wipes in horeca
 
Christian philosophy
Christian philosophyChristian philosophy
Christian philosophy
 

Similar to Mamouth white paper

An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guideSigfox
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561RAKESH_CSU
 
eSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitieseSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitiesYiannis Hatzopoulos
 
08680982.pdfArchitectures for Security A comparative anal.docx
08680982.pdfArchitectures for Security A comparative anal.docx08680982.pdfArchitectures for Security A comparative anal.docx
08680982.pdfArchitectures for Security A comparative anal.docxcroftsshanon
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
Ciss previsionnotes
Ciss previsionnotesCiss previsionnotes
Ciss previsionnotesmadunix
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System SecurityAmber Wheeler
 
SICAM Disto substation automation
SICAM Disto substation automationSICAM Disto substation automation
SICAM Disto substation automationashwini reliserv
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9Javier Arrospide
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx40NehaPagariya
 
Nt1330 Unit 1 Problem Analysis Paper
Nt1330 Unit 1 Problem Analysis PaperNt1330 Unit 1 Problem Analysis Paper
Nt1330 Unit 1 Problem Analysis PaperJoanna Paulsen
 
Data Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time ApplicationsData Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time Applicationsijsrd.com
 

Similar to Mamouth white paper (20)

An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
 
eSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitieseSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalities
 
08680982.pdfArchitectures for Security A comparative anal.docx
08680982.pdfArchitectures for Security A comparative anal.docx08680982.pdfArchitectures for Security A comparative anal.docx
08680982.pdfArchitectures for Security A comparative anal.docx
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
W04404135146
W04404135146W04404135146
W04404135146
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
Ciss previsionnotes
Ciss previsionnotesCiss previsionnotes
Ciss previsionnotes
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
SICAM Disto substation automation
SICAM Disto substation automationSICAM Disto substation automation
SICAM Disto substation automation
 
Smartcard
SmartcardSmartcard
Smartcard
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx
 
ATM
ATMATM
ATM
 
Nt1330 Unit 1 Problem Analysis Paper
Nt1330 Unit 1 Problem Analysis PaperNt1330 Unit 1 Problem Analysis Paper
Nt1330 Unit 1 Problem Analysis Paper
 
Data Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time ApplicationsData Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time Applications
 

More from W Fred Seigneur

1995 roads report_broschure-the_advent_of_client-server_telephony_networks
1995 roads report_broschure-the_advent_of_client-server_telephony_networks1995 roads report_broschure-the_advent_of_client-server_telephony_networks
1995 roads report_broschure-the_advent_of_client-server_telephony_networksW Fred Seigneur
 
Ashburn medical group screens
Ashburn medical group screensAshburn medical group screens
Ashburn medical group screensW Fred Seigneur
 
Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4W Fred Seigneur
 
Cyber security innovation_imho v3
Cyber security innovation_imho v3Cyber security innovation_imho v3
Cyber security innovation_imho v3W Fred Seigneur
 
Cyber securityinnovationimho v3
Cyber securityinnovationimho v3Cyber securityinnovationimho v3
Cyber securityinnovationimho v3W Fred Seigneur
 

More from W Fred Seigneur (7)

1995 roads report_broschure-the_advent_of_client-server_telephony_networks
1995 roads report_broschure-the_advent_of_client-server_telephony_networks1995 roads report_broschure-the_advent_of_client-server_telephony_networks
1995 roads report_broschure-the_advent_of_client-server_telephony_networks
 
Ashburn medical group screens
Ashburn medical group screensAshburn medical group screens
Ashburn medical group screens
 
Db relationships
Db relationshipsDb relationships
Db relationships
 
Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4
 
Cyber security innovation_imho v3
Cyber security innovation_imho v3Cyber security innovation_imho v3
Cyber security innovation_imho v3
 
Cyber securityinnovationimho v3
Cyber securityinnovationimho v3Cyber securityinnovationimho v3
Cyber securityinnovationimho v3
 
