SlideShare a Scribd company logo
PRESIDENT DONALD TRUMP
CYBERSECURITY
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
As cybersecurity attacks proliferate across corporate and government networks,
network segmentation and access control are becoming standard approaches
for addressing the vulnerabilities inherent in today’s connected enterprise. It
can be especially helpful for agencies with classifed or sensitive data sitting on
internal resources, but with connections through the network to uncontrolled
endpoints.
Network segmentation is an approach advocated by the National Institute
of Standards and Technology's Cybersecurity Framework (CSF). It involves
segmenting the network into smaller network systems and separating groups of
systems and networks from each other. Isolating or fltering to limit access
between network segments improves security and provides better access
control. [Emphasis Supplied]
Feds Can Achieve Better Security Through Network Segmentation
MeriTalk. July 9, 2018, accessed August 13, 2018
https://www.meritalk.com/articles/feds-can-achieve-better-security-through-network-segmentation/
__________________________________________________________
SCIENCE & TECHNOLOGY HIGHLIGHTS
TRUMP ADMINISTRATION – YEAR ONE
https://www.whitehouse.gov/wp-content/uploads/2018/03/Administration-2017-ST-Highlights.pdf
We're on the verge of new technological revolutions that could
improve, virtually, every aspect of our lives, create vast new wealth
for American workers and families, and open up bold, new frontiers
in science, medicine, and communication.
President Donald J. Trump
CYBERSECURITY & GOVERNMENT IT SERVICES
Our goal is to lead a sweeping transformation of the Federal Government's
technology that will deliver dramatically better services for citizens and
stronger protection from cyberattacks.
On April 28, 2017, President Trump signed Executive Order 13794 –
Establishment of the American Technology Council.
The Administration worked with Congress to pass the 2018 National Defense
Authorization Act, which included a section on modernizing government
technology. [President Trump demonstrated his commitment to the importance
of Federal scientifc exploration by requesting $151.2 billion for Federal R&D
investment in the FY 2018 budget – a 2% increase over FY 2017. Furthermore,
the President's FY 2018 Budget Request would result in the highest percent of
the budget for the conduct of R&D since the FY 2014 Budget Request. In
August, OSTP and OMB released the annual Administration R&D budget
priorities for FY 2019, advising agencies to prioritize basic and early-stage
applied research, the foundation for the development of transformative
commercial products and services.] Source: The White House. Empowering
Americans to Innovate: Science and Technology Highlights Since Inauguration.
March 7, 2018. https://www.whitehouse.gov/articles/science-technology-in-the-frst-year-of-the-
trump-administration/
On May 11, 2017, President Trump signed Executive Order 13800 –
Strengthening the Cybersecurity of Federal Networks and Critical
Infrastructure.
On December 5, the National Institute for Standards and Technology released
the second draft of the proposed update to the Framework for Improving
Critical Infrastructure Cybersecurity.
__________________________________________________________
ANALYSIS OF NETWORK SEGMENTATION TECHNIQUES
IN CLOUD DATA CENTERS
By Ramaswamy Chandramouli, Ph.D, M.S., B.S. Supervisory Computer Scientist and Director of
NIST Personal Identity Verifcation Program, Computer Security Division, Information Technology
Laboratory, National Institute of Standards & Technology.
https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=918440
[Excerpt]
Cloud Data centers are predominantly made up of Virtualized hosts. The
networking infrastructure in a cloud (virtualized) data center, therefore, consists
of the combination of physical IP network (data center fabric) and the virtual
network residing in virtualized hosts. Network Segmentation (Isolation), Trafc
fow control using frewalls and IDS/IPS form the primary network-based
security techniques with the frst one as the foundation for the other two. In
this paper, we describe and analyze three generations of network segmentation
techniques – Virtual Switches & Physical NIC-based, VLANbased & Overlay-
based. We take a detailed look at the overlaybased virtual network
segmentation and its characteristics such as scalability and ease of
confguration.
With the increasing adoption of cloud services by large enterprises that have to
host multi-tier applications, the data center network administrators need a
fexible virtual networking topology with capability to obtain the required
isolation through network segmentation.
At the same time, it is necessary that these virtual network segments span
multiple, arbitrary IP subnets of the data center and also several hypervisor
clusters. As of now, the only virtual networking technology that can provide
these capabilities without a great deal of physical network reconfguration or
addition of networking resources is the overlay-based virtual networking.
This degree of independence between the virtual networks and the physical
networks provided by overlaybased techniques also provides the scalability
and confguration ease that are needed for maintaining the logical network
segmentation within large data centers. The foundational security for IaaS
cloud consumer workloads thus becomes an economically and operationally
viable proposition.
DOES NETWORK MICRO-SEGMENTATION
PROVIDE ADDITIONAL SECURITY?
By Steve Jaworski, GSEC and Mohammed Haron, GSEC
SANS Institute
September 8, 2018, accessed August 13, 2018
https://www.giac.org/paper/gsec/5496/network-micro-segmentation-provide-additional-security/11034
Network segmentation is a concept of taking a large group of hosts and creating
smaller groups of hosts that can communicate with each other without
traversing a security control. The smaller groups of hosts each have defned
security controls, and groups are independent of each other. Network micro-
segmentation takes the smaller group of hosts by confguring controls around
individual hosts. The goal of network microsegmentation is to provide more
granular security and reduce an attacker’s capability to easily compromise an
entire network. If an attacker is successful in compromising a host, he or she is
limited to only the network segment on which the host resides. If the host
