Overview of Network Security. Network Security2 New Challenges 1.Security does not focus on a “product” only; it is a process and focuses on the whole.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Security Controls – What Works
Security+ Guide to Network Security Fundamentals
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.
Applied Cryptography for Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Stephen S. Yau CSE , Fall Security Strategies.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Introduction to Network Defense
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Adaptive Processes Simpler, Faster, Better 1 Adaptive Processes Understanding Information Security ISO / BS7799.
Storage Security and Management: Security Framework
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Anderson School of Management University of New Mexico.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Information Systems Security
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Definitions of Business, E- Business, and Risk  Business: An organization involved in trade of goods and/or services to the consumers  E-Business: Application.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
April 09, 2008 The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 1 The Demilitarized Zone as an Information Protection.
Note1 (Admi1) Overview of administering security.
Chapter 2 Securing Network Server and User Workstations.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Module 11: Designing Security for Network Perimeters.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 1: Security Governance Through Principles and Policies
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
IS3220 Information Technology Infrastructure Security
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
CS457 Introduction to Information Security Systems
ClearAvenue, LLC Headquartered in Columbia, Maryland
Security Standard: “reasonable security”
Module 1: Introduction to Designing Security
Cloud Testing Shilpi Chugh.
How to Mitigate the Consequences What are the Countermeasures?
Introduction to Network Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Overview of Network Security

Network Security2 New Challenges 1.Security does not focus on a “product” only; it is a process and focuses on the whole “information system”. 2.Scalability demands are increasing. –Any one of the hosts may be compromised … 3.Providing legacy endpoint security becomes expensive. 4.Day zero attacks T. A. Yang

Network Security3 Principles of Security The CIA Model (aka. CIA triad) –Confidentiality prevents unauthorized disclosure of sensitive information. –Integrity prevents unauthorized modification of data. –Availability is the prevention of loss of access to resources and information to ensure that information is available for use when it is needed. T. A. Yang

Network Security4 Security Model A security model is a multilayered framework made of many integrated entities and logical and physical protection mechanisms, all working together to provide a secure system that complies with industry best practices and regulations. Strategic (what) level: –A security policy is a set of rules, practices, and procedures dictating how sensitive information is managed, protected, and distributed. –Standards are industry-recognized best practices, frameworks, and agreed principles of concepts and designs, designed to implement, achieve, and maintain the required levels of processes and procedures. Tactic (how) level: –Procedures are low-level documents providing systematic instructions on how the security policy and the standards are to be implemented. –A baseline is the minimum level of security requirement in a system. –Guidelines are recommended actions and operational guides for users. T. A. Yang

Network Security5 Perimeter Security? Its meaning has become increasing uncertain. –Geographic boundaries? –Inside vs outside? Wireless connections, VPN connections –Remote access? –Single point of entrance vs multi-entry open environments  multi-perimeter, multi-layered networks T. A. Yang

Network Security6 Multilayer Perimeter Solution The principle of defense in depth Security is applied across all layers of the system. Firewalls are not only between the public and the private network, but also between different zones of the private network. Intrusion monitoring/prevention is applied to both the inside and the outside boundaries of the private network. T. A. Yang

Network Security7 The Domino Effect The layered approach in the OSI reference model was developed to accommodate changes in the evolving technology. Information flows up and down to the next subsequent layer as data is processed. Implication: If one layer is hacked, communications are compromised without the other layers being aware of the problem. “A chain is as strong as the weakest link.” T. A. Yang

Network Security8 The Security Wheel An ongoing process to ensure system security: Develop a security polity  Make the network secure  Monitor and respond  Test  Manage and improve  … T. A. Yang