Kingdom ofgod
 Kingdom ofgod Kingdom ofgod
Kingdom ofgod
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 

Mamouth white paper

  • 1. Mammoth, Inc. White Paper (DRAFT) Prepared for: Medsoft Medical Systems, Inc. · This is the first draft of a “living document” representing Mammoth’s input to Medsoft. It includes the following sections:  Requirements Compliance Matrix  Proposed System Architecture  Concept of Operations (CONOPS)  Proposed Privacy Policy (Exhibit A)  Proposed Security Policy (Exhibit B)  Draft Risk Analysis – TBD  Attack Tree – TBD
  • 2. Mammoth, Inc. White Paper (DRAFT) Requirements Compliance Matrix The matrix below describes Mammoth’s proposed compliance with customer (Medsoft) provided system requirements. Note that details, including a technical explanation of compliance with these requirements are included in the System Architecture, Concept of Operations and other sections of this White Paper. Requirements will be referred to, in subsequent sections, by the Requirement ID in the matrix below. Requirement ID Requirement Text Explanation of Mammoth Compliance R1. The system shall provide secure end-to- end communications. All communications, including those between computers in controlled areas, are encrypted using the Advanced Encryption Standard algorithm implemented in hardware on Mammoth’s Security Cards (SCs). SCs include PCMCIA cards for user devices, a PCI version for desktop PCs and Servers and a PCI Server Security Card (SSC) for secure servers. R2. The system shall provide an easy to use interface. Users will access the system via a web-based interface. R3. The system shall provide connectionless integrity. As stated in our response to R2, above, a web-based interface will be used to support ease of use for users. The encrypted connection provided by the SCs will ensure the integrity of communications over the underlying connectionless IP network. As explained in detail in the response to Requirement R5, below, users are authenticated by the SC, and an AES encrypted session is established between the SC on the user’s device and the SSC on the Security Server. In addition, SCs and SSCs provide the function of a simple yet effective firewall. As explained in detail in later sections, Mammoth proposes to use the Internet as a ubiquitous (but un-trusted) communications medium. However, since access to the Medsoft applications software is limited to a small set of users and not offered to the public on the Internet, SSCs only “listen” on non-standard TCP ports. Accesses from a browser on
  • 3. Mammoth, Inc. White Paper (DRAFT) the user’s device to the URL for secure Medsoft servers (which will be directed to port 80) are translated in the SC to a non-standard port number. Port numbers are changed daily. Each SC knows the correct port number to use based on a Mammoth algorithm similar to that in a SecureID® Card. The SC uses the AES hardware to generate a new port number each day. The SSC converts HTTP messages on this private port number back to port 80 before sending the http request to the web server. When a Medsoft web server responds to the user’s browser request, as with most web servers, another port number will be assigned. This port number is mapped by the SSC to yet another port number (other than the daily number) for use in the session. This port number is also established using an AES cryptographic exchange between the user’s SC and the SSC. R4. The system shall provide Non-repudiation. As explained in the response to R5, below, user identity is authenticated by the SC at the point of origination. All messages between SCs (and SSCs) are check-summed using AES and this check sum is included in every message. This ensures that messages originate from (and responses are delivered to) authorized users with any tampering detected. (See response to R6 below). Furthermore, SSCs log all transactions to in an encrypted form on disk on Mammoth Security Servers at Medsoft. Thus, users may not repudiate transactions, which they execute. R5. The system shall provide data origin authentication. User identity is authenticated at the point of origination by the SC using a biometric fingerprint scanner integral to the SC. In addition, a login with User ID and password is required. Once user identity is verified, an AES encrypted session is established between the SC on the user’s device and the SSC. Each message includes the serial number of the
