Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.

Slides:



Advertisements
Similar presentations
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Advertisements

Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Security+ Guide to Network Security Fundamentals
Security Awareness Chapter 5 Wireless Network Security.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
WLAN What is WLAN? Physical vs. Wireless LAN
Securing a Wireless Network
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Storage Security and Management: Security Framework
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Lab #2 CT1406 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless Networks Tamus, Zoltán Ádám
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Presented by: Dr. Munam Ali Shah
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Wireless Networking & Security Greg Stabler Spencer Smith.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Network Security Part III: Security Appliances Firewalls.
Lecture 24 Wireless Network Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
IS3220 Information Technology Infrastructure Security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Network Security 1. Overview What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures Firewalls & Intrusion.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Securing Interconnect Networks By: Bryan Roberts.
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
Network System Security - Task 2. Russell Johnston.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Understand Wireless Security LESSON Security Fundamentals.
Lab #2 NET332 By Asma AlOsaimi.
Instructor Materials Chapter 6 Building a Home Network
Wireless Network Security
CSE 4905 Network Security Overview
Security of a Local Area Network
Chapter 12 Communications Security & Countermeasures
Introduction to Network Security
Presentation transcript:

Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure routers and networks with routers. Wireless LAN(WLAN) and its security. Shared success

What is Network security? comprises the measures a company takes to protect its computer system. consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Shared success Why do we need security? Confidentiality: only sender, intended receiver should “understand” message contents – sender encrypts message – receiver decrypts message – Privacy: hide `who is doing what with whom` Authentication: sender, receiver want to confirm identity of each other Integrity: sender, receiver want to ensure messages are not altered (in transit, or afterwards) without detection Access and Availability: services must be accessible and available to users

Shared success Confidentiality Protecting sensitive information from unauthorized disclosure or interception. Integrity Safeguarding the accuracy and completeness of information Availability Ensuring that information and vital services are available to users when required. Information Security

Shared success Who is vulnerable? Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK

Shared success Common security attacks and their countermeasures Finding a way into the network – Firewalls Exploiting software bugs, buffer overflows – Intrusion Detection Systems Denial of Service – Ingress filtering, IDS TCP hijacking – IPSec Packet sniffing – Encryption (SSH, SSL, HTTPS) Social problems – Education

Shared success Examples of some attacks

Shared success Router security router’s route tables router’s access control router filtering configuration router cryptographic security features

Shared success Router Security cont.. Protecting the Router Itself:  Physical Security  Operating System  Configuration Hardening : Unnecessary services should be disabled in the router configuration. Protecting the Network with the Router:  Packet Filters for TCP/IP  Permit Only Required Protocols and Services  Reject Risky Protocols and Services

Shared success Router Security conti..  Address Filtering  Reject all traffic from the internal networks that bears a source IP address which does not belong to the internal networks.  Reject all traffic from the external networks that bears a source address belonging to the internal networks.  Reject all traffic with a source or destination address belonging to any reserved, unroutable, or illegal address range.

Shared success Managing the Router Access Mechanisms for Administrators Local and remote Administration  Local – Console  Remote – Telnet/SSH or SNMPv3 AAA servers(RADIUS or TACACS+) are being used for administration access control. Updating the Router – operating system and configuration file. Logging Operational Security Management: Maintaining the security of a router over its operational lifetime requires regular assessment, testing, and correction.

Shared success Wireless LAN and its security Features of WLAN(IEEE802.11): Networking based on radio waves rather than wired cables. convenience especially for the cases when mobility is required. A good solution when short-term or emergency connections are needed. It is not as Secure, fast or reliable as wired network.

Shared success Security Attacks Traffic Analysis Passive Eavesdropping Active Eavesdropping Unauthorized Access Man-in-the-middle Attacks Session High-Jacking Replay Attacks Rouge AP Dos Attacks

Shared success Security measures  Carefully select SSID to be unique and disable SSID broadcast mode.  Configure MAC address filtering mechanism on Aps.  Disable DHCP if any.  Apply Best encryption mechanism supported by the AP.  WEP(Wired Equivalent Privacy ) – Easy to break  The Wi-Fi Protected Access (WPA and WPA2) security protocols were later created to address the problems with WEP.  Locking down the AP – Disable administration access of AP from Wireless side.  Restricted access networks - The standard method of WLAN authentication uses the 802.1X protocol. If the protocol is enabled, unauthenticated users cannot get past the AP to access the rest of the network.  Enable VPN access only.

Shared success Thank you Shared success