Network Security Sritrusta Sukaridhoto EEPIS-ITS

Slides:



Advertisements
Similar presentations
Basic Security Architecture. Secure Network Layouts.
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Web Server Administration TEC 236 Securing the Web Environment.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security+ Guide to Network Security Fundamentals
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
IS Network and Telecommunications Risks
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Network Perimeter Security Yu Wang. Main Topics Border Router Firewall IPS/IDS VLAN SPAM AAA Q/A.
Securing a Wireless Network
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Information Systems
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Web Server Administration Chapter 10 Securing the Web Environment.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
C8- Securing Information Systems
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Module 11: Designing Security for Network Perimeters.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
Security fundamentals Topic 10 Securing the network perimeter.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Network System Security - Task 2. Russell Johnston.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Security fundamentals
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
Managing Secure Network Systems
Securing the Network Perimeter with ISA 2004
Click to edit Master subtitle style
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Security of a Local Area Network
Security in Networking
CompTIA Security+ Study Guide (SY0-401)
Network hardening Chapter 14.
Welcome to all Participants
LM 5. Wireless Network Security
Presentation transcript:

Network Security Sritrusta Sukaridhoto EEPIS-ITS Netadmin & Head of Computer Network Lab EEPIS-ITS

Tentang aku… Seorang pegawai negeri yang berusaha menjadi dosen yang baik,... Senang bermain dengan “Linux” sejak 1999 (kuliah sem 5) Pengalaman : Mengajar Penelitian Jaringan komputer

Tentang aku lagi… bergabung dengan EEPIS-ITS tahun 2002 berkenalan dengan Linux embedded di Tohoku University, Jepang (2003 - 2004) “Tukang jaga” lab jaringan komputer (2004 – sekarang) Membimbing Tugas Akhir, 25 mahasiswa menggunakan Linux, th 2005 (Rekor) Tim “Tukang melototin” Jaringan EEPIS (2002 – sekarang) ngurusin server “http://kebo.vlsm.org” (2000 – sekarang) Debian GNU/Linux – IP v6 developer (2002) GNU Octave developer (2002) EEPIS-ITS Goodle Crew (2005 – sekarang) Linux – SH4 developer (2004 – sekarang) Cisco CNAP instructure (2004 – sekarang) ....

Content … Introduction Basic Security Architecture Information gathering Securing from Rootkit, Spoofing, DoS Securing from Malware Securing user and password Securing Remote Access Securing Wireless-LAN Securing network using Encryption EEPIS-ITS secure network

Introduction

Define security Confidentiality Integrity Availability

Threats… External Internal Hackers & Crackers White Hat Hackers Scripts Kiddies Cyber terrorists Black Hat Hackers Internal Employee threats Accidents

Type of attacks… Denial of Services (DoS) Buffer overflows Malware Network flooding Buffer overflows Software error Malware Virus, worm, trojan horse Social Engineering Brute force

Steps in cracking… Information gathering Port scanner Network enumeration Gaining & keeping root / administrator access Using access and/or information gained Leaving backdoor Covering his tracks

The organizational security process… Top Management support Talk to managent ($$$$$$) Hire white hat hackers Personal experience from managent Outside documents about security

HOW SECURE CAN YOU BE ???? ???

Security policy (document) Commitment top management about security Roadmap IT staff Who planning Who responsible Acceptable use of organizational computer resources Access to what ??? Security contract with employees Can be given to new employees before they begin work

Security personnel The head of organization Middle management Responsible, qualified Middle management

The people in the trenches Network security analyst Experience about risk assessments & vulnerability assessments Experience commercial vulnerability scanners Strong background in networking, Windows & unix environments

The people in the trenches (2) Computer security systems specialist Remote access skills Authentication skills Security data communications experience Web development skills Intrusion detection systems (IDS) UNIX

The people in the trenches (3) Computer systems security specialist Audit/assessment Design Implementation Support & maintenance Forensics

Security policy & audit Documents Risk assessment Vulnerability testing Examination of known vulnerabilities Policy verification

Basic Security Architecture

Secure Network Layouts

Secure Network Layouts (2)

Secure Network Layouts (3)

Firewall Packet filter Stateful Application proxy firewalls Implementation: iptables

