Presentation on theme: "SCCS SECURITY INC. PREPARED FOR FRANKLIN MEDICAL SUPPLIES Implementing Network Security ITEC495 – TEAM D."— Presentation transcript:
SCCS SECURITY INC. PREPARED FOR FRANKLIN MEDICAL SUPPLIES Implementing Network Security ITEC495 – TEAM D
Introduction NETWORK SECURITY OVERVIEWNETWORK SECURITY OVERVIEW “The protection of networking components, connections, and content” (Whitman & Mattord, 2005). Small piece of the overall information security pie. Management, computer and data, policy, and network security. Focus on network security. Provide tools for a proactive approach to information security overall. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | Franklin Medical Supplies Needs PROBLEM IDENTIFICATIONPROBLEM IDENTIFICATION Franklin Medical Supplies is looking for a solution to secure their outdated network. CURRENT OPERATING ENVIRONMENTCURRENT OPERATING ENVIRONMENT Franklin Medical Supplies has one three-floor building with one leased cable broadband connection entering the building. The broadband connection connects the Franklin Medical Supplies local area network (LAN) to the metropolitan area network (MAN) hosted by their internet service provider. The broadband connection is connected to a centrally located 24-port 10- BaseT hub that networks four 24-port 10-BaseT bridges on each floor of the building. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | Franklin Medical Supplies Needs CURRENT OPERATING ENVIRONMENT (Continued)CURRENT OPERATING ENVIRONMENT (Continued) The current 10-BaseT hub is using outdated software with no firewall protection. Of the 120 networked nodes, there are 85 workstations running Windows XP—each with outdated virus protection, security software patches, an no firewall protection. The protocols used are a mesh of IPX/SPX (printers) and TCP/IP (servers, workstations, laptops). During normal business operating hours, system uptime is considered critical and any amount of considerable downtime can cause severe revenue loss for Franklin Medical Supplies. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | SCCS Security Inc. Solutions SOLUTION RECOMMENDATIONSOLUTION RECOMMENDATION SCCS Security Inc. to provide a complete network security solution for Franklin Medical Supplies.DELIVERABLES A detailed threat analysis will be performed on the Franklin Medical Supplies Network. A Cisco Catalyst Express 500 10/100/1000Base-t switch will replace the centrally located 24-port hub. Each floor’s bridge will also be replaced with a Cisco Catalyst Express 500 switch. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | SCCS Security Inc. Solutions DELIVERABLES (Continued)DELIVERABLES (Continued) All unused ports on the switch will be disabled through the switches management interface, protecting from unauthorized device plug-ins. The main internet connection will have a Cisco Catalyst 6500 firewall that can control and block unnecessary traffic. A corporate version of Symantec Antivirus will be used that will allow symmetrical deployment of antivirus updates that will protect all computers from the latest virus threats, and periodically update with zero administration. Microsoft’s Windows Server Update Service (WSUS) will be configured, allowing control over deployment of Windows security updates. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | SCCS Security Inc. Solutions DELIVERABLES (Continued)DELIVERABLES (Continued) TCP/IP protocol will be the only network protocol used on the network, eliminating any open communicating devices. Active Directory accounts will be set to allow scheduled work time access only. Any access needs that fall out of the normal business day needs approval from the CIO. End user training material will be disseminated to all employees, empowering the users to make wise use of information resources. Training will occur for all Franklin Medical Supplies personnel impacted by the project. A security handbook will be developed and will encompass all aspects of network security. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | SCCS Security Inc. Solutions DELIVERABLES (Continued)DELIVERABLES (Continued) IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | Solution Explanation A NOVEL APPROACHA NOVEL APPROACH Our solution approaches the problem of network security as a process, not a goal. THE PROCESSTHE PROCESS After hardware and software are installed, management begins. Management of policies and procedures. Overall system management and maintenance. Ensure the process is constantly evolving with the trends in information technology. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | Solution Explanation MANAGEMENT OF POLICIES & PROCEDURESMANAGEMENT OF POLICIES & PROCEDURES Instituting an effective policy and procedure management scheme should not only encompass network security; but, software, hardware, data, people, and the actual policies and procedures themselves (Whitman & Mattord, 2005). It is impossible to obtain a perfect information security scheme, the process of implementing policies and procedures of how to act and react to malicious attempts is crucial.. Training on the policies and procedures must begin at the user level and move up to the executive levels. Policies and procedures must be reviewed and adapted to meet the organizational goals while maintaining security. