Presentation is loading. Please wait.

Presentation is loading. Please wait.

Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.

Similar presentations


Presentation on theme: "Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure."— Presentation transcript:

1 Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure routers and networks with routers. Wireless LAN(WLAN) and its security. Shared success

2 What is Network security? comprises the measures a company takes to protect its computer system. consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

3 Shared success Why do we need security? Confidentiality: only sender, intended receiver should “understand” message contents – sender encrypts message – receiver decrypts message – Privacy: hide `who is doing what with whom` Authentication: sender, receiver want to confirm identity of each other Integrity: sender, receiver want to ensure messages are not altered (in transit, or afterwards) without detection Access and Availability: services must be accessible and available to users

4 Shared success Confidentiality Protecting sensitive information from unauthorized disclosure or interception. Integrity Safeguarding the accuracy and completeness of information Availability Ensuring that information and vital services are available to users when required. Information Security

5 Shared success Who is vulnerable? Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK

6 Shared success Common security attacks and their countermeasures Finding a way into the network – Firewalls Exploiting software bugs, buffer overflows – Intrusion Detection Systems Denial of Service – Ingress filtering, IDS TCP hijacking – IPSec Packet sniffing – Encryption (SSH, SSL, HTTPS) Social problems – Education

7 Shared success Examples of some attacks

8 Shared success Router security router’s route tables router’s access control router filtering configuration router cryptographic security features

9 Shared success Router Security cont.. Protecting the Router Itself:  Physical Security  Operating System  Configuration Hardening : Unnecessary services should be disabled in the router configuration. Protecting the Network with the Router:  Packet Filters for TCP/IP  Permit Only Required Protocols and Services  Reject Risky Protocols and Services

10 Shared success Router Security conti..  Address Filtering  Reject all traffic from the internal networks that bears a source IP address which does not belong to the internal networks.  Reject all traffic from the external networks that bears a source address belonging to the internal networks.  Reject all traffic with a source or destination address belonging to any reserved, unroutable, or illegal address range.

11 Shared success Managing the Router Access Mechanisms for Administrators Local and remote Administration  Local – Console  Remote – Telnet/SSH or SNMPv3 AAA servers(RADIUS or TACACS+) are being used for administration access control. Updating the Router – operating system and configuration file. Logging Operational Security Management: Maintaining the security of a router over its operational lifetime requires regular assessment, testing, and correction.

12 Shared success Wireless LAN and its security Features of WLAN(IEEE802.11): Networking based on radio waves rather than wired cables. convenience especially for the cases when mobility is required. A good solution when short-term or emergency connections are needed. It is not as Secure, fast or reliable as wired network.

13 Shared success Security Attacks Traffic Analysis Passive Eavesdropping Active Eavesdropping Unauthorized Access Man-in-the-middle Attacks Session High-Jacking Replay Attacks Rouge AP Dos Attacks

14 Shared success Security measures  Carefully select SSID to be unique and disable SSID broadcast mode.  Configure MAC address filtering mechanism on Aps.  Disable DHCP if any.  Apply Best encryption mechanism supported by the AP.  WEP(Wired Equivalent Privacy ) – Easy to break  The Wi-Fi Protected Access (WPA and WPA2) security protocols were later created to address the problems with WEP.  Locking down the AP – Disable administration access of AP from Wireless side.  Restricted access networks - The standard method of WLAN authentication uses the 802.1X protocol. If the protocol is enabled, unauthenticated users cannot get past the AP to access the rest of the network.  Enable VPN access only.

15 Shared success Thank you Shared success


Download ppt "Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure."

Similar presentations


Ads by Google