<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://www.opensecurity.at/search_rss">
  <title>Open Security</title>
  <link>http://www.opensecurity.at</link>

  <description>
    
            These are the search results for the query, showing results 11 to 14.
        
  </description>

  

  

  <image rdf:resource="http://www.opensecurity.at/logo.png"/>

  <items>
    <rdf:Seq>
      
        <rdf:li rdf:resource="http://www.opensecurity.at/news/opensecurity-1-0-released-1"/>
      
      
        <rdf:li rdf:resource="http://www.opensecurity.at/news/malware-and-threat-protection-in-opensecurity"/>
      
      
        <rdf:li rdf:resource="http://www.opensecurity.at/news/further-development-of-opensecurity"/>
      
      
        <rdf:li rdf:resource="http://www.opensecurity.at/news/data-information-and-system-security"/>
      
    </rdf:Seq>
  </items>

</channel>


  <item rdf:about="http://www.opensecurity.at/news/opensecurity-1-0-released-1">
    <title>OpenSecurity 1.0 released</title>
    <link>http://www.opensecurity.at/news/opensecurity-1-0-released-1</link>
    <description></description>
    <content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p>OpenSecurity Version 1.0, released as Beta Software, fulfils a majority of the requirements defined within the scope of the project. Still open requirements have been addressed and are available as concepts, which can be implemented through specific extensions to the OpenSecurity framework. Thus an optimal adaptation to individual customers’ needs and infrastructure is possible. <a href="http://www.opensecurity.at/download">Link to Download</a></p>
<p style="text-align: center; "><img src="http://www.opensecurity.at/newsletter/bilder/opensecurity-logo" title="OpenSecurity Logo" class="image-inline" alt="OpenSecurity Logo" /></p>
<p>The <a href="http://www.opensecurity.at/use-cases/secure-usb-1" class="internal-link"><i>Secure USB</i></a> and <a href="http://www.opensecurity.at/use-cases/secure-web-browsing-1" class="internal-link"><i>Secure Web Browsing</i></a> features have been integrated with an existing Windows-interface and with Windows user workflows. Data import and -export occur via the Windows Explorer. The Secure Browser opens as a window on the desktop and persists user bookmarks. In both mechanisms the user does not need to deal directly with the SecureVirtualMachine. If necessary the OpenSecurity user is being guided through any required steps by tray-notifications and dialogues.</p>
<p>OpenSecurity was tested under normal office conditions by the stakeholder IKT Linz. Additional requirements on the existing infrastructure could be modularly and flexibly implemented.</p>
<h3>Secure USB</h3>
<p>The current version of OpenSecurity allows data import from both unencrypted and encrypted USB-sticks. Imported data is automatically (and potentially centrally, if so configured) virus- and malware scanned. If a potential virus or malware is detected by the system, access to the data is denied. Potential viruses/rootkits that automatically activate upon access, can – if they are able to run on a Linux-system at all – only harm the used disposable SecureVirtualMachine, and not the user workstation.</p>
<p>It is also possible to export data to a USB-stick. In this case the user is requested to initialise the stick with an encrypted container. This way OpenSecurity prevents data loss by prohibiting export to devices other than encrypted USB-sticks.</p>
<p>In addition, it is possible for all data transactions to be recorded on a central logging- or monitoring server. In this way, potential data losses can be tracked.</p>
<p><img src="http://www.opensecurity.at/newsletter/bilder/os-secure-file/@@images/a17cb91d-698f-407e-befb-0512f0de1813.png" title="OS Secure File" class="image-inline" alt="OS Secure File" /></p>
<h3>Secure Web Browsing</h3>
<p>By clicking the desktop- or tray-icon, the user can start the Secure Browser. In OpenSecurity Version 1.0 the open browser Chromium is being used. The browser is executed within a SecurityVirtualMachine, which is graphically integrated with the Windows-interface. It opens as a standard browser window in the usual desktop environment.</p>
<p>Also in this case a virus or malware attack originating from the browser can only affect the SecurityVirtualMachine and cannot contaminate the user workstation. Data from the browsing session can only be transferred via similar mechanisms and security measures as in the USB data import/export feature.</p>
<p><img src="http://www.opensecurity.at/newsletter/bilder/os-secure-browsing/@@images/2a7a0846-c9c5-4fd7-b743-e1e2d29c410f.png" title="OS Secure Browsing" class="image-inline" alt="OS Secure Browsing" /></p>]]></content:encoded>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Michela Vignoli</dc:creator>
    <dc:rights></dc:rights>
    
