Aselsan, has developed the most reliable information-sharing system - Fashion - Style - Trendy

Wednesday, December 22, 2010

Aselsan, has developed the most reliable information-sharing system

ASELSAN high level of security between the official institutions, which allows the most reliable information sharing and communication, "2180 Virtual Air Space-Sahab," now has developed a new system.

ASELSAN high level of security between the official institutions, which allows the most reliable information sharing and communication, "2180 Virtual Air Space-Sahab," now has developed a new system.

Aselsan 2180 Virtual Air Space (Sahab), with different security level networks (Cross Domain Networks) have a high level of security without violating the security level of the network with each other as a system solution that provides secure exchange of information, as well as information leakings also helps prevent Wikileaks documents.

Virtual Air Space system, real-time field service / offering assistance, and to confront the security threats on the agenda was designed to eliminate them. External network (Internet) and the corporate network (internal network) deployed between the system itself and thus does not use IP-based communication between two network provides a high level of security is a "virtual air gap (virtual air gap) is the limit. This feature of the system security level is high (critical), who served as corporate networks, connecting to secure networks for the low level of security with a security solution that provides desirable.

2180 Virtual Air Space routed directly to a protocol with a high level of security is preventing access to the network. Sahab, a customized operating system on them in the inner and outer drive unit consists of two data streams from the server and used jointly on a common drive unit to read / write is taking place in the form.

VIRTUAL INFORMATION air space "INSTANT AND LOCK"

Related institutions / organizations in accordance with other security measures to be taken by, and Sahab him out of the system in addition to other security technologies in a variety of external and internal network is also possible on the hosting. This situation does not interfere with the operation of the system as designed, the deployment of the system on the corporate network or the organization does not pose a problem in terms of the other security measures.

2180 Virtual Air Space system is a three-tier structure. Disk access at the bottom, the core layer of encryption and digital signature operations, while the middle layer of the message in the messaging data packets through the removal and / or re-creation of packages with the management functions of messaging, alarm and log record keeping is carried out. At the top is more than one application layer protocol supported.

Sahab security advantages offered by the system are as follows: "Internal and external servers working, customized, and a security-enhanced Linux 'operating system kernel is located.
Source: Wardom http://www.wardom.org/showthread.php?t=447663

Only two known to the server via a shared drive to a unique shopping data packet exchange protocol is carried out between the internal and external servers.
Internal and external servers, shared disk is being formatted in a way the original unit. In addition, information on the disc is written and so instantaneous, and as an encrypted disk unit seized for any reason, the studies on the possible acquisition of knowledge with a healthy does not happen.

The system of internal and external network interfaces using the IP protocol that may harmful and / or unnecessary traffic monitoring, filtering, and in order to be registered in the system has internal and external firewall feature. "

INTRUSION DETECTION FEATURE ...

Sahab, firewall, with the system that accesses the network traffic in order to receive and record barınabilecek prevent possible attacks inside and outside the system is equipped with network and system-based intrusion detection.

Internal and external systems, all critical files and directories, an integrity checker controlling unauthorized changes to the internal and external security component that stores the encryption key information necessary for processing the case of a hardware security component.
Source: Wardom http://www.wardom.org/showthread.php?t=447663

Sahab system, transmitted over shared memory between components of the external and internal security authentication (authentication) and viability (heartbeat) messaging feature, as well as on external and internal security components obscurity / diversionary (obfuscated) operations done.

Placed on the exterior and interior safety components of originality (authenticity) information, has a special message ordering protocol.

In the system, monitoring / logging, and system integrity checking mechanisms are being held with the relevant records.

With the development of the network structure of communication networks against cyber attacks has become more open, more complicated security policies as a result of this application, indicating the need arose, experts, information sharing as a realization of a safe and healthy, well-designed architecture, an information network as well as the appropriate communication protocols and encryption methods The use of information selection and configuration of network devices, firewall, anti-virus software and intrusion detection system, known as control tools, in addition to the Virtual Air Space system ASELSAN 2180, hosted within the field of network security and access control features a brand new system with the stress in this area .

No comments:

Post a Comment