Protection Mechanisms in Security Management

Slides:



Advertisements
Similar presentations
CSA 223 network and web security Chapter one
Advertisements

Firewalls and Intrusion Detection Systems
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Packets and Protocols Security Devices and Practices.
FIREWALL Mạng máy tính nâng cao-V1.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
CSE 4482, Fall 2009, D Chan Session 2 – Common Security Techniques.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Protection Mechanisms
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Linux Networking and Security
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Module 7: Advanced Application and Web Filtering.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
7.4 Firewalls Network Security / G.Steffen1. In This Section What is a Firewall? Types of Firewall Comparison of Firewalls Types What Firewall Can-and.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Access Control Chapter 3 Part 4 Pages 227 to 241.
Technical Devices for Security Management Kathryn Hockman COSC 481.
SECURITY ANALYSIS TOOLS FOR INFORMATION MANAGEMENT Alicia Coon.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Information Systems Design and Development Security Precautions Computing Science.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Security fundamentals
MANAGEMENT of INFORMATION SECURITY Second Edition.
CompTIA Security+ Study Guide (SY0-401)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Working at a Small-to-Medium Business or ISP – Chapter 8
Lesson Objectives Aims You should be able to:
Radius, LDAP, Radius used in Authenticating Users
Click to edit Master subtitle style
Firewalls.
Security of a Local Area Network
CompTIA Security+ Study Guide (SY0-401)
IS4550 Security Policies and Implementation
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Introduction to Network Security
Advanced Computer Networks
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Protection Mechanisms in Security Management - Bryan M Keller COSC 481

Introduction Technical controls alone cannot ensure a secure IT environment Technical security mechanisms: Access controls Firewalls Dial-up protection Intrusion detection systems Scanning and analysis tools Encryption systems

Sphere of Security

Access Control Devices Confirming identity of entity accessing a logical or physical area (authentication) Determining which actions that entity can perform in that physical or logical area (authorization)

Authentication Definition: Proof that a user is indeed the person of entity requesting authorized access to a system or facility Authentication Mechanisms: Something you know Password Something you have Card, Key, or Token Something you are Biometrics Something you produce Signature Recognition or Voice Recognition

Authorization Definition: Permission by the proper authority to access, update, or delete the contents of an information asset.

Firewalls Definition: Any device that prevents a specific type of information from moving between two networks 1st generation: Packet filtering. Filter packets based on header information 2nd generation: Application-level Secondary filtering system (proxy server) 3rd generation: Stateful inspection Uses a state table to track every network connection 4th generation: Dynamic packet filtering firewall Understands protocol functions. Allows packets based on specific information

Firewall Best Practices Allow all internal traffic out. Do not allow direct access to firewall from public network Allow all SMTP data to pass through Deny all ICMP data Block telnet access to internal servers from public network

Dial-Up Protection Dial-up connections are less sophisticated than other types of Internet connections Username/Password only means of authentication

RADIUS and TACACS Systems that authenticate credentials of users trying to access a network via a dial-up connection Remote Authentication Dial-In User Service (RADIUS) Terminal Access Controller Access Control System (TACACS)

Intrusion Detection Systems Definition: Devices that inspect data communication flows to identify patterns that may indicate that hacking is underway Configured to notify administrators Require complex configurations Network based or Host based Signature based or Statistical anomaly based

Signature Based/Statistical Anomaly Based IDS Examines data traffic for something that matches signatures which comprise preconfigured, predetermined attack patterns Statistical Anomaly Based Periodically samples network activity, based on statistical methods and compares these samples to a baseline

Scanning and Analysis Tools Scanning and analysis tools can find vulnerabilities in systems, holes in security components, and other unsecured aspects of the network Port Scanners Identify active computers on a network and active ports and services on those computers Vulnerability Scanners Scan networks for detailed information such as usernames, open network shares, and other configuration problems Packet Sniffers Network tool that collects and analyzes packets on a network Content Filters Allow administrators to restrict content that comes into a network

Encryption Systems Encryption Types of Encryption: Process of converting original message into a form that cannot be understood by unauthorized individuals Types of Encryption: Symmetric Encryption Asymmetric Encryption

Symmetric Encryption A single secret key is used to encrypt and decrypt the message

Asymmetric Encryption Uses two different keys. Either key can be used to encrypt or decrypt message. If Key A is used to encrypt message, then only Key B can decrypt it

Summary Introduction Access controls Firewalls Dial-up protection Intrusion detection systems Scanning and analysis tools Encryption systems

References Whitman, M, & Mattord, H (2004). Management of Information Security. Canada: Thomson Learning, Inc.