      <dc:subject>English</dc:subject>
    
    <dc:date>2014-11-28T08:55:00Z</dc:date>
    <dc:type>News Item</dc:type>
  </item>


  <item rdf:about="http://www.opensecurity.at/news/malware-and-threat-protection-in-opensecurity">
    <title>Malware and Threat Protection in OpenSecurity</title>
    <link>http://www.opensecurity.at/news/malware-and-threat-protection-in-opensecurity</link>
    <description></description>
    <content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p>OpenSecurity defines a process that allows users to communicate with non-institutional networks by means of cryptography and virtualised isolation, as well as malware and threat classification.</p>
<p>IKARUS Security Software GmbH is a member of the OpenSecurity team and is primarily responsible for classification of data. For this IKARUS employs its own proprietary key technology for malware and threat detection. In addition to classification technologies OpenSecurity also employs IKARUS server applications developed for the scalable and highly performant server area.</p>
<p>OpenSecurity is a system with very modular design, which convinces by isolation and encapsulation. In addition to these design aspects it is a project goal to use primarily Open Source products to reduce integration costs. While IKARUS cannot license their products with an open license, they do support the integration of IKARUS software products with Open Source environments.</p>
<p>IKARUS sustains OpenSecurity with their technologies and know-how gained in more than 25 years’ experience in the sector. Due to the defined communication process OpenSecurity is complementary to conventional IKARUS products and adds the existing portfolio. IKARUS sees following benefits for institutions employing OpenSecurity:</p>
<p>1.    Less effort due to centrally administrated scanning of devices;</p>
<p>2.    Safe interaction with the internet without fear of being infected;</p>
<p>3.    Minimal use of resources by client devices;</p>
<p>4.    Low integration costs due to the Open Source approach.</p>]]></content:encoded>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Michela Vignoli</dc:creator>
    <dc:rights></dc:rights>
    
      <dc:subject>English</dc:subject>
    
    <dc:date>2014-05-06T09:30:00Z</dc:date>
    <dc:type>News Item</dc:type>
  </item>


  <item rdf:about="http://www.opensecurity.at/news/further-development-of-opensecurity">
    <title>Further development of OpenSecurity</title>
    <link>http://www.opensecurity.at/news/further-development-of-opensecurity</link>
    <description>The project partners AIT Austrian Institute of Technology GmbH and X-Net Services GmbH will pursue OpenSecurity in terms of cooperation and bring it to the market as a product.</description>
    <content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p>The consortium plans to bring OpenSecurity as a product to the market. In addition the consortium plans to develop the prototype further on a European level by involving international experts, research institutes, and companies. In an EU-project the consortium hopes to extend the current network and to bring the subject matter closer to Big Data. The aim is to strengthen Europe’s competence in security related areas and to create a Europe-wide unified standard. In this manner, public authorities and institutions managing sensitive private data should be able to secure maximum protection.</p>
<p>The project partners AIT Austrian Institute of Technology GmbH and X-Net Services GmbH will pursue OpenSecurity in terms of cooperation and bring it to the market as a product. To this end the prototype will be adapted to the needs of the stakeholders (i.e. public institutions and commercial large scale enterprises).</p>
<table align="center" class="invisible">
<tbody>
<tr>
<th><img class="image-inline" src="../resolveuid/9dcc14b26c884617af30cce469fd2d7a/@@images/image/mini" /></th><th><img class="image-right" src="../resolveuid/25b2133605a042ea952b462a2c68432a/@@images/image/thumb" /></th>
</tr>
</tbody>
</table>
<p>Thanks to the complementary strengths of the project partners AIT Austrian Institute of Technology GmbH and X-Net Services GmbH, further development of OpenSecurity in terms of a cooperation model is an ideal basis for the success of the Open Source based solution.</p>
<ul>
<li>X-Net Services GmbH has high level expertise in the implementation of large projects and especially in First and Second Level Support, which plays a major role in such projects. X-Net Services GmbH is in direct contact with customers ensuring a smooth cooperation and system maintenance. If required, X-Net Services GmbH can also adapt and newly implement OpenSecurity solutions within their sphere of competence.</li>
<li>AIT Austrian Institute of Technology GmbH acts as integrator with good contacts to industry and a solid reputation. Due to its large number of highly qualified developers, AIT Austrian Institute of Technology GmbH can acquire and promote large projects, and adapt OpenSecurity to the customers’ needs.</li>
</ul>]]></content:encoded>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Michela Vignoli</dc:creator>
    <dc:rights></dc:rights>
    