  • 4. Mammoth, Inc. White Paper (DRAFT) originating SC/SSC to verify the point of origin of the message. Distribution of SCs is controlled. User SCs are distributed only to authorized users using authorized couriers. The serial number of each SC and the identity of the user the SC has been provided to are recorded in a protected database at Mammoth. This same information, for Medsoft and Medsoft customers with SCs is cached on a Security Server at Medsoft. R6. The system shall provide Protection against replay attacks. Each SC and SSC has an internal date time clock. The date and time of day (to the nearest millisecond) and Time Zone for the Date/Time, are included in the message, which is check-summed along with a message sequence number ant the message text using AES and then AES encrypted for transmission. Thus, if an attacker attempts to replay a transaction, it will be rejected (and logged) by the SSC that receives it. If an attacker attempts to replay a message from an SSC to a user, the SC at the user end will also reject the transaction. Rather than passing such a message to the user’s handheld device (or laptop/desktop PC), the message will be sent instead to an SSC for logging and will not be passed to application software in the user device.
  • 5. Mammoth, Inc. White Paper (DRAFT) System Architecture Doctors will be provided with a special hand held terminal (we’ll use the photo Steven sent around). This device will be COTS (running Windows or Linux as we decide later). It will be provided with a PCMCIA Security card which is made by Mammoth, Inc. and available as COTS (note that the handout says Mammoth is a large electronics manufacturer). A laptop or palmtop with the appropriate software and PCMCIA card will also work. Because the PCMCIA Security Card (SC) is produced in large volumes for Mammoth’s other corporate and Government customers, the cost is only $450. Connection from a doctor’s device to the applications server will be via the Internet. However, we will consider the Internet a hostile communications medium and our Medical Group Referred to Member of Doctor Hospital Practices at Outsources Tests to Outsources Tests to Independent Laboratory Is Tested by Patient Outpatient at Inpatient at Patient of Primary Care Provider of Specialist Care Provider of architecture protects against exposure from the public Internet. Since wireless operation is needed the SC provides IEEE 802.11b and wireless Internet from AT&T or Sprint (depending on which has better coverage in an area).
  • 6. Mammoth, Inc. White Paper (DRAFT) To ensure security is maintained when the user device is connected to a LAN, the SC also includes an Ethernet port. All communications between the user hand held unit and the outside world is mitigated by the SC. The applications software on the user device includes a monitor which reports if any other connections (via dial up, parallep port, or another Ethernet port, for example). This status is reported every 10 seconds to the SC. Once per minute the SC checksums all the Medsoft application software in RAM and disk and compares the cryptographically generated signature to that in EEPROM on the SC. All Medsoft applications software is loaded to disk on the user device using the SC. In the process, the validity of the software is verified cryptographically (verifying the checksums in the new download using the on board AES chip). The Mammoth Security Card (SC) for user devices is a PCMCIA card as illustrated below. The software in the SC totals less that 50,000 lines, which includes a 5000 line Micro-Kernel (a Reference Monitor) and other software modules. About 35,000 lines of code are “trusted” software (developed under strict rigor at Mammoth Labs in White Plains, NY). However, all software functions, including hardware drivers, executes in restricted mode under the control of the Micro-Kernel. The original code for the Micro-Kernel was obtained when Mammoth bought out a computer security company in Urbana, IL in 1986. The “Urbana Kernel”, as it was known, had been developed for a highly classified Government project as a Secure Network Front End and successfully passed the very strict verification process of the classified customer. While it was not placed on the Evaluated Products List associated with the Orange Book, it passed all the requirements for A1 certification. Of course, it would have been much more difficult to pass this verification if the Urbana Kernel had been more than a Real-Time Executive. For example, no file system is included in the