resides in a micro-segment, then the attacker is restricted to only that host.
Network segmentation is a defense in depth strategy that helps prevent
attackers from moving laterally within an organization’s network. (AlgoSec,
n.d.) A lateral movement within a network is commonly called east-west trafc.
Segmentation creates choke points within the network and is separated by a
security control and is also a way to reduce the attack surface of an
organization (Northcutt, n.d.).
Breaking up a network with VLANs and Layer 3 network interfaces also
segments the network but will not provide efective security. By default, the
network will permit all trafc between VLANS.
Access Control Lists (ACLs) on the Layer 3 network interfaces can be used to
restrict trafc, but they are limited in their capabilities.
The ACL's on routers are not the same as frewall rules, depending on the
network vendor they may slow down trafc, and they can become too complex
to manage if too many exceptions are required. Layer 3 ACLs are most efective
when they are small and used for explicit denies.
4 LAYERS OF ENTERPRISE SECURITY
By Patrick Marshall. GCN
Apr 12, 2018, accessed August 13, 2018
https://gcn.com/articles/2018/04/12/cyber-tools.aspx
The new cyber landscape. Apr 13, 2018
https://gcn.com/articles/2018/04/13/cyber-landscape.aspx
Although threats to government IT security continue unabated, agencies do
have some mature solutions for protecting enterprise assets from malicious
intruders.
With tight budgets the only constant, agencies face a fast-evolving range of
challenges – from securing hybrid networks and authenticating users who
connect via mobile devices and the cloud. For IT managers at government
agencies, it might seem like a perfect storm is gathering: tight budgets and
demands to upgrade aging network infrastructure; mandates to move
applications into the cloud and beyond their traditional network security
perimeter; calls to support rapidly growing numbers of users on mobile devices;
and, above all, warnings from intelligence agencies to expect ever greater
cyberthreats.
Tools that verify trafc, isolate networks, prevent data loss and protect the
endpoints are helping agencies lock down government data.
“We are constantly fguring out how to whack the next mole and beat the bad
guys at the next level of the game,” said Susannah Schiller, deputy CIO at the
National Institute of Standards and Technology. “It is a constantly evolving
thing, and it has been getting worse every year.”
According to agency staf, vendors and analysts alike, there has been a major
shift in network security strategy. Trying to contain data behind network
perimeters secured by frewalls and other tools is giving way to data-centric and
user-centric strategies that aim to protect data wherever it resides – whether it's
within the agency's perimeter, in the cloud or on a mobile device.
“As we move to more of a distributed data mode, with users on
nongovernment-furnished mobile devices, we have to move the security
protection closer to the asset, and we have to tie security policies to the user,”
said Chris Townsend, Symantec's vice president for federal. “That approach
aligns more to a risk mitigation strategy where we quantify the value of the
assets [and] risk of loss and then align scarce security resources accordingly.”
While pushing the federal government in that direction, the 2017 “Report to
the President on Federal IT Modernization” noted that “agencies have
attempted to modernize their systems but have been stymied by a variety of
factors, including resource prioritization, ability to procure services quickly,
and technical issues.”
No one advocates abandoning the traditional protections – frewalls and secure
routers, network analytic and intruder detection tools, for example. However,
new strategies are helping agencies verify trafc, isolate networks, prevent data
loss and protect the endpoints in support of locking down government data.
For efective network segmentation, a dedicated security control should exist
between hosts and networks.
Network segmentation does not always reduce the attack surface enough.
Network micro-segmentation is a more granular approach to preventing lateral
movement between hosts where it is more challenging to use traditional
hardware security controls (SDX Central, n.d.).
One network segment could still contain hundreds, if not thousands of hosts. If
a malicious actor compromises a host in a segment, the goal of network
microsegmentation is to prevent or detect the compromise of additional
systems.
By limiting the attacker's scope, the security team should have a better chance
of detecting and remediating the breach, limiting further damage.
__________________________________________________________
MICROSEGMENTATION
One increasingly popular technology that can help with implementing a zero-
trust model is microsegmentation, which uses software-defned virtual networks
to create myriad isolated networks. Whereas standard networks use frewalls
and routers to segment trafc for an entire organization, microsegmentation
might defne anetwork that is accessible only to single workgroup or even a
single individual.
Bill Rowan, vice president of federal sales at VMware, compared the concept to
that of a submarine built with various compartments so that a breach in one
compartment would not food the others. “That’s where we are taking the
approach of microsegmenting networks,' he said.
According to Rowan, a well-designed microsegmentation solution imposes
no noticeable cost in terms of network performance and even simplifes
some network chores, such as moving an application from one virtual
network to another. [Emphasis Supplied]
“Because we are separating the physical from the logical, I can simply build
that same network topology on the other side,” he said. “Heretofore, I had to
go back in and change all my network settings to make sure the application
could efectively communicate.”
Townsend, however, said it's not clear whether microsegmentation will be
viable. His main concern is scalability. “The idea is that for every virtual
application and every virtual network segment, you have a security policy that
follows that data or that portion of the network,” he said. That could
overwhelm an agency's IT team.
“Right now, our federal customers are struggling from an operations
standpoint to manage their security environment as it stands today,” he
added. [Emphasis Supplied]