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | Solution Explanation MANAGEMENT OF NETWORK SECURITYMANAGEMENT OF NETWORK SECURITY The ISO Network Management Model can be adjusted to fit the needs of network security and includes five areas of focus (Whitman & Mattord, 2005): Fault management Configuration and change management Accounting and auditing management Performance management Security program management Fault management in an information security management model involves identifying faults in the applied information security profile and then addressing them through remediation (Whitman & Mattord, 2005). IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | Solution Explanation MANAGEMENT OF NETWORK SECURITY (Continued)MANAGEMENT OF NETWORK SECURITY (Continued) Configuration and change management in regards to network security entails the continued administration of system and policy configuration and the changes involved with strategy, operation, or components of the network security program (Whitman & Mattord, 2005). Accounting and auditing within the network security model involves the management of monitoring internal and external system usage and reviewing (auditing) the usage reports to identify any potential malicious attempts or network misuse (Whitman & Mattord, 2005). Performance management requires information technology personnel to continually monitor the performance of all network security hardware and software and ensure that everything is working effectively. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | Solution Explanation MANAGEMENT OF NETWORK SECURITY (Continued)MANAGEMENT OF NETWORK SECURITY (Continued) Security program management is closely related to the management of policies and procedures. Once the network security infrastructure has been implemented, the devised policies and procedures should be designed to assist security program management (Whitman & Mattord, 2005): “Plan-Do-Check-Act” Process Plan: Planning of the risks and vulnerabilities. Do: Application of internal controls to manage the risks. Check: Periodic and frequent review of all policies and procedures. Act: Incident response and escalation. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | Solution Explanation MAINTENANCE OF NETWORK SECURITYMAINTENANCE OF NETWORK SECURITY An effective maintenance model includes external monitoring, internal monitoring, planning and risk assessment, vulnerability assessment and remediation, and readiness review (Whitman & Mattord, 2005). The implementation of each of these domains will ensure that the network security model is effectively maintained. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Class Project | Major Challenge COMMUNICATION One major challenge we encountered during this project was communication amongst our team. At times, it was difficult to get everyone on the same page or to meet at the same times. This proved to be difficult in the beginning and left many members wondering what the other was doing. LESSON LEARNEDLESSON LEARNED We learned that collaborative communication—whether through e-mail or Franklin Live—proved to be the major lesson learned during this project. Understanding from each of the team members that not everyone had the same schedules or could participate in the chosen capacity was crucial for the success of this project IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Class Project | Working Prototype SECURITY HANDBOOKSECURITY HANDBOOK The major limit to our project, in regards to a working prototype, is the scope of our project—installing a scenario-based network for a scenario- based company. Although we did not install actual equipment, we devised a project timeline and worked as though we were meeting actual deadlines. Because we did not have anything tangible to use for the project deliverable (like a website, code, or database), we developed a network security handbook that encompasses the project as a whole from a management perspective for our scenario-based client. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Class Project | Q & A QUESTIONS & ANSWERS SESSIONQUESTIONS & ANSWERS SESSION IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Class Project | Presentation References Whitman, M. E., & Mattord, H. J. (2005). Principles of Information Security (2nd Edition ed.). Boston: Thomson Course Technology. IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
SCCS SECURITY INC. PREPARED FOR FRANKLIN MEDICAL SUPPLIES Implementing Network Security ITEC495 – TEAM D | SCOTT BOYD| CHRISTOPHER CARUSO | CHAZ MINTON | SHAWN NUNNALLY