Page 96 - Cyber Defense eMagazine April 2021 Edition
P. 96

The public sector saw some of the largest numbers of attacks in history, and government
                     agencies are looking for the best ways to combat cyber threats. A cyberattack can take down an
                     entire system, destroy valuable equipment, leave government agencies vulnerable, and put
                     national security at risk.


                     According to the 2020 Verizon Data Breach Investigations Report, the government suffered from
                     6,843 security incidents from 2019 to 2020, 346 with confirmed breaches. While threat origins are
                     numerous, miscellaneous human-based errors lead the pack in terms of cause, according to the
                     report.


                     Hackers are getting smarter with their solutions and innovating faster. A network breach can be
                     detrimental, but east-west attacks can be even more damaging to networks. This type of attack
                     travels from a compromised host or network to a more valuable one, making it especially difficult
                     to determine where the attacker has been and what they have touched.

                     In an attempt to protect the most valuable and sensitive information, agencies rely on isolated
                     networks to protect mission-critical data. The most effective solutions implement air-gap
                     networks, ensuring that advanced signaling attacks that may compromise a desktop have no
                     way of propagating to more sensitive systems as there simply is no route from one network to the
                     other.


                     These air-gaps can still be breached, especially if users share computer peripherals between
                     multiple systems. Embedded memory in these peripherals can be utilized as an unwitting conduit
                     to bridge the air-gap and expose sensitive systems to damaging attacks.

                     Preserving Air-Gap Isolation

                     Peripherals can be safely shared without compromising air-gap isolation through the use of
                     secure keyboard-video-mouse (KVM) switching devices. Secure KVMs are certified by the
                     National Information Assurance Partnership (NIAP), which ensures that these secure KVMS are
                     safe for use across security domains on government networks. The latest standard, released in
                     2019, provides enhanced vulnerability protection while allowing manufacturers the flexibility to
                     address more user pain points.

                     While KVMs have been around for years, their use and functionality have remained static and
                     inflexible.  With the flexibility built into the new NIAP Protection Profile for Peripheral Sharing
                     Devices version 4.0 standard, secure KVMs can now innovate to deliver secure peripheral
                     sharing with an elevated user experience. Secure KVMs will soon be available with peripherals
                     that enhance user awareness and control while eliminating clutter and complexity on the desk.
                     Further, universal video format support will allow the same KVM to be used across multiple
                     deployment scenarios without the need for external audio/video converters or adaptors,
                     minimizing compatibility issues, deployment time and unbudgeted costs.

                     Government agencies need to implement secure KVM solutions to protect against vulnerabilities
                     at the desktop and maintain air-gap isolation between secure and non-secure networks – but also
                     to enable a productive, flexible workspace. By utilizing solutions that emphasize user
                     experience and prioritize future-ready technology, agencies can deliver critical security with
                     limited compromises for stakeholders. Belkin’s 4.0 Secure KVM solutions give government
                     agencies the flexibility to design their environments and equip employees with the advanced
                     functionalities and an advanced user experience.








             96    Cyber Defense eMagazine – April 2021 Edition
                   Copyright © 2021, Cyber Defense Magazine.  All rights reserved worldwide.
   91   92   93   94   95   96   97   98   99   100   101