James Robnett EVLA M&C Software PDR May 14-15 2002 1 EVLA Monitor & Control Software PDR Monitor & Control Network Security.

Slides:



Advertisements
Similar presentations
Web Server Administration TEC 236 Securing the Web Environment.
Advertisements

Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
IS Network and Telecommunications Risks
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Network Security Overview Tales from the trenches.
Chapter 7 Firewalls. Firewall Definition  A network device that enforces network access control based upon a defined security policy.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Web server security Dr Jim Briggs WEBP security1.
Chapter 2 Networking Overview. Figure 2.1 Generic protocol layers move data between systems.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Firewalls: General Principles & Configuration (in Linux)
1 Enabling Secure Internet Access with ISA Server.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
By: Colby Shifflett Dr. Grossman Computer Science /01/2009.
Course 201 – Administration, Content Inspection and SSL VPN
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
James Robnett EVLA M&C Hardware PDR March EVLA Monitor and Control M&C Network.
Web Server Administration Chapter 10 Securing the Web Environment.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
James Robnett EVLA M&C Hardware PDR March EVLA M&C Hardware PDR Voice Communications.
Module 9: Fundamentals of Securing Network Communication.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
ClearTunnel Close the SSL Hole! Copyright ©2008 Collective Software, LLC.
Proxy Servers.
James Robnett EVLA M&C Hardware CDR October 20, EVLA Monitor and Control M&C Network.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Security fundamentals Topic 10 Securing the network perimeter.
High Availability (HA)  Goal : a solution for reliability, availability, and serviceability in Linux.  Focus on the services in the network.  Use the.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Module 10: Windows Firewall and Caching Fundamentals.
A Network Security -Firewall Bruce Turin.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Purpose Present Drivers and Context for Firewalls Define Firewall Technology Present examples of Firewall Technology Discuss Design Issues Discuss Service.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Bill SahrEVLA Advisory Committee Meeting September 8-9, EVLA Monitor & Control.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Security fundamentals
Palo Alto Networks Certified Network Security Engineer
CompTIA Security+ Study Guide (SY0-401)
CONNECTING TO THE INTERNET
Network Security 101 By: David Crim.
CompTIA Security+ Study Guide (SY0-401)
ISMS Information Security Management System
Security Protocols in the Internet
EVLA M/C Software PDR, 14 May 2002
IS 4506 Server Configuration (HTTP Server)
Install AD Certificate Services
Cengage Learning: Computer Networking from LANs to WANs
Advanced Computer Networks
Presentation transcript:

James Robnett EVLA M&C Software PDR May EVLA Monitor & Control Software PDR Monitor & Control Network Security

James Robnett EVLA M&C Software PDR May Requirements Accessibility –Operators –Engineers –Scientists Monitor vs. Control –Read vs. write Security –Acceptable risk

James Robnett EVLA M&C Software PDR May Access From M&C systems to antennas From VLA to antennas From AOC to antennas From NRAO to antennas From non-NRAO to antennas

James Robnett EVLA M&C Software PDR May Vulnerabilities M&C systems M&C/Antenna Network MIB Other ?

James Robnett EVLA M&C Software PDR May M&C systems (Linux, Solaris, Windows) Virus Root access Denial of Service M&C software itself

James Robnett EVLA M&C Software PDR May M&C and antenna network Network Devices –CISCO IOS NTP vulnerability Announced May 8 th –TCP/IP stack Network flooding

James Robnett EVLA M&C Software PDR May MIB vulnerabilities TCP/IP stack Telnet (authentication) HTTP server NTP Denial of service –Port flooding Human Error

James Robnett EVLA M&C Software PDR May Direct Access Firewall –Limit access based on Source IP Sender Digital Certificate –MIB awareness –Throttle flooding –Encryption precludes content filtering Can’t guarantee packet integrity

James Robnett EVLA M&C Software PDR May Indirect Access –Proxy service Request proxy Web Proxy –Virtual antenna Same client software –Remote display X11 or Citrix –slow