More Related Content

What's hot

Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime Whitepaper
Martin Ruubel
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
PwC France
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
Martin Ruubel
 
Project 3
Project 3Project 3
Project 3
Priyanka Goswami
 
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
IJCSIS Research Publications
 
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
IJECEIAES
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
AbhilashYadav14
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
Booz Allen Hamilton
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
CMR WORLD TECH
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Ulf Mattsson
 
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Cláudia Alves
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
Shallu Behar-Sheehan FCIM
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...
Ulf Mattsson
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
Ulf Mattsson
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
Kumar Goud
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
IJLT EMAS
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
UL Transaction Security
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Carlos Valderrama
 

What's hot (20)

Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime Whitepaper
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
Project 3
Project 3Project 3
Project 3
 
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
 
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
 
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 

Similar to President Donald Trump - Cybersecurity - National Institute of Standards and Technology (NIST)

Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
aap3 IT Recruitment
 
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
IRJET Journal
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Unisys Corporation
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
Aharon Aharon
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
LiveAction Next Generation Network Management Software
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
IRJET Journal
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
 
DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020
Neil McDonnell
 
Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
Digital Policy and Law Consulting
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IJECEIAES
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Juniper Networks
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
Claudia Toscano
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Unisys Corporation
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
Netmagic Solutions Pvt. Ltd.
 

Similar to President Donald Trump - Cybersecurity - National Institute of Standards and Technology (NIST) (20)

Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
 
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020
 
Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 

More from Clifton M. Hasegawa & Associates, LLC

Hawaii Agricultural Development Agency (ADC) - Raising the Phoenix - Reconstr...
Hawaii Agricultural Development Agency (ADC) - Raising the Phoenix - Reconstr...Hawaii Agricultural Development Agency (ADC) - Raising the Phoenix - Reconstr...
Hawaii Agricultural Development Agency (ADC) - Raising the Phoenix - Reconstr...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii Agricultural Development Agency (ADC) - Hawaii Legislature Special Inv...
Hawaii Agricultural Development Agency (ADC) - Hawaii Legislature Special Inv...Hawaii Agricultural Development Agency (ADC) - Hawaii Legislature Special Inv...
Hawaii Agricultural Development Agency (ADC) - Hawaii Legislature Special Inv...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii Agricultural Development Corporation (ADC) - Hawaii Legislature Specia...
Hawaii Agricultural Development Corporation (ADC) - Hawaii Legislature Specia...Hawaii Agricultural Development Corporation (ADC) - Hawaii Legislature Specia...
Hawaii Agricultural Development Corporation (ADC) - Hawaii Legislature Specia...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii Agricultural Development Corporation (ADC) - Legislative Investigation...
Hawaii Agricultural Development Corporation (ADC) - Legislative Investigation...Hawaii Agricultural Development Corporation (ADC) - Legislative Investigation...
Hawaii Agricultural Development Corporation (ADC) - Legislative Investigation...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii Agriculture - Dammed If You Do, Dammed If You Don't - The Fork in the ...
Hawaii Agriculture - Dammed If You Do, Dammed If You Don't - The Fork in the ...Hawaii Agriculture - Dammed If You Do, Dammed If You Don't - The Fork in the ...
Hawaii Agriculture - Dammed If You Do, Dammed If You Don't - The Fork in the ...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii Agriculture - David Murdock - Man on a Mission Making the Pivot - The ...
Hawaii Agriculture - David Murdock - Man on a Mission Making the Pivot - The ...Hawaii Agriculture - David Murdock - Man on a Mission Making the Pivot - The ...
Hawaii Agriculture - David Murdock - Man on a Mission Making the Pivot - The ...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii - Working Together - Charting Hawaii's Course for a Resilient Future -...
Hawaii - Working Together - Charting Hawaii's Course for a Resilient Future -...Hawaii - Working Together - Charting Hawaii's Course for a Resilient Future -...
Hawaii - Working Together - Charting Hawaii's Course for a Resilient Future -...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii - Hu Honua Biomass Plant -- Henk Rogers - Blue Planet, Man On A Mission
Hawaii  - Hu Honua Biomass Plant -- Henk Rogers - Blue Planet, Man On A MissionHawaii  - Hu Honua Biomass Plant -- Henk Rogers - Blue Planet, Man On A Mission
Hawaii - Hu Honua Biomass Plant -- Henk Rogers - Blue Planet, Man On A Mission
Clifton M. Hasegawa & Associates, LLC
 
