Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.

Slides:



Advertisements
Similar presentations
Security and Systems. Three tenets of security Confidentiality Integrity Availability.
Advertisements

Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security+ Guide to Network Security Fundamentals
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
E-Commerce Security and Fraud Issues and Protections
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
NETWORK SECURITY.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Securing Information Systems
Chapter 10 E-Commerce Security.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
C8- Securing Information Systems
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
IS Network and Telecommunications Risks Chapter Six.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Network Security Overview
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Securing Information Systems
Security Issues in Information Technology
Chapter 40 Internet Security.
Securing Information Systems
Securing Information Systems
IS4550 Security Policies and Implementation
Chapter 9 E-Commerce Security and Fraud Protection
INFORMATION SYSTEMS SECURITY and CONTROL
Network Security Mark Creighton GBA 576 6/4/2019.
Presentation transcript:

Network Infrastructure Security

LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people. LAN software and practices also need to provide for the security of these programs and data. LAN risk and issues Dial-up access controls Network Infrastructure Security

Client-Server Security Control techniques in place  Securing access to data or application  Use of network monitoring devices  Data encryption techniques  Authentication systems  Use of application level access control programs Network Infrastructure Security

Client/Server Security Client/server risks and issues  Access controls may be weak in a client-server environment.  Change control and change management procedures.  The loss of network availability may have a serious impact on the business or service.  Obsolescence of the network components  The use of modems to connect the network to other networks Network Infrastructure Security

Client/Server Security Client/server risks and issues  The connection of the network to public switched telephone networks may be weak  Changes to systems or data  Access to confidential data and data modification may be unauthorized  Application code and data may not be located on a single machine enclosed in a secure computer room, as with mainframe computing Network Infrastructure Security

Wireless Security Threats and Risk Mitigation Threats categorization : Errors and omissions Fraud and theft committed by authorized or unauthorized users of the system Employee sabotage Loss of physical and infrastructure support Malicious hackers Industrial espionage Malicious code Foreign government espionage Threats to personal privacy Network Infrastructure Security

Wireless Security Threats and Risk Mitigation Security requirements Authenticity Nonrepudiation Accountability Network availability Network Infrastructure Security

Internet Threats and Security Passive attacks  Network analysis  Eavesdropping  Traffic analysis Active attacks  Brute-force attack  Masquerading  Packet replay  Phishing  Message modification  Unauthorized access through the Internet or web-based services  Denial of service  Dial-in penetration attacks  bombing and spamming  spoofing Network Infrastructure Security

Internet Threats and Security Threat impact  Loss of income  Increased cost of recovery  Increased cost of retrospectively securing systems  Loss of information  Loss of trade secrets  Damage to reputation  Legal and regulatory noncompliance  Failure to meet contractual commitments  Legal action by customers for loss of confidential data Network Infrastructure Security

Internet Threats and Security Causal factors for internet attacks  Availability of tools and techniques on the Internet  Lack of security awareness and training  Exploitation of security vulnerabilities  Inadequate security over firewalls Internet security controls Network Infrastructure Security

Firewall Security Systems Firewall general features Firewall types  Router packet filtering  Application firewall systems  Stateful inspection Network Infrastructure Security

Firewall Security Systems Firewall issues  A false sense of security  The circumvention of firewall  Misconfigured firewalls  What constitutes a firewall  Monitoring activities may not occur on a regular basis  Firewall policies Network Infrastructure Security

Intrusion Detection Systems (IDS) An IDS works in conjunction with routers and firewalls by monitoring network usage anomalies. Network-based IDSs Host-based IDSs Network Infrastructure Security

Intrusion Detection Systems (IDS) Components: Sensors that are responsible for collecting data Analyzers that receive inputo from sensors and determine intrusive activity An administration console A user interface Network Infrastructure Security

Intrusion Detection Systems (IDS) Types include: Signature-based Statistical-based Neural networks Network Infrastructure Security

Intrusion Detection Systems (IDS) Features: Intrusion detection Gathering evidence on intrusive activity Automated response Security monitoring Interface with system tolls Security policy management Network Infrastructure Security

Intrusion Detection Systems (IDS) Limitations: Weaknesses in the policy definition Application-level vulnerabilities Backdoors into applications Weaknesses in identification and authentication schemes Network Infrastructure Security

Honeypots and Honeynets High interaction – Give hackers a real environment to attack Low interaction – Emulate production environments

Encryption Key elements of encryption systems Encryption algorithm Encryption key Key length Private key cryptographic systems Public key cryptographic systems Network Infrastructure Security

Encryption (Continued) Digital signatures  Data integrity  Authentication  Nonrepudiation  Replay protection Network Infrastructure Security

Digital Envelope Used to send encrypted information and the relevant key along with it. The message to be sent, can be encrypted by using either: Asymmetric key Symmetric key

Encryption (Continued) Public key infrastructure Digital certificates Certificate authority (CA) Registration authority (RA) Certificate revocation list (CRL) Certification practice statement (CPS) Network Infrastructure Security

Encryption risks and password protection Viruses Virus and worm controls Technical controls Anti-virus software implementation strategies

Network Infrastructure Security VOICE-OVER IP - Advantages  Unlike traditional telephony VoIP innovation progresses at market rates Lower costs per call, or even free calls, especially for long-distance calls Lower infrastructure costs. Once IP infrastructure is installed, no or little additional telephony infrastructure is needed.

Network Infrastructure Security VOICE-OVER IP - VoIP Security Issues Inherent poor security  The current Internet architecture does not provide the same physical wire security as the phone lines.