Defense in Depth. 1.A well-structured defense architecture treats security of the network like an onion. When you peel away the outermost layer, many.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Chapter 12 Network Security.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
Website Hardening HUIT IT Security | Sep
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
70-411: Administering Windows Server 2012
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Firewall Security.
Module 11: Designing Security for Network Perimeters.
Introduction to Information Security
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security fundamentals Topic 10 Securing the network perimeter.
NetTech Solutions Protecting the Computer Lesson 10.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Purpose Present Drivers and Context for Firewalls Define Firewall Technology Present examples of Firewall Technology Discuss Design Issues Discuss Service.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Chapter 6 Application Hardening
Network Security Analysis Name : Waleed Al-Rumaih ID :
1.
CompTIA Server+ Certification (Exam SK0-004)
Securing the Network Perimeter with ISA 2004
Chapter 4: Security Baselines
Introduction to Networking
Security in Networking
CompTIA Security+ Study Guide (SY0-401)
6.6 Firewalls Packet Filter (=filtering router)
IS4550 Security Policies and Implementation
Unit 27: Network Operating Systems
IS4680 Security Auditing for Compliance
Implementing Client Security on Windows 2000 and Windows XP Level 150
Firewalls.
Designing IIS Security (IIS – Internet Information Service)
Implementing Firewalls
Presentation transcript:

Defense in Depth

1.A well-structured defense architecture treats security of the network like an onion. When you peel away the outermost layer, many remain underneath it. 2.Defense in depth helps you protect network resources even if one of the security layers is compromised. After all, no single security component can be guaranteed to withstand every attack it might need to face. 3.We operate in a real world of system misconfigurations, software bugs, disgruntled employees, and overloaded system administrators. 4.Moreover, any practical security design needs to accommodate business needs that might require us to open certain firewall ports, leave additional services running on the server, or prevent us from applying the latest security patch because it breaks a business-critical application.

Defense in Depth 1.Treating perimeter security components as parts of a coherent infrastructure allows us to deploy them in a way that accounts for the weaknesses and strengths of each individual component. 2.Of course, given the requirements of your organization, you might choose not to implement every component discussed here.

Components of Defense in Depth 1.The Perimeter 2.The Internal Network 3.The Human Factor

The Perimeter When we think of network security, we most often think of the perimeter. As we mentioned earlier in this chapter, the perimeter includes any or all of the following: 1.Static packet filter 2.Stateful firewall 3.Proxy firewall 4.IDS and IPS 5.VPN device

The Internal Network On the internal network, we could have the following "perimeter" devices: 1.Ingress and egress filtering on every router 2.Internal firewalls to segregate resources 3.IDS sensors to function as "canaries in a coal mine" and monitor the internal network On protected systems, we can use the following: 1.Host-centric (personal) firewalls 2.Antivirus software 3.Operating system hardening 4.Configuration management 5.Audits

The Internal Network Configuration management can enforce the following: 1.That all Windows machines have a particular service pack installed 2.That all Linux machines have a specific kernel running 3.That all users with remote-access accounts have a personal firewall 4.That every machine has antivirus signatures updated daily 5.That all users agree to the acceptable-use policy when they log on

The Internal Network An audit typically progresses like this: 1.An informational meeting is held to plan the audit. At the first informational meeting, the auditor finds out what the client wants and expects and establishes risks, costs, cooperation, deliverables, timeframes, and authorization. 2.Fieldwork begins (implementing the audit). When the client is ready, the auditor performs the audit in line with what we established in the planning session. 3.The initial audit report (technical report) takes place. The auditor might prefer to give an initial audit report to the technical representatives of a client before their management sees the final report. This provides the technical staff with an opportunity to address some concerns before the final report goes to management. 4.The final audit report (a nontechnical report with the final technical report) takes place. The final audit report typically contains an executive summary, the general approach used, the specific methodology used, and the final technical report. 5.Follow-up occurs (verified recommendations are performed).

Human Factor 1.Authority Who is responsible. 2.Scope Who it affects. 3.Expiration When it ends. 4.Specificity What is required. 5.Clarity Can everyone understand it? User awareness of your organization's security policy: 1.Have every user sign an acceptable-use policy annually. 2.Set up a security web page with policies, best practices, and news. 3.Send a "Security Tip of the Week" to every user.