      <dc:subject>English</dc:subject>
    
    <dc:date>2014-11-28T09:30:00Z</dc:date>
    <dc:type>News Item</dc:type>
  </item>


  <item rdf:about="http://www.opensecurity.at/news/data-information-and-system-security">
    <title>Data, Information and System Security</title>
    <link>http://www.opensecurity.at/news/data-information-and-system-security</link>
    <description></description>
    <content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p>Information and Communication Technologies are being increasingly used in almost all social and economic areas. This has led to extensive changes during the last decades, e.g. in terms of optimising production processes or establishing new distribution models. The thereby created diverse and more flexible configuration possibilities are paralleled by a loss of control and security. That is why numerous security solutions have been developed to support this sector. The aim of IT-security is to protect organisations and humans from harm through failure, manipulations or abuse, which notably occurs in case of information- and data loss.</p>
<table align="center" class="invisible">
<tbody>
<tr>
<th><img class="image-inline" src="../resolveuid/a0c2d43bfb554d0ebffaffc8fa6318fb/@@images/image/preview" /></th>
</tr>
<tr>
<td style="text-align: right; ">
<p>Image by <span class="meta-field photo-desc"><a href="http://www.perspecsys.com" rel="nofollow">www.perspecsys.com</a> License: CC-BY-SA<br /></span></p>
</td>
</tr>
</tbody>
</table>
<p>In a nutshell, IT-security is about safe interaction with information and data. Risks and threats for IT systems always rise at the level of information or at transition points and interfaces where information is transformed from one form into another. An example is user authentication by password entry. A professional IT-security management must ensure protection of IT systems and information during their whole lifecycle, from data creation to editing, transfer, and storage, and finally to deletion.</p>
<p>The Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik - BSI) in Germany lists five different threat categories in their baseline security manual. In general all ofthese threats can be attributed to a missing or inadequate IT-security concept. This comprises in particular IT-infrastructure security (e.g. server, network, computer, and mobile devices), building security, data security, computer virus protection, communication security (e.g. telephone, fax, e-mail, and internet), and contingency plans.</p>
<p>To minimise the risks, IT-security requires a comprehensive analysis of the organisation’s IT-structures and IT-systems. In addition to the exact definition of the devices and resources to be included (e.g. IT-systems, IT-infrastructure, processes) risk analysis is a key feature in order to establish the IT-security concept as substantial part of a risk management process. Such an IT-security concept must describe responses to potential risks and has to meet other requirements, in particular performance targets and quality or architecture requirements.</p>]]></content:encoded>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Michela Vignoli</dc:creator>
    <dc:rights></dc:rights>
    
      <dc:subject>English</dc:subject>
    
    <dc:date>2014-11-28T09:10:00Z</dc:date>
    <dc:type>News Item</dc:type>
  </item>




</rdf:RDF>
