Self-Defending Networks Self-Defending Networks By-  Aseem Khan  Adeeb Akhil Shahi  Mohammed Sohail  Saiprasad H Bevinakatti.

Slides:



Advertisements
Similar presentations
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 © 2003, Cisco Systems, Inc. All rights reserved. Cisco Integrated Security: Building The Self-Defending Network Bogdan Constantinescu Area Manager Romania.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Increasing customer value through effective security risk management
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Wireless Network Security
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Stephen S. Yau CSE , Fall Security Strategies.
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Firewall Slides by John Rouda
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
1 © 2004 Cisco Systems, Inc. All rights reserved. Cisco Self Defending Network SECURING THE INTELLIGENT INFORMATION NETWORK James Jones CCIE 1550, CISSP.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Pg 1 of 25 AGI IP-Based Network Solutions Phil Flores Major Account Manager – Cisco Systems, inc.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Securing Wired Local Area Networks(LANs)
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
(CISCO) Self-Defending Networks Ben Sangster. Agenda (CISCO) Self-Defending Network Concept Why do we need SDN’s? Foundation of the CSDN? Endpoint Protection.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Module 11: Designing Security for Network Perimeters.
Scott Charney Cybercrime and Risk Management PwC.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Computer Security By Duncan Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Role Of Network IDS in Network Perimeter Defense.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Securing Interconnect Networks By: Bryan Roberts.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
AT&T Premises-Based Firewall Enhanced SBS Solution
Security in Networking
Home Internet Vulnerabilities
Check Point Connectra NGX R60
امنیت اطلاعات و ضرورت آن
How to Mitigate the Consequences What are the Countermeasures?
Intrusion Detection system
Presentation transcript:

Self-Defending Networks Self-Defending Networks By-  Aseem Khan  Adeeb Akhil Shahi  Mohammed Sohail  Saiprasad H Bevinakatti

Cisco Self-Defending Network (CSDN) Concept A systems-based solution that allows entities to use their existing infrastructure in new ways to: A systems-based solution that allows entities to use their existing infrastructure in new ways to: Reduce windows of vulnerabilityReduce windows of vulnerability Minimize the impact of attacksMinimize the impact of attacks Improve overall infrastructure availability and reliabilityImprove overall infrastructure availability and reliability

Today’s Organizational Challenges Due to continued economic challenges organizations and employees need to be more productive. Due to continued economic challenges organizations and employees need to be more productive. More and more employees need to work and communicate while mobile and not infect the company with viruses. (counter productive) More and more employees need to work and communicate while mobile and not infect the company with viruses. (counter productive) Organizations need to better defend against threats, vulnerabilities, events and adopt a defense-in-depth strategy. Organizations need to better defend against threats, vulnerabilities, events and adopt a defense-in-depth strategy. Organizations need to maximize return on investment of their limited IT budgets to improve productivity, mobility, and secure the assets of the business. Organizations need to maximize return on investment of their limited IT budgets to improve productivity, mobility, and secure the assets of the business.

The Growing Need for Security Solutions Data Loss Regulatory Compliance Malware A Systems Approach to Streamline IT Risk Management for Security and Compliance

Sophistication of Hacker Tools Packet Forging/ Spoofing Password Guessing Self Replicating Code Password Cracking Back Doors Hijacking Sessions Sweepers Sniffers Stealth Diagnostics Technical Knowledge Required High Low 2000 DDOS New Internet Worms Threat Capabilities Disabling Audits Exploiting Known Vulnerabilities

The Self Defending Network

SYSTEM LEVEL SOLUTIONS EndpointsEndpoints NetworkNetwork ServicesServices SECURITY TECHNOLOGY INNOVATION SECURITY TECHNOLOGY INNOVATION Endpoint SecurityEndpoint Security Application FirewallApplication Firewall SSL VPNSSL VPN Network AnomalyNetwork Anomaly INTEGRATED SECURITY Secure Connectivity Threat Defense Trust & Identity Secure Connectivity Threat Defense Trust & Identity An initiative to dramatically improve the network’s ability to identify, prevent, and adapt to threats Self Defending Network Strategy Improve the network’s ability to identify, prevent, and adapt to threats

Cisco’s Integrated Network Security Systems Threat Defense Defend the Edge: Integrated Network FW+IDS Detects and Prevents External Attacks Protect the Interior: Catalyst Integrated Security Protects Against Internal Attacks Guard the Endpoints: Cisco Security Agent (CSA) Protects Hosts Against Infection Trust and Identity Verify the User and Device: Identity-Based Networking/NAC Control Who/What Has Access Secure the Transport: IPSec VPN SSL VPN MPLS Protects Data/Voice Confidentiality Secure Comm. Intranet Internet