Hawaii Public Utilities Commission - Young Brothers Ltd. - Delivering The Bes...
Hawaii Public Utilities Commission - Young Brothers Ltd. - Delivering The Bes...Hawaii Public Utilities Commission - Young Brothers Ltd. - Delivering The Bes...
Hawaii Public Utilities Commission - Young Brothers Ltd. - Delivering The Bes...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii - Mayor Mitch Roth - Freedom, Equality, and Justice for All
Hawaii - Mayor Mitch Roth - Freedom, Equality, and Justice for AllHawaii - Mayor Mitch Roth - Freedom, Equality, and Justice for All
Hawaii - Mayor Mitch Roth - Freedom, Equality, and Justice for All
Clifton M. Hasegawa & Associates, LLC
 
Hawaii - Equal Justice Under The Law - Office Of The Public Defender - Advoca...
Hawaii - Equal Justice Under The Law - Office Of The Public Defender - Advoca...Hawaii - Equal Justice Under The Law - Office Of The Public Defender - Advoca...
Hawaii - Equal Justice Under The Law - Office Of The Public Defender - Advoca...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii - Red Hill Fuel Storage - GO NAVY - The Time is Now-The Future is Here...
Hawaii - Red Hill Fuel Storage - GO NAVY - The Time is Now-The Future is Here...Hawaii - Red Hill Fuel Storage - GO NAVY - The Time is Now-The Future is Here...
Hawaii - Red Hill Fuel Storage - GO NAVY - The Time is Now-The Future is Here...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii - Corona Tsunami - The Wake Up Call - Hawaii Pono`i - We Are Warriors ...
Hawaii - Corona Tsunami - The Wake Up Call - Hawaii Pono`i - We Are Warriors ...Hawaii - Corona Tsunami - The Wake Up Call - Hawaii Pono`i - We Are Warriors ...
Hawaii - Corona Tsunami - The Wake Up Call - Hawaii Pono`i - We Are Warriors ...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii - HART Rail Project - FTA - Welcome Aboard - Taking Charge - Breaking...
Hawaii - HART Rail Project - FTA  - Welcome Aboard - Taking Charge - Breaking...Hawaii - HART Rail Project - FTA  - Welcome Aboard - Taking Charge - Breaking...
Hawaii - HART Rail Project - FTA - Welcome Aboard - Taking Charge - Breaking...
Clifton M. Hasegawa & Associates, LLC
 
HART - The Purge - The Prize - The Pivot - The Team - Great Opportunities and...
HART - The Purge - The Prize - The Pivot - The Team - Great Opportunities and...HART - The Purge - The Prize - The Pivot - The Team - Great Opportunities and...
HART - The Purge - The Prize - The Pivot - The Team - Great Opportunities and...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii - Unite 5 - Protect Our Workers - Labor Day 2021
Hawaii - Unite 5 - Protect Our Workers - Labor Day 2021Hawaii - Unite 5 - Protect Our Workers - Labor Day 2021
Hawaii - Unite 5 - Protect Our Workers - Labor Day 2021
Clifton M. Hasegawa & Associates, LLC
 
Hawaii - John A. Burns School of Medicine - Graffiti - ID Root of the Problem...
Hawaii - John A. Burns School of Medicine - Graffiti - ID Root of the Problem...Hawaii - John A. Burns School of Medicine - Graffiti - ID Root of the Problem...
Hawaii - John A. Burns School of Medicine - Graffiti - ID Root of the Problem...
Clifton M. Hasegawa & Associates, LLC
 
Hawaii - Vaccine Research - Advancing Humanity - Invest in Our Future
Hawaii - Vaccine Research - Advancing Humanity - Invest in Our FutureHawaii - Vaccine Research - Advancing Humanity - Invest in Our Future
Hawaii - Vaccine Research - Advancing Humanity - Invest in Our Future
Clifton M. Hasegawa & Associates, LLC
 