Firewall rules

File & Dir permissions Chown Chmod Chgrp

Physical Security Dealing with theft and vandalism Protecting the system console Managing system failure Backup Power protection

Physical Solutions Individual computer locks Room locks and “keys” Combination locsks Tokens Biometrics Monitoring with cameras

Disaster Recovery Drills Making test Power failure Media failure Backup failure

Information gathering

How Social Engineering Electronic Social engineering: phising What is user and password ? Electronic Social engineering: phising

Using published information Dig Host whois

Port scanning Nmap Which application running

Network Mapping Icmp Ping traceroute

Limiting Published Information Disable unnecessary services and closing port netstat –nlptu Xinetd Opening ports on the perimeter and proxy serving edge + personal firewall

Securing from Rootkit, Spoofing, DoS

Rootkit Let hacker to: Enter a system at any time Open ports on the computer Run any software Become superuser Use the system for cracking other computer Capture username and password Change log file Unexplained decreases in available disk space Disk activity when no one is using the system Changes to system files Unusual system crashes

Spoofprotect Debian way to protect from spoofing /etc/network/options Spoofprotect=yes /etc/init.d/networking restart

DoS preventive IDS IPS Honeypots firewall

Intrusion Detection Software (IDS) Examining system logs (host based) Examining network traffic (network based) A Combination of the two Implementation: snort

Intrusion Preventions Software (IPS) Upgrade application Active reaction (IDS = passive) Implementation: portsentry

Honeypots (http://www.honeynet.org)

Securing from Malware

Malware Virus Worm Trojan horse Spyware On email server : Spamassassin, ClamAV, Amavis On Proxy server Content filter using squidguard

Securing user and password

User and password Password policy Strong password Password file security /etc/passwd, /etc/shadow Password audit John the ripper Password management software Centralized password Individual password management

Securing Remote Access

Remote access Telnet vs SSH VPN Ipsec CIPE PPTP OpenVPN Freeswan Racoon CIPE PPTP OpenVPN

Wireless Security Signal bleed & insertion attack Signal bleed & interception attack SSID vulnerabilities DoS Battery Exhaustion attacks - bluetooth

Securing Wireless-LAN

802.11x security WEP – Wired Equivalency Privacy 802.11i security and WPA – Wifi Protected Access 801.11 authentication EAP (Extensible Authentication Protocol) Cisco LEAP/PEAP authentication Bluetooth security – use mode3

Hands on for Wireless Security Limit signal bleed WEP Location of Access Point No default SSID Accept only SSID Mac filtering Audit DHCP Honeypot DMZ wireless

Securing Network using Encryption

Encryption Single key – shared key DES, 3DES, AES, RC4 … Two-key encryption schemes – Public key PGP Implementation HTTPS

EEPIS-ITS secure network

Router-GTW Cisco 3600 series Encrypted password Using “acl”

Linux Firewall-IDS Bridge mode Iface br0 inet static Address xxx.xxx.xxx.xxx Netmask yyy.yyy.yyy.yyy Bridge_ports all Apt-get install snort-mysql webmin-snort snort-rules-default acidlab acidlab-mysql Apt-get install shorewall webmin-shorewall Apt-get install portsentry

Multilayer switch Cisco 3550 CSC303-1#sh access-lists Extended IP access list 100 permit ip 10.252.0.0 0.0.255.255 202.154.187.0 0.0.0.15 (298 matches) deny tcp any 10.252.0.0 0.0.255.255 eq 445 (1005 matches) Extended IP access list CMP-NAT-ACL Dynamic Cluster-HSRP deny ip any any Dynamic Cluster-NAT permit ip any any permit ip host 10.67.168.128 any permit ip host 10.68.187.128 any

NOC for traffic monitoring

E-Mail DIAGRAM ALUR POSTFIX secure insecure ClamAV Virtual MAP Open relay RBL SPF User A User B User C Spamasassin Courier imap Amavis Smtp Parsing Postfix Quarantine http 80 Secure https 443 Pop before smtp Pop 3 courier ok Outlook / Squirrelmail maildir Y N DNS SERVER secure insecure reject DIAGRAM ALUR POSTFIX

Policy No one can access server using shell Access mail using secure webmail Use proxy to access internet No NAT 1 password in 1 server for many applications

Thank you dhoto@eepis-its.edu