We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byHugh Higgins
Modified about 1 year ago
Network Security and Audits LITN Fall Conference 2006 Presented by Katie Givens Mosaic
© 2006 Mosaic. All rights reserved. Network Security and Audits Network Security in Today’s Environment Network Security Tools Network Security Policies and Practices Network Security Audits Physical Network Security Helpful Links Conclusion
© 2006 Mosaic. All rights reserved. Network Security in Today’s Environment The Internet Innovative exchange and storage of information Reliance on the Internet Opportunity for security breaches The Future of Security Problems Security needs will continue to grow New security measures bring new ways to get around them
© 2006 Mosaic. All rights reserved. Network Security in Today’s Environment No Guarantees No way to ever be 100% secure Even the best are still vulnerable Basic Solutions Firewalls Tripwires Patch security holes Backups Encryption Use Linux and Open Source to secure Microsoft
© 2006 Mosaic. All rights reserved. Network Security Tools Firewall – Cisco PIX (Private Internet Exchange) Network layer firewall Protects your network from unwanted traffic Packet filtering Place at the connection to the Internet
© 2006 Mosaic. All rights reserved. Network Security Tools Intrusion Detection – SNORT Detect the presence of an intruder and accountability for their actions Several options for setup – switches, hubs, outside firewall, behind firewall Oinkmaster – keep your rules updated
© 2006 Mosaic. All rights reserved. Network Security Tools Security Scanner – Nessus Free and 100% customizable Server-client architecture Plug-in architecture Complete reports
© 2006 Mosaic. All rights reserved. Network Security Tools Intrusion Detection – Tripwire Tool that checks to see what has changed on your system Monitors key attributes of files that should not change, i.e., binary signature, size, expected change of size, etc. Invisible camera on your network Con – alerts you after the attack – does not prevent. Can also help you to assess the damage Can also be used for integrity assurance, change management, policy compliance, and more
© 2006 Mosaic. All rights reserved. Network Security Tools Antivirus – Clam Antivirus Integrates with mail servers (attachment scanning) Flexible and scalable Command-line scanner Tool for automatically updating through the Internet
© 2006 Mosaic. All rights reserved. Network Security Tools Spam Protection – Spam Assassin Popular open source spam fighting tool Highly customizable Integrates with many different mail servers, including exchange Regularly maintained and updated by the open source world
© 2006 Mosaic. All rights reserved. Network Security Tools System Monitoring – Nagios Open Source Network monitoring application software Monitors network services Monitors host resources Plug-ins available to allow for development of own service checks Ability to define host hierarchy Reports, dashboards, and network diagrams
© 2006 Mosaic. All rights reserved. Network Security Policies & Practices Access Permissions Users – one account per users Groups – assigned permissions to access folders, files, etc. Special Accounts – SQL Service, backup, etc. Network Account Policies Lockout – 30 day, 60 day, 90 day Number of bad log on attempts Password requirements Length of lockout
© 2006 Mosaic. All rights reserved. Network Security Policies & Practices Security Office Security Officer (HIPAA) Security Office Team HIPAA Security Standards Matrix and Implementation Plan Review security incidents Supported by Senior Leadership and includes the HIPAA Privacy Officer
© 2006 Mosaic. All rights reserved. Network Security Audits Security Audits Unused accounts File Access Log on Bad log on attempts
© 2006 Mosaic. All rights reserved. Physical Network Security Password protected screen saver Secure access to the server room ReadyAccess: disconnect session after 15 minutes and terminate after 90 minutes
© 2006 Mosaic. All rights reserved. Acknowledgements Thanks to Thain Eischeid, Larry Gerlt, and Steve Kohrs for sharing their expertise on network security and audits.
© 2006 Mosaic. All rights reserved. Helpful Links Webbing – manage nearly all system services from a web interface Big Brother – monitor your network from printers to servers right down to a specific service Net filter – iptables for linux Tripwire – intruder detection Ethereal – packet sniffer utility to monitor network traffic SANS Internet Storm Center – cyber threat monitor and alert system isc.sans.org
© 2006 Mosaic. All rights reserved. Helpful Links CERT – coordination center of Internet security Linux Security – Linux community for security Revolution OS – get the story on the open source movement Snort – Intrusion Detection System Oinkmaster – Snort rules manager / updater oinkmaster.sourceforge.net Nessus – system security scanner
© 2006 Mosaic. All rights reserved. Helpful Links Samba – file and printer sharing server qmail – safe and secure Mail Transport Agent (MTA) qmail-scanner – content scanner for qmail qmail-scanner.sourceforge.net Clam Antivirus – open source antivirus scanner SpamAssassin – a mail filter to identify spam
© 2006 Mosaic. All rights reserved. The End
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host Host In networking, a host is any device that has an IP address. Hosts include.
eScan Total Security Suite with Cloud Security.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
1 Host – Based Intrusion Detection “Working of Tripwire”
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
Small Business Security Keith Slagle April 24, 2007.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Denise Heagerty, CERN, HEPiX Meeting Oct CERN’s Computer Security Challenge Denise Heagerty, CERN Computer Security Officer.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security Network Perimeter Security Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security Network Perimeter Security Intrusion Detection and Prevention.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
CyberSecurity for NEEShub: Best-Practices and Lessons Learned Gaspar Modelo-Howard CyberSecurity Engineer George E. Brown, Jr. Network for Earthquake Engineering.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Brian Bradley. Data is any type of stored digital information. Security is about the protection of assets. Prevention: measures taken to protect.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Vulnerability Analysis Borrowed from the CLICS group.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Module 14: Configuring Server Security Compliance.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Module 11: Designing Security for Network Perimeters.
The Most Analytical and Comprehensive Defense Network in a Box.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
| University of Missouri Copyright ©2007 MOREnet and The Curators of the University of Missouri Statenet Security on the cheap and easy Beth.
© 2017 SlidePlayer.com Inc. All rights reserved.