Hawaii - Merck and Pfizer - Providing for Humanity - Research and Clinical Tr...
Hawaii - Merck and Pfizer - Providing for Humanity - Research and Clinical Tr...Hawaii - Merck and Pfizer - Providing for Humanity - Research and Clinical Tr...
Hawaii - Merck and Pfizer - Providing for Humanity - Research and Clinical Tr...
Clifton M. Hasegawa & Associates, LLC
 
Maui County, Hawaii - Fire and Public Safety - Outthinking Wildfire - A Tribu...
Maui County, Hawaii - Fire and Public Safety - Outthinking Wildfire - A Tribu...Maui County, Hawaii - Fire and Public Safety - Outthinking Wildfire - A Tribu...
Maui County, Hawaii - Fire and Public Safety - Outthinking Wildfire - A Tribu...
Clifton M. Hasegawa & Associates, LLC
 

More from Clifton M. Hasegawa & Associates, LLC (20)

Hawaii Agricultural Development Agency (ADC) - Raising the Phoenix - Reconstr...
Hawaii Agricultural Development Agency (ADC) - Raising the Phoenix - Reconstr...Hawaii Agricultural Development Agency (ADC) - Raising the Phoenix - Reconstr...
Hawaii Agricultural Development Agency (ADC) - Raising the Phoenix - Reconstr...
 
Hawaii Agricultural Development Agency (ADC) - Hawaii Legislature Special Inv...
Hawaii Agricultural Development Agency (ADC) - Hawaii Legislature Special Inv...Hawaii Agricultural Development Agency (ADC) - Hawaii Legislature Special Inv...
Hawaii Agricultural Development Agency (ADC) - Hawaii Legislature Special Inv...
 
Hawaii Agricultural Development Corporation (ADC) - Hawaii Legislature Specia...
Hawaii Agricultural Development Corporation (ADC) - Hawaii Legislature Specia...Hawaii Agricultural Development Corporation (ADC) - Hawaii Legislature Specia...
Hawaii Agricultural Development Corporation (ADC) - Hawaii Legislature Specia...
 
Hawaii Agricultural Development Corporation (ADC) - Legislative Investigation...
Hawaii Agricultural Development Corporation (ADC) - Legislative Investigation...Hawaii Agricultural Development Corporation (ADC) - Legislative Investigation...
Hawaii Agricultural Development Corporation (ADC) - Legislative Investigation...
 
Hawaii Agriculture - Dammed If You Do, Dammed If You Don't - The Fork in the ...
Hawaii Agriculture - Dammed If You Do, Dammed If You Don't - The Fork in the ...Hawaii Agriculture - Dammed If You Do, Dammed If You Don't - The Fork in the ...
Hawaii Agriculture - Dammed If You Do, Dammed If You Don't - The Fork in the ...
 
Hawaii Agriculture - David Murdock - Man on a Mission Making the Pivot - The ...
Hawaii Agriculture - David Murdock - Man on a Mission Making the Pivot - The ...Hawaii Agriculture - David Murdock - Man on a Mission Making the Pivot - The ...
Hawaii Agriculture - David Murdock - Man on a Mission Making the Pivot - The ...
 
Hawaii - Working Together - Charting Hawaii's Course for a Resilient Future -...
Hawaii - Working Together - Charting Hawaii's Course for a Resilient Future -...Hawaii - Working Together - Charting Hawaii's Course for a Resilient Future -...
Hawaii - Working Together - Charting Hawaii's Course for a Resilient Future -...
 
Hawaii - Hu Honua Biomass Plant -- Henk Rogers - Blue Planet, Man On A Mission
Hawaii  - Hu Honua Biomass Plant -- Henk Rogers - Blue Planet, Man On A MissionHawaii  - Hu Honua Biomass Plant -- Henk Rogers - Blue Planet, Man On A Mission
Hawaii - Hu Honua Biomass Plant -- Henk Rogers - Blue Planet, Man On A Mission
 
Hawaii Public Utilities Commission - Young Brothers Ltd. - Delivering The Bes...
Hawaii Public Utilities Commission - Young Brothers Ltd. - Delivering The Bes...Hawaii Public Utilities Commission - Young Brothers Ltd. - Delivering The Bes...
Hawaii Public Utilities Commission - Young Brothers Ltd. - Delivering The Bes...
 
