{"title":"Transitioning security software and hardware systems for use on unsecured or externally connected networks","authors":"R. Kulchyski","doi":"10.1109/CCST.2016.7815721","DOIUrl":null,"url":null,"abstract":"The threat of online attacks has become a growing concern in technological environments across the globe. As is quite obvious, having a physical security system tampered with maliciously over an internet connection can be an enormous threat. Historically many security sensor companies have avoided this concern by leaving their security networks isolated from the external internet Presently we approach an age where operating an isolated network on a client site will become less and less appealing to the client With the added benefits of monitoring from their own network, use of existing infrastructure, remote connectivity options and the threat and or fear of an uncontrolled network on their site, many customers have a desire to have their security system on their own monitored, externally connected network An exploration is taken into the process of converting a product using its isolation for network security, into a product that can be dropped with confidence into an externally connected or potentially unsecure network environment. A range of concepts are covered at varying depths, including testing tools for getting started, encryption and reverse engineering, penetration testing, tools used for adding security and the difficulties and logistics of keeping patches up to date and virus definitions current.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"120 1","pages":"1-3"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2016.7815721","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The threat of online attacks has become a growing concern in technological environments across the globe. As is quite obvious, having a physical security system tampered with maliciously over an internet connection can be an enormous threat. Historically many security sensor companies have avoided this concern by leaving their security networks isolated from the external internet Presently we approach an age where operating an isolated network on a client site will become less and less appealing to the client With the added benefits of monitoring from their own network, use of existing infrastructure, remote connectivity options and the threat and or fear of an uncontrolled network on their site, many customers have a desire to have their security system on their own monitored, externally connected network An exploration is taken into the process of converting a product using its isolation for network security, into a product that can be dropped with confidence into an externally connected or potentially unsecure network environment. A range of concepts are covered at varying depths, including testing tools for getting started, encryption and reverse engineering, penetration testing, tools used for adding security and the difficulties and logistics of keeping patches up to date and virus definitions current.