Network Security Overview Tales from the trenches.

Slides:



Advertisements
Similar presentations
FIREWALLS Chapter 11.
Advertisements

5-Network Defenses Dr. John P. Abraham Professor UTPA.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Chapter 12 Network Security.
IS Network and Telecommunications Risks
Information Security Overview BA483 – May 15 th, 2006 Presented By Kris Rosenberg, CISSP, MCSE, CCNA CTO Oregon State University College of Business.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Data Center Network Redesign using SDN
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Module 5: Configuring Access for Remote Clients and Networks.
Security at NCAR David Mitchell February 20th, 2007.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
IS Network and Telecommunications Risks Chapter Six.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security fundamentals Topic 10 Securing the network perimeter.
Module 10: Providing Secure Access to Remote Offices.
A Network Security -Firewall Bruce Turin.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Firewalls By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Security fundamentals
Chapter 7. Identifying Assets and Activities to Be Protected
Firewall Techniques Matt Cupp.
TECHNOLOGY GUIDE THREE
Network Security Marshall Leitem 11/30/04
Planning and Troubleshooting Routing and Switching
Prepared By : Pina Chhatrala
Securing the Network Perimeter with ISA 2004
Introduction to Computers
Welcome To : Group 1 VC Presentation
Digital Pacman: Firewall Edition
Message Digest Cryptographic checksum One-way function Relevance
Virtual Private Network
Security Protocols in the Internet
Firewalls Routers, Switches, Hubs VPNs
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Network Security Overview Tales from the trenches

Why security? increasingly hostile public network cost of downtime value of the information

Increasingly hostile public network

Increasingly hostile public network(2) intruders are prepared and organized Internet attacks are easy, low risk, and hard to trace intruder tools are - increasingly sophisticated - easy to use, especially by novice intruders - designed to support large-scale attacks source code is not required to find vulnerabilities the complexity of the Internet, protocols, and applications are all increasing along with our reliance on them

Increasingly hostile public network(3)

Cost of downtime

Value of the information Large stores of Credit Card information stored on DB servers Intellectual property valued in the Millions

Basic Categories PolicyPhysical IP based Software/OS based

Holistic approach

Policy usage External services allowed Acceptable use User and resource architecture Virus response

IP based Routers Packet filtering Packet filteringFirewalls Packet inspection versus packet filter Packet inspection versus packet filter Ability to build rulesets Ability to build rulesetsSwitches/VLAN Isolating IP segments using VLANS Isolating IP segments using VLANS

Software Proxy servers Software firewalls vs. hardware OS security Unix/MS Patches and updates

Remote access security versus usability P: drive access P: drive access options for remote access extranet extranet web access web access VPN VPN Private dial up Private dial up

Extranet Secure web site with access to specific data Requires login Can provide access to all information available “on site”

VPN Virtual private network Creates a Secure Tunnel between two points on a network All data traveling on the tunnel is encrypted Should use encryption for tunnel creation

Physical security Data center access Multi-homed Redundant utilities (power, HVAC) Fire suppression