Hawaii - Mayor Mitch Roth - Freedom, Equality, and Justice for All
Hawaii - Mayor Mitch Roth - Freedom, Equality, and Justice for AllHawaii - Mayor Mitch Roth - Freedom, Equality, and Justice for All
Hawaii - Mayor Mitch Roth - Freedom, Equality, and Justice for All
 
Hawaii - Equal Justice Under The Law - Office Of The Public Defender - Advoca...
Hawaii - Equal Justice Under The Law - Office Of The Public Defender - Advoca...Hawaii - Equal Justice Under The Law - Office Of The Public Defender - Advoca...
Hawaii - Equal Justice Under The Law - Office Of The Public Defender - Advoca...
 
Hawaii - Red Hill Fuel Storage - GO NAVY - The Time is Now-The Future is Here...
Hawaii - Red Hill Fuel Storage - GO NAVY - The Time is Now-The Future is Here...Hawaii - Red Hill Fuel Storage - GO NAVY - The Time is Now-The Future is Here...
Hawaii - Red Hill Fuel Storage - GO NAVY - The Time is Now-The Future is Here...
 
Hawaii - Corona Tsunami - The Wake Up Call - Hawaii Pono`i - We Are Warriors ...
Hawaii - Corona Tsunami - The Wake Up Call - Hawaii Pono`i - We Are Warriors ...Hawaii - Corona Tsunami - The Wake Up Call - Hawaii Pono`i - We Are Warriors ...
Hawaii - Corona Tsunami - The Wake Up Call - Hawaii Pono`i - We Are Warriors ...
 
Hawaii - HART Rail Project - FTA - Welcome Aboard - Taking Charge - Breaking...
Hawaii - HART Rail Project - FTA  - Welcome Aboard - Taking Charge - Breaking...Hawaii - HART Rail Project - FTA  - Welcome Aboard - Taking Charge - Breaking...
Hawaii - HART Rail Project - FTA - Welcome Aboard - Taking Charge - Breaking...
 
HART - The Purge - The Prize - The Pivot - The Team - Great Opportunities and...
HART - The Purge - The Prize - The Pivot - The Team - Great Opportunities and...HART - The Purge - The Prize - The Pivot - The Team - Great Opportunities and...
HART - The Purge - The Prize - The Pivot - The Team - Great Opportunities and...
 
Hawaii - Unite 5 - Protect Our Workers - Labor Day 2021
Hawaii - Unite 5 - Protect Our Workers - Labor Day 2021Hawaii - Unite 5 - Protect Our Workers - Labor Day 2021
Hawaii - Unite 5 - Protect Our Workers - Labor Day 2021
 
Hawaii - John A. Burns School of Medicine - Graffiti - ID Root of the Problem...
Hawaii - John A. Burns School of Medicine - Graffiti - ID Root of the Problem...Hawaii - John A. Burns School of Medicine - Graffiti - ID Root of the Problem...
Hawaii - John A. Burns School of Medicine - Graffiti - ID Root of the Problem...
 
Hawaii - Vaccine Research - Advancing Humanity - Invest in Our Future
Hawaii - Vaccine Research - Advancing Humanity - Invest in Our FutureHawaii - Vaccine Research - Advancing Humanity - Invest in Our Future
Hawaii - Vaccine Research - Advancing Humanity - Invest in Our Future
 
Hawaii - Merck and Pfizer - Providing for Humanity - Research and Clinical Tr...
Hawaii - Merck and Pfizer - Providing for Humanity - Research and Clinical Tr...Hawaii - Merck and Pfizer - Providing for Humanity - Research and Clinical Tr...
Hawaii - Merck and Pfizer - Providing for Humanity - Research and Clinical Tr...
 
Maui County, Hawaii - Fire and Public Safety - Outthinking Wildfire - A Tribu...
Maui County, Hawaii - Fire and Public Safety - Outthinking Wildfire - A Tribu...Maui County, Hawaii - Fire and Public Safety - Outthinking Wildfire - A Tribu...
Maui County, Hawaii - Fire and Public Safety - Outthinking Wildfire - A Tribu...
 

Recently uploaded

Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

President Donald Trump - Cybersecurity - National Institute of Standards and Technology (NIST)

