We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byIndia Lady
Modified over 2 years ago
Gulf Computers Presentation Vulnerability Assessment: Steps to a More Secure Network Securing Your Network Fethi Amara –
6/1/ © Gulf Computers L.L.C. Gulf Computers Professional Services s Provider of multivendor, data network consulting services s Reference list in the region includes: Standard Chartered Bank (Dubai) Emirates Airlines / DNATA Group of Companies (Dubai) Sharjah Municipality (Sharjah) Town Planning Department (Abu Dhabi) Civil Defense (Abu Dhabi) GEC Marconi (Abu Dhabi) Ericsson (Oman) Sultan Qaboos University (Oman) Oman Refinery Company (Oman) Occidental (Dubai and Qatar) QAFCO (Qatar) Abdul Latif Jameel (Saudi Arabia) etc.
6/1/ © Gulf Computers L.L.C. The Twenty Most Critical Internet Security Vulnerabilities s s The SANS Institute (SysAdmin, Audit, Network, Security) s s The NIPC (National Infrastructure Protection Center) s s The FBI
6/1/ © Gulf Computers L.L.C. Top 10 Vulnerabilities to Windows Systems s s Internet Information Services (IIS) s s Microsoft Data Access Components (MDAC) -- Remote Data Services s s Microsoft SQL Server s s NETBIOS -- Unprotected Windows Networking Shares s s Anonymous Logon -- Null Sessions s s LAN Manager Authentication -- Weak LM Hashing s s General Windows Authentication -- Accounts with No Passwords or Weak Passwords s s Internet Explorer s s Remote Registry Access s s Windows Scripting Host
6/1/ © Gulf Computers L.L.C. Top 10 Vulnerabilities to Unix Systems s s Remote Procedure Calls (RPC) s s Apache Web Server s s Secure Shell (SSH) s s Simple Network Management Protocol (SNMP) s s File Transfer Protocol (FTP) s s R-Services -- Trust Relationships s s Line Printer Daemon (LPD) s s Sendmail s s BIND/DNS s s General Unix Authentication -- Accounts with No Passwords or Weak Passwords
6/1/ © Gulf Computers L.L.C. The 7 Top Management Errors that Lead to Computer Security Vulnerabilities s s Number Seven: Pretend the problem will go away if they ignore it. s s Number Six: Authorize reactive, short-term fixes so problems re-emerge rapidly s s Number Five: Fail to realize how much money their information and organizational reputations are worth. s s Number Four: Rely primarily on a firewall.
6/1/ © Gulf Computers L.L.C. The 7 Top Management Errors that Lead to Computer Security Vulnerabilities s s Number Three: Fail to deal with the operational aspects of security: make a few fixes and then not allow the follow through necessary to ensure the problems stay fixed s s Number Two: Fail to understand the relationship of information security to the business problem -- they understand physical security but do not see the consequences of poor information security. s s Number One: Assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job.
6/1/ © Gulf Computers L.L.C. Number of Vulnerabilities and incidents reported (According to Incidents reported in Year Q-2Q 2003 Incidents21,75652,65882,09476,404 Year Q-2Q 2003 Vulnerabi lities 1,0902,4374,1291,993 Vulnerabilities reported in
6/1/ © Gulf Computers L.L.C. The Virus Problem: major catastrophes s s 45 million users worldwide affected by LoveBug (Computer Economics, May 2000) s s LoveBug cost companies an estimated US$10 billion s s Dell stopped production for five days due to FunLove s s 32,000 copies of Melissa hit one company in 45 minutes s s No one is safe l l Microsoft, FBI, Houses of Parliament, Barclays, BT Lost productivity, but also loss of reputation
6/1/ © Gulf Computers L.L.C. The LoveBug world spread First 24 hours
6/1/ © Gulf Computers L.L.C. Vulnerability Scanning Definition s s Testing for areas that allow unauthorized access to networks, systems, and applications l l From outside enterprise l l From internal sources
6/1/ © Gulf Computers L.L.C. Frequency and Damage of Security Threats/Attacks
6/1/ © Gulf Computers L.L.C. Vulnerability Sources s s Networks l l Firewalls l l Devices, e.g., routers, switches s s Systems l l Servers l l Operating system services s s Applications l l Configuration problems l l Design flaws
6/1/ © Gulf Computers L.L.C. Why Conduct Vulnerability Scans? s Obvious l Find vulnerabilities s Not so obvious l Test intrusion detection l Test incident response l Test managed security provider s IDS is no substitute l Speed of attack problem, HoneyNet Project l Limited scope
6/1/ © Gulf Computers L.L.C. Vulnerability Targets s Permissible systems s All access points including l Wireless l Dial-up l VPNs
6/1/ © Gulf Computers L.L.C. Vulnerability Scan Steps s Multiple scanners for different targets l Firewalls l Web servers l Wireless network l Lotus Notes l Novell Netware l Many more s Attack signature database l Must be updatable s Identifies potential vulnerabilities l False positives expected