CSDN Concept (cont.) CSDN also helps create autonomous systems that can quickly react to an outbreak with little to no human intervention CSDN also helps create autonomous systems that can quickly react to an outbreak with little to no human intervention

Why do we need CSDN’s? Evolution of network  Evolution of attacks on networks Evolution of network  Evolution of attacks on networks Traditional approach  Defense-in- depth Traditional approach  Defense-in- depth Proactive defense mechanismsProactive defense mechanisms CSDN approach CSDN approach Adaptive defense mechanismsAdaptive defense mechanisms

Why do we need CSDN’s? (cont.) Proactive defense mechanisms…not obsolete, simply inefficient in responding to breeches in network security Proactive defense mechanisms…not obsolete, simply inefficient in responding to breeches in network security Proactive solutions frontload defense mechanisms Proactive solutions frontload defense mechanisms

Proactive Defense Example Internet Outer Firewall DMZ Inner Firewall Internal Corp. Network Servers (e.g. web, , proxy) Development Network

Why do we need CSDN’s? (cont.) Adaptive Solutions…focus isn’t solely on preventing network attacks Adaptive Solutions…focus isn’t solely on preventing network attacks Attempt to effectively: Attempt to effectively: DetectDetect RespondRespond RecoverRecover Little to no adverse effect on the network and its users Little to no adverse effect on the network and its users

Why do we need CSDN’s? (cont.) Key elements of an adaptive solution: Key elements of an adaptive solution: Remain active at all timesRemain active at all times Perform unobtrusivelyPerform unobtrusively Minimize propagation of attacksMinimize propagation of attacks Quickly respond to as-yet unknown attacksQuickly respond to as-yet unknown attacks

Foundation of a CSDN 1. Endpoint Protection 2. Admission Control 3. Infection Containment 4. Intelligent Correlation and Incident Response 5. Inline IDS and Anomaly Detection 6. Application Security and Anti-X Defense

Endpoint Protection You are only as strong as your weakest link You are only as strong as your weakest link One non-sanitized end-user system connected behind a robust, efficient defense can spell D-O-O-M for a network One non-sanitized end-user system connected behind a robust, efficient defense can spell D-O-O-M for a network Cisco Security Agent Cisco Security Agent Point of presence on end user systems that enables efficient exchange of valuable network threat information as it occursPoint of presence on end user systems that enables efficient exchange of valuable network threat information as it occurs Endpoint system virus, worm detection/protectionEndpoint system virus, worm detection/protection

Admission Control Not only core component of a CSDN, but incorporated into other technologies by over 30 industry-leading vendors Not only core component of a CSDN, but incorporated into other technologies by over 30 industry-leading vendors Network Admission Control (NAC) assists in determining the level of access to grant an end-user system in accordance with the security policy when it initially joins the network Network Admission Control (NAC) assists in determining the level of access to grant an end-user system in accordance with the security policy when it initially joins the network NAC also assists in managing end-user system’s compliance with security patches and updates NAC also assists in managing end-user system’s compliance with security patches and updates

Infection Containment The ability to identify non-compliant systems or network attacks as they occur and react appropriately, minimizing the effect of the breech The ability to identify non-compliant systems or network attacks as they occur and react appropriately, minimizing the effect of the breech Potentially the #1 core component of a secure system belonging to a CSDN Potentially the #1 core component of a secure system belonging to a CSDN

Intelligent Correlation and Incident Response Services that provide the ability to exchange: Services that provide the ability to exchange: Event informationEvent information Implications of an event occurringImplications of an event occurring Necessary actions to takeNecessary actions to take The appropriate nodes or systems to enforce actions in real-timeThe appropriate nodes or systems to enforce actions in real-time These services aide in adapting to changes and countering attacks that are occurring in the network as they occur rather than after they occur These services aide in adapting to changes and countering attacks that are occurring in the network as they occur rather than after they occur

Application Security and Anti-X Defense A menagerie of application layer security products that address the “ever-evolving” classes of threats which are not effectively addressed by traditional firewall and network IDS products A menagerie of application layer security products that address the “ever-evolving” classes of threats which are not effectively addressed by traditional firewall and network IDS products Threat examples: Threat examples: based SPAM and phishing based SPAM and phishing SpywareSpyware Unauthorized peer-to-peer activityUnauthorized peer-to-peer activity

Summary New phraseology NOT a new technology New phraseology NOT a new technology Encompassing security solution that is proactive AND adaptive in nature that envelopes every level of network security rather than just specific layers Encompassing security solution that is proactive AND adaptive in nature that envelopes every level of network security rather than just specific layers Key difference in CSDN and traditional security solutions…ability of CSDN’s to communicate and share information among different security products employed within the CSDN Key difference in CSDN and traditional security solutions…ability of CSDN’s to communicate and share information among different security products employed within the CSDN

Questions