  • 7. Mammoth, Inc. White Paper (DRAFT) Kernel (or any software in the SC). All disk storage is provided by untrusted host computers. All data on the such untrusted hosts includes a security label which, along with the data itself, is cryptographically check summed before being written to disk. Depending on the type of data, it may be stored in encrypted form or in the clear on the host’s disk. If only the data is The Mammoth PCMCIA SC includes: · On card 802.11b Ethernet (with unique Ethernet MAC address). This will be used when doctors are on site at equipped hospitals or doctor’s offices. · On card RJ-45 10/100MB Ethernet interface (with a separate MAC address). · On card wireless Internet access via either, AT&T or Sprint. The selection of wireless carrier is made based on best coverage in the area the doctor resides and works. The doctor selects AT&T or Sprint when signing up for the card (see procedure below). · The SC protrudes about 1 inch from the PCMCIA slot. This portion of the card contains: o The antenna portion of the SC, o The external Ethernet connector, o A status LED and o A biometric fingerprint scanner (whenever an SC is powered up a fingerprint scan is required to authenticate the user) · On card AES encryption, in hardware · Date/Time clock (preset at factory, battery life 1.5 years) · 4K of Volatile (battery powered) Random Access Memory (RAM) which is preprogrammed at the factory with: o A unique (per card) 256 bit AES key for use for remotely administering the PCMCIA card. o A unique (per card) 2048 bit RSA key for the doctor to whom the card is assigned · Flash EEPROM (Electronically Erasable, Programable Read Only Memory) which: o Is preprogrammed with a unique serial number for each PCMCIA card This serial number keys into a database at Mammoth that contains:  The card model  The card hardware revision level  The card firmware revision level  The date of manufacture o Contains the firmware for the card
  • 8. Mammoth, Inc. White Paper (DRAFT) Notes: · None of the information from the EEPROM or Battery powered RAM are made directly accessible to software on the hand held device. Some information can be accessed, but this is done via a transaction with the Security Server. · Except for battery replacement, the card is sealed to prevent physical tampering. Any tampering (such as trying to remove the metal case around the SC will cause all volatile information (keys) to be lost and will likely destroy the card. All desktop PCs that will access information protected by Mammoth’s technology will use a PCI version of the SC. Actually this unit merely provides a PCI to PCMCIA physical interface with the PCMCIA SC inserted. An external biometric fingerprint scanner is included which interfaces to the PCI board to allow easy access for operations personnel. This interface is to the PCMCIA SC and not directly to the PCI bus. All servers that will access and manipulate information protected by Mammoth’s security technology will use an enhanced server version of the PCI based SC called the Server SC (SSC). The SSC does not use the PCMCIA SC, but includes:  The same tamper proof design as the SC  An interface to an external biometric fingerprint scanner  No RF interfaces  An on board Pentium CPU and 100MB RAM (expandable to 1Gbytes) This CPU is totally under control of the SC’s internal CPU and does not interface directly to the server’s PCI bus. The operation of the Server SSC is explained elsewhere.
  • 9. Mammoth, Inc. White Paper (DRAFT) Mammoth provides a minimum of two redundant Security Servers, which provide the only external access from the client’s LAN to the Internet. These servers control access to all:  External user clients (doctor’s hand held units, etc.)  Other databases (such as those in hospitals)  Mammoth’s Network Management Center  All server racks (using biometric fingerprint scanners)
  • 10. Mammoth, Inc. White Paper (DRAFT) Concept of Operations (CONOPS) Since Mammoth has been successfully providing secure systems based on its SC technology for several years, Mammoth has obtained insurance protection, which it offers to its clients who use the SC. So long as the client contracts for continuing management and support services from Mammoth and submits to random security audits by Mammoth to verify security conformance by the client (Medsoft), Mammoth’s insurer will indemnify the client and the client’s customers against security breaches caused by a failure of Mammouth’s security technology. Coverage is up to $1 million per incident, with a maximum exposure of $10 million. As part of Mammoth’s on-site interactions with Medsoft, Mammoth does the following:  Obtains background checks of Medsoft personnel who will support customers using the SC  Verifies that adequate physical security is provided for SC related operations at Medsoft  Provides SC’s for designated operations personnel  Ensures that Medsoft’s Applications Servers are on a separate LAN which is in a physically controlled area and which only communicate using Server SCs (see below)  Ensures that servers are in Mammoth certified racks with front and rear doors that prevent unauthorized access (access to racks is controlled by biometric fingerprint scanner and then logon via User ID/ password)
