Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems

Slides:



Advertisements
Similar presentations
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
Advertisements

Security in the NT Environment at SLAC HEPNT at CERN December 4, 1998 Bob Cowles, SLAC.
Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Firewall Configuration Strategies
Security+ Guide to Network Security Fundamentals
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Using Freeware Tools for Internet Security Copyright, Peter Shipley Peter shipley Network security associates
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
Computer & Network Security
COEN 252 Computer Forensics Collecting Network-based Evidence.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Network Security Management Tools. MCNS—Network Security Management Tools—17-2 Copyright  1998, Cisco Systems, Inc. Objectives Describe security vulnerability.
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
1 Quick Overview Overview Network –IPTables –Snort Intrusion Detection –Tripwire –AIDE –Samhain Monitoring & Configuration –Beltaine –Lemon –Prelude Conclusions.
Firewall Security.
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
Network Security Part III: Security Appliances Firewalls.
Module 11: Designing Security for Network Perimeters.
Scott Charney Cybercrime and Risk Management PwC.
Intrusion Detection on a Shoestring Budget Shane Williams UT Austin Graduate School of Library and Information Science Oct. 18, 2000 SANS Network Security.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Network Security Major Problems Network Security Major Problems Why Firewall? Why Firewall? Problems with Firewalls Problems with Firewalls What is.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
HONEYPOTS An Intrusion Detection System. Index Intrusion Detection System Host bases Intrusion Detection System Network Based Intrusion Detection System.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Getting Online, Working Online
CSCE 548 Student Presentation By Manasa Suthram
Risk management.
Network Security Analysis Name : Waleed Al-Rumaih ID :
Click to edit Master subtitle style
ISMS Information Security Management System
Using An Isolated Network to Teach Advanced Networks and Security
IS4680 Security Auditing for Compliance
Firewalls Routers, Switches, Hubs VPNs
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
Introduction to Systems Security
IP-Spoofing and Source Routing Connections
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Information Assurance & Network Security Certificate
Network hardening Chapter 14.
Internet Engineering Course
Getting Online, Working Online
Getting Online, Working Online
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems

Overview Why Network Security? Types of Security Network Configurations Intrusion Detection Maintaining Security

Why Network Security? EMS as installed: –no outside connections –no or limited dialup –few threats

Why Network Security? EMS today –Network connections Company Internet –Dialup –More threats “Hackers” Competitors Terrorists

Types of Security Host Security –Passwords –OS –Vulnerability Analysis –Intrusion Detection Network Security –Firewalls –Packet Filtering –Vulnerability Analysis –Intrusion Detection

Common EMS Network

Add a Layer of Protection

Add Intrusion Detection

Isolate the Intrusion Detection

Firewalls Commercial product is probably best Consider location when choosing brand and type –Parallel implementations Use same type and brand as main Internet firewall –Series implementations Use different brand from main firewall

Packet Filtering Available in most routers Used where a firewall is overkill More difficult to maintain

Vulnerability Analysis Host based –COPS (UNIX) –ASET (Solaris) –SCE (NT) –Commercial Network Based –SATAN –nmap –Commercial

Intrusion Detection Host Based –Tripwire (UNIX) –Commercial (Other) Network Based –SHADOW –Commercial

Building an Intrusion Detection System (IDS) Obtain Software Obtain Hardware –Sensor Requirements –Analysis Station Requirements Install the sensor –OS –tcpdump, libpcap, ssh, SHADOW –Configure Install the analysis system –OS –tcpdump, libpcap, ssh, apache, browser, SHADOW –Configure

Maintaining Security Keep up with the latest exploits Ongoing education Newsletters Incident Response Groups NIPC - Infragard