  • 1. PRESIDENT DONALD TRUMP CYBERSECURITY NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY As cybersecurity attacks proliferate across corporate and government networks, network segmentation and access control are becoming standard approaches for addressing the vulnerabilities inherent in today’s connected enterprise. It can be especially helpful for agencies with classifed or sensitive data sitting on internal resources, but with connections through the network to uncontrolled endpoints. Network segmentation is an approach advocated by the National Institute of Standards and Technology's Cybersecurity Framework (CSF). It involves segmenting the network into smaller network systems and separating groups of systems and networks from each other. Isolating or fltering to limit access between network segments improves security and provides better access control. [Emphasis Supplied] Feds Can Achieve Better Security Through Network Segmentation MeriTalk. July 9, 2018, accessed August 13, 2018 https://www.meritalk.com/articles/feds-can-achieve-better-security-through-network-segmentation/ __________________________________________________________ SCIENCE & TECHNOLOGY HIGHLIGHTS TRUMP ADMINISTRATION – YEAR ONE https://www.whitehouse.gov/wp-content/uploads/2018/03/Administration-2017-ST-Highlights.pdf We're on the verge of new technological revolutions that could improve, virtually, every aspect of our lives, create vast new wealth for American workers and families, and open up bold, new frontiers in science, medicine, and communication. President Donald J. Trump
  • 2. CYBERSECURITY & GOVERNMENT IT SERVICES Our goal is to lead a sweeping transformation of the Federal Government's technology that will deliver dramatically better services for citizens and stronger protection from cyberattacks. On April 28, 2017, President Trump signed Executive Order 13794 – Establishment of the American Technology Council. The Administration worked with Congress to pass the 2018 National Defense Authorization Act, which included a section on modernizing government technology. [President Trump demonstrated his commitment to the importance of Federal scientifc exploration by requesting $151.2 billion for Federal R&D investment in the FY 2018 budget – a 2% increase over FY 2017. Furthermore, the President's FY 2018 Budget Request would result in the highest percent of the budget for the conduct of R&D since the FY 2014 Budget Request. In August, OSTP and OMB released the annual Administration R&D budget priorities for FY 2019, advising agencies to prioritize basic and early-stage applied research, the foundation for the development of transformative commercial products and services.] Source: The White House. Empowering Americans to Innovate: Science and Technology Highlights Since Inauguration. March 7, 2018. https://www.whitehouse.gov/articles/science-technology-in-the-frst-year-of-the- trump-administration/ On May 11, 2017, President Trump signed Executive Order 13800 – Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. On December 5, the National Institute for Standards and Technology released the second draft of the proposed update to the Framework for Improving Critical Infrastructure Cybersecurity. __________________________________________________________
  • 3. ANALYSIS OF NETWORK SEGMENTATION TECHNIQUES IN CLOUD DATA CENTERS By Ramaswamy Chandramouli, Ph.D, M.S., B.S. Supervisory Computer Scientist and Director of NIST Personal Identity Verifcation Program, Computer Security Division, Information Technology Laboratory, National Institute of Standards & Technology. https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=918440 [Excerpt] Cloud Data centers are predominantly made up of Virtualized hosts. The networking infrastructure in a cloud (virtualized) data center, therefore, consists of the combination of physical IP network (data center fabric) and the virtual network residing in virtualized hosts. Network Segmentation (Isolation), Trafc fow control using frewalls and IDS/IPS form the primary network-based security techniques with the frst one as the foundation for the other two. In this paper, we describe and analyze three generations of network segmentation techniques – Virtual Switches & Physical NIC-based, VLANbased & Overlay- based. We take a detailed look at the overlaybased virtual network segmentation and its characteristics such as scalability and ease of confguration. With the increasing adoption of cloud services by large enterprises that have to host multi-tier applications, the data center network administrators need a fexible virtual networking topology with capability to obtain the required isolation through network segmentation. At the same time, it is necessary that these virtual network segments span multiple, arbitrary IP subnets of the data center and also several hypervisor clusters. As of now, the only virtual networking technology that can provide these capabilities without a great deal of physical network reconfguration or addition of networking resources is the overlay-based virtual networking. This degree of independence between the virtual networks and the physical networks provided by overlaybased techniques also provides the scalability and confguration ease that are needed for maintaining the logical network segmentation within large data centers. The foundational security for IaaS cloud consumer workloads thus becomes an economically and operationally viable proposition.
  • 4. DOES NETWORK MICRO-SEGMENTATION PROVIDE ADDITIONAL SECURITY? By Steve Jaworski, GSEC and Mohammed Haron, GSEC SANS Institute September 8, 2018, accessed August 13, 2018 https://www.giac.org/paper/gsec/5496/network-micro-segmentation-provide-additional-security/11034 Network segmentation is a concept of taking a large group of hosts and creating smaller groups of hosts that can communicate with each other without traversing a security control. The smaller groups of hosts each have defned security controls, and groups are independent of each other. Network micro- segmentation takes the smaller group of hosts by confguring controls around individual hosts. The goal of network microsegmentation is to provide more granular security and reduce an attacker’s capability to easily compromise an entire network. If an attacker is successful in compromising a host, he or she is limited to only the network segment on which the host resides. If the host resides in a