The Security Network Track # 2, Panel #3 Presented by John C. Deal Erik Visnyak October 6, 2009 CyberSecurity for the GIG; a historical perspective.

Slides:



Advertisements
Similar presentations
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
Advertisements

1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Information Security Policies and Standards
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Stephen S. Yau CSE , Fall Security Strategies.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Unify and Simplify: Security Management
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 6 of the Executive Guide manual Technology.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Module 11: Designing Security for Network Perimeters.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Intrusion Detection on a Shoestring Budget Shane Williams UT Austin Graduate School of Library and Information Science Oct. 18, 2000 SANS Network Security.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Module 7: Implementing Security Using Group Policy.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Russell Rice Senior Director, Product Management Skyport Systems
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Security Methods and Practice CET4884
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 6 Application Hardening
Configuring Windows Firewall with Advanced Security
CompTIA Security+ Study Guide (SY0-401)
How to Mitigate the Consequences What are the Countermeasures?
Implementing Client Security on Windows 2000 and Windows XP Level 150
Intrusion Detection system
Introduction to Network Security
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
Protection Mechanisms in Security Management
Presentation transcript:

The Security Network Track # 2, Panel #3 Presented by John C. Deal Erik Visnyak October 6, 2009 CyberSecurity for the GIG; a historical perspective

 Almon Strowger  Cliff Stoll –  Compromise of the Greek Telephone System – 2004/2005  Cyber Attack on Estonia and the Republic of Georgia – 2007/2008  Others

1st Perimeter - Stop Common Hackers & Vulnerabilities + “Trip-Wire ” A Classic Approach to Defense-In-Depth Internet 3rd Perimeter - Internal Trip-Wire Installation Firewall DMZ Public Servers FW External IDS ACL Internal IDS 2nd Perimeter – DMZ + Stop Attacks 4th Perimeter - Allow Only Verified Enclave Users & Applications Deny All Others Final Defensive Perimeter - Server Trip-Wire & Other Server Security Mechanisms Intrusion Detection System Enclave Firewall ACL FW Server Tools 1st Perimeter - Stop Common Hackers & Vulnerabilities + “Trip-Wire” Defense in Depth is more than Technology; It is about Security Controls working thru Operations, People, and Technologies

DoD Publishes STIGs: a Security Technical Implementation Guide is a methodology for standardized secure installation and maintenance of computer software and hardware. a STIG describes what needs to be done for minimizing network-based attacks and also for stopping system access if a computer criminal is next to the device. Lastly, a STIG may also be used to describe the processes and lifecycles for maintenance (such as software updates and vulnerability patching). Standard Implementation of IA Controls and STIGs to Protect, Detect and Harden Networked Information Systems IA SW Components Wireless Security IPSec Gateway Firewall Agent Policy Management Threat Management IDPS Management Vulnerability Scanner Identity Management Audit Management Security Patch Management Rogue System Detection Management Security Management Software CDS Workstation Software - Access Data at Rest Encryption Application Guard Hardware Application Guard Software - Transfer IA Workstation Software Application Guard Functional Architecture for Information Assurance

ComponentDescription Policy ManagementDefines the configuration policy that the system must adhere to and the Policy agent enforces. IPsec GatewayProvides layer 3 data in transit encryption to network traffic. Threat ManagementObtain signature updates to push to various agents and monitors agent activities via virus scans. Patch ManagementCollects IAVA updates and deploys them to the Patch Agent. Collects patch compliance information from the various systems. IDPS ManagementScans packets inbound/outbound within the operation system/network and raises alerts or makes automatic prevention decisions based on the severity level of the attack signature/anomaly. Firewall AgentFilters ingress/egress traffic to/from the host systems. This is accomplished by port and protocol rule-based access control lists. CDS Workstation Software Utilizes a secure OS to enforce separation and mandatory access control between various VMs running on a single HW platform, allowing a specific user access to VM at different classification levels. Data at Rest EncryptionEncrypts the hard drive, volume partitions, directories, and files living on the mobile devices. Application Guard Software Application developed to handle specific protocol traffic and can conduct a deep inspection of the data against specific rules (dirty words) to determine if the traffic is allowed to move from one domain to another. Application Guard Hardware Accredited hardware platform that houses MLS guard software. Rogue System Detection Management Collects events from the sensor agents throughout the network and raises alerts to administrators if a sensor detects a Rogue System in the network. Audit ManagementCollects and analyzes audit logs from various systems and network devices throughout the architecture. Can index the activity and raise alerts. Vulnerability ScannerScans the entire network for vulnerability and reports any findings to the administrators. Identity ManagementCentralized repository for all user accounts that provides Role-based access controls to all the domain systems. Wireless Security HW/SW Detects wireless signals/traffic and correlates RF signals for intrusion detection/prevention and tracking. Provides Layer 2 Encryption and Authentication/Authorization/Auditing Services Descriptions of IA and Security Controls

Trust is the Basic Security Issue  Information Access and Info Sharing based on role, clearance and need to know  Challenges to Cyber-trust ◦ Pervasive computing – pda, phones, ◦ Social networking ◦ Processing Speeds Trust and Security Control mechanisms (establishing and maintaining trust)  Basic Defense in Depth – passwords, ACL, bio-metrics, encryption, etc  IA Controls and Security Hardening Monitoring and Maintaining Cyber-trust  Knowing where your trust relations are vulnerable  Deterrents to trust-violations ◦ Hacking deterrents ◦ Snooping ◦ Cyber-attacks  Knowing when your trust has been violated ◦ IDPS and AND (Signature Based and Behavioral Based)  Host, Wireless and Network Sensors System Vision of the Target GIG Version 1.0, June 2007

Contact Information: Phone: