ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Access Control Methodologies
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Security, Privacy, and Ethics Online Computer Crimes.
Information Security Policies and Standards
Intrusion Detection Systems and Practices
Network Security Testing Techniques Presented By:- Sachin Vador.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Data Security in Local Networks using Distributed Firewalls
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Chapter 10: Authentication Guide to Computer Network Security.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
BUSINESS B1 Information Security.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 4 Finding Network Vulnerabilities By Whitman, Mattord, & Austin© 2008 Course Technology.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
COEN 252 Computer Forensics Collecting Network-based Evidence.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Network Security & Accounting
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Access Control / Authenticity Michael Sheppard 11/10/10.
Privilege Management Chapter 22.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Role Of Network IDS in Network Perimeter Defense.
CSCE 201 Identification and Authentication Fall 2015.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
SECURITY ANALYSIS TOOLS FOR INFORMATION MANAGEMENT Alicia Coon.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
MANAGEMENT of INFORMATION SECURITY Second Edition.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Security Methods and Practice CET4884
CompTIA Security+ SY0-401 Real Exam Question Answer
Secure Software Confidentiality Integrity Data Security Authentication
Computer Data Security & Privacy
Authentication.
Lesson Objectives Aims You should be able to:
THE STEPS TO MANAGE THE GRID
Firewalls.
Security Barriers Asset Proper Access Attack Security System
Data Security in Local Networks using Distributed Firewalls
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Introduction to Network Security
Designing IIS Security (IIS – Internet Information Service)
Protection Mechanisms in Security Management
Presentation transcript:

ASHRAY PATEL Protection Mechanisms

Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools Cryptography and Encryption

Access Control Regulates the admission of users into trusted areas of the organization  Logical access to information  Physical access to organizations facilities Maintained by means of a collection of policies, programs to carry out those policies, and technology to enforce policy Access control involves four processes:  Identification  Authentication  Authorization  Accountability

Identification A mechanism that provides information about an unverified entity that wants to be granted access ID must be a unique value that can be traced to one and only one person within the security domain Elements that make ID’s unique within security domain  First and last name  Picture  Department codes  Random numbers  Or special characters

Authentication Process to validating a persons purported identity Ensures the entity requesting access is the entity it claims to be Three types of authentication mechanisms:  Knowledge factors: Something the user knows  Ownership factors: Something the user has  Inherence factors: Something the user is or does Some places require strong authentication- usually require 2 different types of authentication mechanisms

Knowledge Factor Methods Username/Password is the most common in work places and schools Pass Phrase Personal identification number Challenge response Weakness: is that any of these can often be stolen, accidentally revealed, or forgotten by the user

Ownership Method Factors Photo Id Key Cards- swipe or scan to get authentication Wrist Bands Security Token Cell phone hardware token Cell Phone software token  hardware/software tokens acts like an electronic key to access something.

Inherence Method Factors Fingerprints Retina scans Iris scans Signatures Face/voice recognition Hand patterns Palm vein authentication

Authorization Process that determines if a user has been specifically and explicitly authorized by the proper authority to perform a function Authorization can be handled in 3 ways:  Authorization for each authenticated user : in which the system performs an authentication process to verify each entity and then grants access to resources to only that entity  Authorization for members in a group: in which the system matches authenticated entities to a list of group memberships and then grants access to resources bases on group’s access rights  Authorization across multiple systems: in which a central authentication and authorization system verifies entity ID’s and grants a set of credentials to the verifies entity

Accountability Ensures that all actions on a system can be attributed to an authenticated identity Actions could be ones that the entity is authorized for: such as modifying data, Or could include unauthorized attempts: such as modifying data that is beyond access level Accountability is accomplished by implementing system logs and database journals

Managing Access Control Access control policy: which specifies how access rights are granted to entities and groups Policy must include:  Reviewing all access rights periodically  Granting access rights  Changing access rights when needed  Revoking access rights

Firewalls A network security system that controls the incoming and outgoing network traffic Can filter based on: IP address, type of packet, port request, and other elements presented in packet Examines for packets for compliance with or violation of rules configured into firewalls database

Managing Firewalls Training  Read manuals and get educated on the firewall Uniqueness  Each brand of firewall is different, so you must learn what differences the firewalls you are using have Responsibility  Each and every person in security has a responsibility to keep the firewall updated and safe from hackers Administration  Must have administration hired to help with the firewalls

Scanning and Analysis Tools Used to find vulnerabilities is systems, holes in security components, and other unsecured points Different types of scanners and tools:  Port Scanners  Vulnerability Scanners  Packet Sniffers  Content Filters  Trap and trace

Port Scanners Are a group of utility software applications that can identify computers that are active on a network, as well as the active ports and services on those computers The functions and roles fulfilled by the machines Can scan for specific computers, protocols, resources, or conduct generic scans The more specific the scanner is, the more detailed and useful the information is provided

Vulnerability Scanners Variants of port scanners, are capable of scanning networks for very detailed information It can identify exposed user names and groups, show open network shares, and expose configuration problems Can also show what firewalls and OS/version is running

Packet Sniffers Is a network tool that collects and analyzes copies of packets from the network Can provide a administrator with valuable information to help diagnose and resolve networking issues  Can examine both live network traffic and previously captured data  Including language filtering  TCP session reconstruction utility

Content Filters Is a software program that allows administrators to restrict content that comes into a network Such as: web sites with nonbusiness related material  Pornography websites  Entertainment websites Can also keep spam s away

Trap and Trace Application that entice individuals who are illegally perusing the internal areas of a network by providing simulated rich content areas but distract the attacker while the software notifies the administrator of the intrusion Then the administrator determine the identity of someone discovered in the unauthorized areas of the network or systems

Cryptography and Encryption Is the set of processes involved in encoding and decoding messages so that others cannot understand them Encryption: is the process of converting an original message into a form that cannot be used by unauthorized individuals Messages are decoded by algorithms and keys used to perform the encryption

References Management of Information Security- Whitman and Mattord tion-Mechanisms tion-Mechanisms