6/1/ © Gulf Computers L.L.C. Scanner Characteristics s Specialization - specific target s Number of tests - multiple targets s Reporting s Fix information s False positives s Other features, e.g., client/server
6/1/ © Gulf Computers L.L.C. Open Source vs. Commercial Scanners Free Frequent updates More vulnerabilities Can be customized Easy to install/operate Enhanced report generation Fully supported Nessus Sara Cybercop ISS Limited support Lots of false positives Linux expertise needed Cost can be high Cost of support Pros Cons Examples Open Source Commercial
6/1/ © Gulf Computers L.L.C. How Long Does it Take? s It depends l Number of subnets l Number of hosts l Blocks in place –UDP –Firewalls play dead mode s Thoroughness
6/1/ © Gulf Computers L.L.C. Conducting the Scan s Arrange time for scan l Delay start to avoid scapegoating s Special scan for potential trouble systems s Be available 24x7
6/1/ © Gulf Computers L.L.C. Data Analysis s Challenges l Lots of false positives l Meaningful data not always easy to identify s Know your audience l Severity classification l Department focus s Reporting results l Common Vulnerability and Exposures (CVE)
6/1/ © Gulf Computers L.L.C. Report Styles
6/1/ © Gulf Computers L.L.C. Hidden Benefits s Study how security is implemented s Find unknown hosts s Learn about change control process s Good basis for a security policy if one doesn't exist s Policy enforcement
6/1/ © Gulf Computers L.L.C. s s Scan for vulnerabilities in networks, systems & applications s s Choose the right target and matching scanner(s) s s Conduct scan in defined timeframe s s Sift data for relevancy The Bottom Line
6/1/ © Gulf Computers L.L.C. Gulf Computers Professional Security Services s Evaluation l Penetration testing, assessment, audit, vulnerability analysis s Strategic l Incident response, programs, policies, training s Technical l PKI, VPNs, Firewalls, IDS, AAA integration, PDIO
6/1/ © Gulf Computers L.L.C. Question and Answer
(n)Code Solutions Presentation on the importance of a Secure Technology Infrastructure.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Operating System Security Fundamentals Dr. Gabriel.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 2 Operating System Security Fundamentals.
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Installation & management of SUSE.
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
25 seconds left….. 24 seconds left….. 23 seconds left…..
Application Security Best Practices At Microsoft Ensuring the lowest possible exposure and vulnerability to attacks Published: January 2003.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Module 14: Configuring Server Security Compliance.
System Security Scanning and Discovery Chapter 14.
Jeopardy Topic 1Topic Q 1Q 6Q 11Q 16Q 21 Q 2Q 7Q 12Q 17Q 22 Q 3Q 8Q 13Q 18Q 23 Q 4Q 9Q 14Q 19Q 24 Q 5Q 10Q 15Q 20Q 25 Final Jeopardy.
CSCE 815 Network Security Lecture 24 Your Jail and HoneyNets April 17, 2003.
Change Management on the Cheap: Tortoise SVN and Ant Two Tools for your Applications Implementation Toolkit Joe Tseng North Slope Solutions
Firewalls Steven M. Bellovin https://www.cs.columbia.edu/~smb Matsuzaki ‘maz’ Yoshinobu 1.
We will resume in: 25 Minutes We will resume in: 24 Minutes.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Banking Services AVAILABLE FOR A SMALL BUSINESS. BANKING SERVICES 2 Welcome 1. Agenda 2. Ground Rules 3. Introductions.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Chapter 9 E-Security. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security Designing for Security.
Retina Network Security Scanner By Ajith U Kamath Project.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Computer Concepts – Illustrated 8 th edition Unit E: Networks and Connecting to the Internet.
Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Its alright to laugh for who is allowed in. Its alright to laugh for who is allowed in. HiPath SIcurity Card Manager Smartcard Management and Personalization.
© Prentice Hall CHAPTER 15 Managing the IS Function.
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
1 1 The World of the Modern Systems Analyst and as a Project Manager Lecture 1.
©Ian Sommerville 2007Change Management Slide 1 Software change management.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
ABC Technology Project Mrs. Kiddle. ABCs of Technology Word 1 Word 2 Word 3 Word 4 Word 5 Word 6 Word 7 Word 8 Word 9 Word 19 Word 20 Word 21 Word 22.
Information Security Management Chapter “We Have to Design It for Privacy and Security.” Copyright © 2014 Pearson Education, Inc. Publishing.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
1 CHALLENGES Users growing and becoming more demanding –E-learning, electronic registration and other services –Require 24x7 access to learning materials.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
© 2017 SlidePlayer.com Inc. All rights reserved.