  • 11. Exhibit A Privacy Policy No automated access to any information will be provided to any unauthorized person. Practices at Outsources Tests to Outsources Tests to Is Tested by Medical Group Referred to Member of Patient of Individual client organizations (Doctors’ Offices) may exercise their own Privacy Policy. Individual users, who are certified by the procedures and mechanisms described elsewhere in this document, are at liberty to reveal or protect information obtained from automated systems just as they are with existing paper and automated records. However, as with existing personal or otherwise confidential information to which these authorized individuals have access, the individual is responsible personally for protecting such information. A-1 Mammoth, Inc. Proprietary Information Doctor Hospital Independent Laboratory Patient Outpatient at Inpatient at Primary Care Provider of Specialist Care Provider of
  • 12. Exhibit B Security Policy All access to and modification to information secured under this Security Policy will: · Be limited to authorized individuals and procedures protected under the Security Mechanisms, which implement this Security Policy. Be in accordance with the Clark-Wilson Integrity Model, which is restated below Clark-Wilson Integrity Model Definitions Acronym Expansion Meaning CDI Constrained Data Item A set of data items that have been validated (by a TP) and are in accordance with specifications. IVP Integrity Verification Procedure An integrity verification procedure is used to demonstrate that CDIs are valid and are in accordance with specifications. IVPs can be computer code or they can be manual procedures. Audit work programs are classic examples of IVPs, as are input validation programs. TP Transformation Procedure A transformation procedure transforms a set of valid data items (CDI) into another valid set. It may also transform non-validated data items (UDI) into valid data (CDI). This means that a transformation procedure must itself have the properties of a CDI. UDI Unconstrained Data Item A UDI is a set of data items that have not been validated or proved to comply with specifications. B-1 Mammoth, Inc. Proprietary Information
  • 13. Exhibit B Security Policy Clark-Wilson Integrity Model The Five Certification Rules Rule Number Rule C1 All IVP’s must properly ensure that all CDI’s are in a valid state at the time the IVP is run. C2 All TP’s must be certified to be valid. That is, they must take a CDI to a valid final state, given that it is in a valid state to begin with. For each TP, and each set of CDI’s that it may manipulate, the Security Officer must specify a “relation”, defines that execution. A relation is thus of the form: (TPi, (CDIa, CDIb, CDIc...)), where the list of CDI’s defines a particular set of arguments for which the TP has been certified. C3 The list of relations in E2 must be certified to meet the separation of duty requirement. C4 All TP’s must be certified to write to an append-only CDI (the log) all information necessary to permit the nature of the operation to be reconstructed. C5 Any TP that takes a UDI as an input value must be certified to perform only valid transformation, or else no transformations, for any possible value of the UDI. The transformation should take the input from a UDI to a CDI, or the UDI commercial is rejected. B-2 Mammoth, Inc. Proprietary Information
  • 14. Exhibit B Security Policy Clark-Wilson Integrity Model The Four Enforcement Rules Rule Number Rule E1 The system must maintain the list of relations specified in rule C2, and must ensure that the only manipulation of any CDI is by a TP, where the TP is operating on the CDI as specified in some relation. E2 The system must maintain a list of relationships of the form: (UserID, TPi, (CDIa, CDIb, CDIc.)), which relates to a user, a TP, and the data objects that TP may reference on behalf of that user. It must ensure that only executions described in one of the relations are performed. E3 The system must authenticate the identity of each user attempting to execute a TP. E4 Only the agent permitted to certify entities may change the list of such entities associated with other entities: specifically, the list of TP’s associated with a CDI and the list of users associated with a TP. An agent that can certify an entity may not have any execute rights with respect to that entity. B-3 Mammoth, Inc. Proprietary Information