Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Controls for Information Security
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
1 Guide to Network Defense and Countermeasures Chapter 2.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Ingredients of Security
NetTech Solutions Protecting the Computer Lesson 10.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Module 10: Windows Firewall and Caching Fundamentals.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
IS3220 Information Technology Infrastructure Security
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Information Systems Design and Development Security Risks Computing Science.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Security Issues in Information Technology
CompTIA Security+ Study Guide (SY0-401)
IDS Intrusion Detection Systems
Instructor Materials Chapter 7 Network Security
Network Security Marshall Leitem 11/30/04
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
CompTIA Security+ Study Guide (SY0-401)
Firewalls Purpose of a Firewall Characteristic of a firewall
برنامج أمن أنظمة الحاسب
Firewalls Routers, Switches, Hubs VPNs
Faculty of Science IT Department By Raz Dara MA.
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
Presentation transcript:

Joe Budzyn Jeff Goeke-Smith Jeff Utter

Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most likely and most expensive risks

Firewalls  What is a firewall? A technology for the selective allowance of network traffic.  Types of firewalls Stateful or Stateless Software or Hardware  Border or Intranet

Firewalls  Rule Set Methodology Mostly Open Mostly Closed  Zones Untrust Trust DMZ

IDS / IPS  Network Device that identifies and optionally stops hostile network traffic  Signature based detection Signatures can match on packet content Signatures can match on behavior  Deployed at network choke points Generally in conjunction with a firewall Border of an office, a workgroup, a building, or a campus

Encryption  Encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.  Public Key / Private Key  Pre-shared Key  Example Uses Disk Encryption, File Encryption Secure (i.e. PGP)

VPN  Network tunnel over a more general network  Implies channel encryption, authentication, authorization  May be used to avoid firewalls and IPS/IDS systems on the path of the tunnel  Deployed next to firewalls for remote access or administrative access.

Secure Remote Access  Remote Desktop Client  SSH  Network Tunnels  Two Factor Authentication  Key Based Authentication

Tripwire  Tripwire watches for changes to files for monitored systems.  Enterprise Tripwire runs with a server and clients. Remote monitoring of changes, with alerts. Ability to approve or roll back some changes.  Useful in the detection of intentional and unintentional changes.

Network Flow Analysis  Look for ‘odd’ behavior rather than ‘odd’ content.  Traffic sent to an analysis engine via a mirror, or summarized by the routers  Multiple products exist with differing emphasis Arbor Networks Q1 labs

Anti-Malware  Malware is any piece of malicious code or a program that embeds itself onto a computer without the user’s knowledge.  Examples Virus Spam Trojan Root kit Spyware Adware Key Logger

Anti-Malware  What to do about it? DON’T OPEN ATTACHMENTS THAT YOU ARE NOT EXPECTING. ○ ESPECIALLY IF YOU DON’T TRUST THE SOURCE Keep an up to date Anti-Malware application (or suite) installed and running. ○ Many different vendors and some free apps do this.

Security Practices - Servers  Patch Management All systems are vulnerable, patching makes them less so  Log Analysis Learn what is normal, then watch for the abnormal  Secure Configuration Pick a standard and follow it

Security Practices - Users  All users on the network are integral to overall security User Education Campaigns  User Policy Tools Group Policy, reviewing logs

Denial of Service Protection  Types of DoS UDP flood, SYN flood, ICMP flood, backscatter, distributed, packet of death, BGP route injection  Type of protection Routing infrastructure Firewalls Special adaptive devices

Advanced Network Tricks  Honey Pots – a weakened computer meant to attract attackers  Tar Pits – a series of fake computers meant to slow attackers down  Dark Nets – a network of fake computers meant to determine what attackers are doing

Managing Your Identities  Common complaint: I have too many passwords to remember! This may lead to sticky notes under keyboards  Password Wallet or Password Safe  Public key / private key encryption  Password generation algorithms