Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.

Slides:



Advertisements
Similar presentations
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
Advertisements

Web Server Administration TEC 236 Securing the Web Environment.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 7 HARDENING SERVERS.
Web Server Administration
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
1 Chapter Overview Understanding the Windows 2000 Networking Architecture Using Microsoft Management Console.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Cyber Patriot Training
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 7: Using Windows Servers to Share Information.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Troubleshooting Windows Vista Security Chapter 4.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Two Installing and Configuring Exchange Server 2003.
TCP/IP Transport and Application (Topic 6)
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
TCP/IP (Transmission Control Protocol / Internet Protocol)
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Security fundamentals Topic 2 Establishing and maintaining baseline security.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
COMP1321 Digital Infrastructure Richard Henson March 2016.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Chapter 7: Using Windows Servers
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 6 Application Hardening
Backdoor Attacks.
CompTIA Server+ Certification (Exam SK0-004)
The OSI Model and the TCP/IP Protocol Suite
Chapter 4: Security Baselines
The OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite
Designing IIS Security (IIS – Internet Information Service)
Implementing Firewalls
Presentation transcript:

Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition

Objectives  Disable nonessential systems  Harden operating systems  Harden applications  Harden networks

Disabling Nonessential Systems  First step in establishing a defense against computer attacks is to turn off all nonessential services  Disabling services that are not necessary restricts what attackers can use Reducing the attack surface Hardening the operating system

Disabling Nonessential Systems  Operating systems use programs that run in the background to manage different functions  In Microsoft Windows, a background program, such as Svchost.exe, is called a process  The process provides a service to the operating system indicated by the service name, such as AppMgmt

Viewing Services

Disabling Nonessential Systems  Users can view the display name of a service, which gives a detailed description, such as “Application Management”  A single process can provide multiple services To view these services:  Go to Computer Management  Double-click on Services and Applications  Double-click on Services

Disabling Nonessential Systems Display Name

Disabling Nonessential Systems

 A service can be set to one of the following modes: Automatic Manual Disabled  Besides preventing attackers from attaching malicious code to services, disabling nonessential services blocks entries into the system

Hardening Operating Systems  Hardening: process of reducing vulnerabilities  A hardened system is configured and updated to protect against attacks  Three broad categories of items should be hardened: Operating systems Applications that the operating system runs Networks

Hardening Operating Systems  You can harden the operating system that runs on the local client or the network operating system (NOS) that manages and controls the network, such as Windows Server 2003 or Novell NetWare ,00.html?bucket=REF

Applying Updates  Operating systems are intended to be dynamic  As users’ needs change, new hardware is introduced, and more sophisticated attacks are unleashed, operating systems must be updated on a regular basis  However, vendors release a new version of an operating system every two to four years  Vendors use certain terms to refer to the different types of updates.

Applying Updates (continued)  A service pack (a cumulative set of updates including fixes for problems that have not been made available through updates) provides the broadest and most complete update  A hotfix does not typically address security issues; instead, it corrects a specific software problem

Applying Updates (continued)

 A patch or a software update fixes a security flaw or other problem May be released on a regular or irregular basis, depending on the vendor or support team A good patch management system:  Design patches to update groups of computers  Include reporting system  Download patches from the Internet  Distribute patches to other computers

Securing the File System  Another means of hardening an operating system is to restrict user access  Generally, users can be assigned permissions to access folders (also called directories) and the files contained within them

Securing the File System  Microsoft Windows provides a centralized method of defining security on the Microsoft Management Console (MMC) A Windows utility that accepts additional components (snap-ins) After you apply a security template to organize security settings, you can import the settings to a group of computers (Group Policy object)

Securing the File System  Group Policy settings: components of a user’s desktop environment that a network system administrator needs to manage  Group Policy settings cannot override a global setting for all computers (domain-based setting)  Windows stores settings for the computer’s hardware and software in a database (the registry)

Hardening Applications  Just as you must harden operating systems, you must also harden the applications that run on those systems  Hotfixes, service packs, and patches are generally available for most applications; although, not usually with the same frequency as for an operating system Think of Microsoft Office

Hardening Servers (continued)  Mail server is used to send and receive electronic messages  In a normal setting, a mail server serves an organization or set of users  All is sent through the mail server from a trusted user or received from an outsider and intended for a trusted user

Hardening Servers (continued)  In an open mail relay, a mail server processes messages not sent by or intended for a local user  File Transfer Protocol (FTP) server is used to store and access files through the Internet Typically used to accommodate users who want to download or upload files

Hardening Servers (continued)

Hardening Servers  Harden servers to prevent attackers from breaking through the software  Web server delivers text, graphics, animation, audio, and video to Internet users around the world  Refer to the steps on page 115 to harden a Web server

Hardening Servers (continued)  FTP servers can be set to accept anonymous logons  A Domain Name Service (DNS) server makes the Internet available to ordinary users DNS servers frequently update each other by transmitting all domains and IP addresses of which they are aware (zone transfer)

Hardening Servers (continued)

Hardening Networks  Two-fold process for keeping a network secure: Secure the network with necessary updates (firmware) Properly configure the network devices Security Configuration Wizard Windows Server 2003 Security Guide

Firmware Updates  RAM is volatile―interrupting the power source causes RAM to lose its entire contents  Read-only memory (ROM) is different from RAM in two ways: Contents of ROM are fixed ROM is nonvolatile―disabling the power source does not erase its contents

Firmware Updates (continued)  ROM, Erasable Programmable Read- Only Memory (EPROM), and Electrically Erasable Programmable Read-Only Memory (EEPROM) are firmware (flash)  The contents of EEPROM chips can also be erased using electrical signals applied to specific pins. Most ROM chips these days can be updated – “flashed”

Firmware Updates (continued)  To update a network device we copy over a new version of the OS software to the flash memory of the device.  This can be done via a tftp server or a compact flash reader/writer Router# copy tftp flash:  Having the firmware updated ensures the device is not vulnerable to bugs in the OS that can be exploited

Network Configuration  You must properly configure network equipment to resist attacks  The primary method of resisting attacks is to filter data packets as they arrive at the perimeter of the network  In addition to making sure the perimeter is secure, make sure the device itself is secure by using strong passwords and encrypted connections SSH instead of Telnet and console, vty passwords

Configuring Packet Filtering  The User Datagram Protocol (UDP) provides for a connectionless TCP/IP transfer  TCP and UDP are based on port numbers  Socket: combination of an IP address and a port number The IP address is separated from the port number by a colon, as in :80

Configuring Packet Filtering

Network Configuration  Rule base or access control list (ACL): rules a network device uses to permit or deny a packet (not to be confused with ACLs used in securing a file system)  Rules are composed of several settings (listed on pages 122 and 123 of the text)  Observe the basic guidelines on page 124 of the text when creating rules

Network Configuration

Summary  Establishing a security baseline creates a basis for information security  Hardening the operating system involves applying the necessary updates to the software  Securing the file system is another step in hardening a system

Summary (continued)  Applications and operating systems must be hardened by installing the latest patches and updates  Servers, such as Web servers, mail servers, FTP servers, DNS servers, NNTP servers, print/file servers, and DHCP servers, must be hardened to prevent attackers from corrupting them or using the server to launch other attacks