© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Chapter 9: Access Control Lists
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Switched Networks Routing and Switching.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Access Control Lists Accessing the WAN – Chapter 5.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Troubleshooting the Network Connecting Networks.
Chapter 7 HARDENING SERVERS.
Network Security Testing Techniques Presented By:- Sachin Vador.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Chp. 8: ISP Responsibility
COEN 252: Computer Forensics Router Investigation.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Windows 7 Firewall.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Managing Networks and Network Devices
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 11: It’s a Network
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
– Chapter 3 – Device Security (B)
– Chapter 3 – Device Security (B)
Networking for Home and Small Businesses – Chapter 8
Securing Windows 7 Lesson 10.
Network hardening Chapter 14.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8

2 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Objectives  Describe ISP security policies and procedures.  Describe the tools used in implementing security at the ISP.  Describe the monitoring and managing of the ISP.  Describe the responsibilities of the ISP with regard to maintenance and recovery.

3 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ISP Security Considerations  Helping clients to create secure passwords  Securing applications  Removing vulnerabilities  Configuring firewalls  Performing security scans

4 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ISP Security Considerations Common security practices:  Encrypting data stored on servers  Using permissions to secure access  Implement user accounts  Assign levels of access

5 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ISP Security Considerations Three steps used to reduce network vulnerability:  Authentication  Authorization  Accounting

6 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ISP Security Considerations  Encryption: use the secure version of a protocol whenever confidential data is being exchanged

7 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Tools  Access control lists and port filtering protect against DoS and DDoS attacks

8 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Tools  Firewalls use ACLs to control which traffic is passed or blocked

9 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Tools  Intrusion Detection System (IDS)  Intrusion Prevention System (IPS)

10 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Tools Wireless security:  Changing default settings  Enabling authentication  MAC filtering  Encryption

11 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Tools  Host-based firewalls control inbound and outbound network traffic

12 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Tools Targets of host security:  Known attacks  Exploitable services  Worms and viruses  Back doors and Trojans

13 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Monitoring and Managing the ISP  Typical features of a Service Level Agreement (SLA):

14 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Monitoring and Managing the ISP  Monitoring network link performance

15 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Monitoring and Managing the ISP In-band management:  Telnet Virtual Terminal (VTY) session  Secure Shell (SSH): preferred for security

16 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Monitoring and Managing the ISP  SNMP enables administrators to gather data about the network  Syslog uses syslog clients to generate and forward log messages to syslog servers

17 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Backups and Disaster Recovery Factors in choosing backup media:  Amount of data  Cost of media  Performance  Reliability  Ease of offsite storage

18 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Backups and Disaster Recovery Methods of file backup:  Normal  Differential  Incremental

19 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Backups and Disaster Recovery How to ensure successful backups:  Swap media  Review backup logs  Trial restores  Drive maintenance

20 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Backups and Disaster Recovery  Use TFTP to protect configurations and Cisco IOS software  Restore a Cisco IOS image using TFTP in ROMmon mode

21 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Backups and Disaster Recovery  Steps to designing an effective recovery plan:

22 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Backups and Disaster Recovery  Phases to creating and implementing a disaster recovery plan:

23 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Summary  ISPs provide desktop security services for customers, such as creating passwords, implementing patches and updates, and assigning permissions.  Many protocols offer secure versions utilizing digital encryption, which should be used when the data being exchanged is confidential.  Port filtering and Access Lists use TCP and UDP port features to permit or deny traffic.  Firewalls can utilize hardware or software to define what traffic can come into or go out of parts of a network.  ISPs are responsible for providing efficient and effective backup and disaster recovery methods for their customers.

24 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public