Fine Tuned Machines Wireless & Network Security Integration Solution Overview Offense – FTM March 6 th, 2010.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Mr C Johnston ICT Teacher
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Separate Domains of IT Infrastructure
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Team MAGIC Michael Gong Jake Kreider Chris Lugo Kwame Osafoh-Kintanka Wireless Network Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE Intercontinental Group 1.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Wireless Network Security
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Enterprise Network Security Accessing the WAN Lecture week 4.
5205 – IT Service Delivery and Support
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Course 201 – Administration, Content Inspection and SSL VPN
Uday O. Ali Pabrai, CISSP, CHSS Chief executive, HIPAA Academy Health care & HIPAA Security Remediation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Information Security Technological Security Implementation and Privacy Protection.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
SEC835 Database and Web application security Information Security Architecture.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 6 of the Executive Guide manual Technology.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Security in Wireless Networks 458 Security Offense Debate: Wireless Security by Cisco Group DoubleDeuce Jibran Ilyas Frank LaSota Paul Lowder Juan Mendez.
IS3220 Information Technology Infrastructure Security
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Network System Security - Task 2. Russell Johnston.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Working at a Small-to-Medium Business or ISP – Chapter 8
Control system network security issues and recommendations
Wireless Network Security
Contact Center Security Strategies
Chapter 4: Protecting the Organization
How to Mitigate the Consequences What are the Countermeasures?
Wireless Network Security
PLANNING A SECURE BASELINE INSTALLATION
Test 3 review FTP & Cybersecurity
Agenda The current Windows XP and Windows XP Desktop situation
Global One Communications
Presentation transcript:

Fine Tuned Machines Wireless & Network Security Integration Solution Overview Offense – FTM March 6 th, 2010

Fine Tuned Machines Unified vs. Non-Unified WLAN Non - UnifiedUnified The paper claims that the Unified System will save costs, but this claim is unsubstantiated 03/06/2010MSIT FTM Group2

Fine Tuned Machines Total Cost of Ownership 3MSIT FTM Group To determine cost savings, a company must evaluate: Is there a savings in acquiring the new infrastructure? Will the savings be achieved in ongoing maintenance and upgrades? What is the ROI and Payback Period? Is the project in line with the company’s strategic priorities, for example, supporting a growing mobile population? How does a diverse workforce or global presence impact the decision? 03/06/2010

Fine Tuned Machines Total Cost of Ownership 4MSIT FTM Group Acquisition cost is a fraction of the total cost of ownership Initial acquisition cost of IT technologies usually represents only 20 percent of the TCO over a five- year period. The remaining 80 percent of the cost-the ongoing upgrades, maintenance, and support-are often overlooked during the initial phases of a new technology rollout. Both areas must be evaluated in the context of ROI before purchasing Unified Network Equipment 03/06/2010

Fine Tuned Machines TCO for Unified vs. Non Unified MSIT FTM Group503/06/2010

Fine Tuned Machines Cost Savings is Not Substantiated 6MSIT FTM Group Unified WLANs can save money in the following areas, not defined in the paper: Vendor Negotiations Vendor Management Reduced Training Costs Streamlined Reports Improved Security Lower Labor Costs Lower Infrastructure and Energy Costs Less Unplanned Downtime 03/06/2010

Fine Tuned Machines Secure Communications Cisco Article states: “…, a network-wide security solution that only addresses WLAN-related attacks is dangerously unbalanced.” 7MSIT FTM Group Yet… 03/06/2010

Fine Tuned Machines Secure Communications 8MSIT FTM Group No Recommended Cisco Feature ?!?!?!? 03/06/2010

Fine Tuned Machines Intrusion Detection The Cisco Security Agent (CSA): - uses “Signature-based anti-virus protection to identify and remove known malware 9MSIT FTM Group - The operative word here is “known” - What is “Zero Update Protection” - No mention of a Statistical -based detection method for DDoS type attacks. 03/06/2010

Fine Tuned Machines Intrusion Detection 10MSIT FTM Group03/06/2010

Fine Tuned Machines Security Policy Challenges Bad Passwords – Low complexity password policies can allow malicious users to guess passwords and gain access to network resources regardless of well-crafted policy. Central Authentication/Configuration – One must not only be concerned with user authentication, but also authenticated access point configuration and management. – Remove telnet access from devices and move to SSH or better remote access. – Use non-public version of SNMP for both read/write access. MSIT FTM Group1103/06/2010

Fine Tuned Machines Segmenting Networks Network Admission Controller Configuration – Implement NAC to establish baseline of secure access before wired/wireless nodes connects to network. – Does node have updated virus signatures? Doses this node show symptoms of an infection? – NAC can be single point of failure if authentication server is compromised. MSIT FTM Group1203/06/2010

Fine Tuned Machines Mobile Device Intrusion WLAN Access – Mobile devices frequently obtain access to business resources either to mitigate cellular data use or increased speeds on WLAN. – Due to proprietary OS phones may not be able to implement Cisco Security Agent on all network nodes. Flash-disk Access – Phones are frequently charged and synced via USB. – Can be used to bypass IDS, Firewalls, NAC, and CSA. Malicious Applications – Application marketplaces offer a possible vector for attack in the guise of legitimate software. MSIT FTM Group1303/06/2010

Fine Tuned Machines Why do I need Cisco Boxes? A slew of Cisco boxes are mentioned but their unique “functional purposes” in the overall enterprise security framework is not clear – More boxes: CSA, NAC, Firewall, IPS, MARS, etc. – What combination of devices is needed (bare essential)? – How can I avoid the dangers of overlaps vs. gaps (must haves)? MSIT FTM Group1403/06/2010

Fine Tuned Machines Enterprise WLAN Security: Defense-In-Depth “Defense-In-Depth” is mentioned but the article lacks explaining what that constitutes and more importantly, how their products map. “Defense-In-Depth” is a ring architecture which has multiple unique layers of security functions that in unity provide a robust solution. MSIT FTM Group1503/06/2010

Fine Tuned Machines Defense-In-Depth: what is missing? 1. Security Policy 2. Network Level Security 3. Host Level Security 4. Application Level Security 5. Logging and Auditing MSIT FTM Group1603/06/2010

Fine Tuned Machines Defense-In-Depth: what is missing cont. Weakest link in the chain – Host Level Security Access Point- SSIDs, encryption, MAC, IP – Application Level Security OS: hot fixes/patches/updates Applications: essential vs. non-essential Access: “least privilege principle” Protection: accounts, passwords, anti-virus, spyware, firewalls MSIT FTM Group1703/06/2010

Fine Tuned Machines Some Powerful Wireless Exploitation Tools According to “sectools.org” top 5 wireless cracking tools: Wardriving, warwalking, war-*, etc. Aircrack-ng – one of the fastest WEP/WPA crack tool available A) Computing resources B) KEY complexity C) Dictionary Youtube Demo MSIT FTM Group18 KismetNetStumblerAircrack-ngAirSnortKisMAC 03/06/2010

Fine Tuned Machines MSIT FTM Group1903/06/2010