micro-segment, then the attacker is restricted to only that host. Network segmentation is a defense in depth strategy that helps prevent attackers from moving laterally within an organization’s network. (AlgoSec, n.d.) A lateral movement within a network is commonly called east-west trafc. Segmentation creates choke points within the network and is separated by a security control and is also a way to reduce the attack surface of an organization (Northcutt, n.d.). Breaking up a network with VLANs and Layer 3 network interfaces also segments the network but will not provide efective security. By default, the network will permit all trafc between VLANS. Access Control Lists (ACLs) on the Layer 3 network interfaces can be used to restrict trafc, but they are limited in their capabilities. The ACL's on routers are not the same as frewall rules, depending on the network vendor they may slow down trafc, and they can become too complex to manage if too many exceptions are required. Layer 3 ACLs are most efective when they are small and used for explicit denies.
  • 5. 4 LAYERS OF ENTERPRISE SECURITY By Patrick Marshall. GCN Apr 12, 2018, accessed August 13, 2018 https://gcn.com/articles/2018/04/12/cyber-tools.aspx The new cyber landscape. Apr 13, 2018 https://gcn.com/articles/2018/04/13/cyber-landscape.aspx Although threats to government IT security continue unabated, agencies do have some mature solutions for protecting enterprise assets from malicious intruders. With tight budgets the only constant, agencies face a fast-evolving range of challenges – from securing hybrid networks and authenticating users who connect via mobile devices and the cloud. For IT managers at government agencies, it might seem like a perfect storm is gathering: tight budgets and demands to upgrade aging network infrastructure; mandates to move applications into the cloud and beyond their traditional network security perimeter; calls to support rapidly growing numbers of users on mobile devices; and, above all, warnings from intelligence agencies to expect ever greater cyberthreats. Tools that verify trafc, isolate networks, prevent data loss and protect the endpoints are helping agencies lock down government data. “We are constantly fguring out how to whack the next mole and beat the bad guys at the next level of the game,” said Susannah Schiller, deputy CIO at the National Institute of Standards and Technology. “It is a constantly evolving thing, and it has been getting worse every year.” According to agency staf, vendors and analysts alike, there has been a major shift in network security strategy. Trying to contain data behind network perimeters secured by frewalls and other tools is giving way to data-centric and user-centric strategies that aim to protect data wherever it resides – whether it's within the agency's perimeter, in the cloud or on a mobile device.
  • 6. “As we move to more of a distributed data mode, with users on nongovernment-furnished mobile devices, we have to move the security protection closer to the asset, and we have to tie security policies to the user,” said Chris Townsend, Symantec's vice president for federal. “That approach aligns more to a risk mitigation strategy where we quantify the value of the assets [and] risk of loss and then align scarce security resources accordingly.” While pushing the federal government in that direction, the 2017 “Report to the President on Federal IT Modernization” noted that “agencies have attempted to modernize their systems but have been stymied by a variety of factors, including resource prioritization, ability to procure services quickly, and technical issues.” No one advocates abandoning the traditional protections – frewalls and secure routers, network analytic and intruder detection tools, for example. However, new strategies are helping agencies verify trafc, isolate networks, prevent data loss and protect the endpoints in support of locking down government data. For efective network segmentation, a dedicated security control should exist between hosts and networks. Network segmentation does not always reduce the attack surface enough. Network micro-segmentation is a more granular approach to preventing lateral movement between hosts where it is more challenging to use traditional hardware security controls (SDX Central, n.d.). One network segment could still contain hundreds, if not thousands of hosts. If a malicious actor compromises a host in a segment, the goal of network microsegmentation is to prevent or detect the compromise of additional systems. By limiting the attacker's scope, the security team should have a better chance of detecting and remediating the breach, limiting further damage. __________________________________________________________
  • 7. MICROSEGMENTATION One increasingly popular technology that can help with implementing a zero- trust model is microsegmentation, which uses software-defned virtual networks to create myriad isolated networks. Whereas standard networks use frewalls and routers to segment trafc for an entire organization, microsegmentation might defne anetwork that is accessible only to single workgroup or even a single individual. Bill Rowan, vice president of federal sales at VMware, compared the concept to that of a submarine built with various compartments so that a breach in one compartment would not food the others. “That’s where we are taking the approach of microsegmenting networks,' he said. According to Rowan, a well-designed microsegmentation solution imposes no noticeable cost in terms of network performance and even simplifes some network chores, such as moving an application from one virtual network to another. [Emphasis Supplied] “Because we are separating the physical from the logical, I can simply build that same network topology on the other side,” he said. “Heretofore, I had to go back in and change all my network settings to make sure the application could efectively communicate.” Townsend, however, said it's not clear whether microsegmentation will be viable. His main concern is scalability. “The idea is that for every virtual application and every virtual network segment, you have a security policy that follows that data or that portion of the network,” he said. That could overwhelm an agency's IT team. “Right now, our federal customers are struggling from an operations standpoint to manage their security environment as it stands today,” he added. [Emphasis Supplied]