Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.

Similar presentations


Presentation on theme: "Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc."— Presentation transcript:

1

2 Network Perimeter Defense Josef Pojsl, jp@tns.cz Martin Macháček, mm@tns.cz Trusted Network Solutions, Inc.

3 IP filtering gateways Proxy gateways Combinations (defense in depth) Traditional techniques Internet Internal Network

4 Perimeter expansion Increased bandwidth Remote offices Telecommuters Roaming users Partners Technology Cryptography VPNs Internet Internal Network

5 Role of communication Growing dependence on IT systems Paperwork replaced with electronic data As a consequence Greater potential of attacks and vulnerabilities Data integrity attacks Harder detection Automation Complexity Technology Cryptography Content scaning Intrusion detection Vulnerability scanning

6 Complexity Internet Internal Network VPNs Firewalls Public servers Internal servers Intrusion detection Content scanner Vulnerability scanner

7 Risk Assessment Risk factors Worth Attraction Threat Vulnerability Probability Countermeasures Prevention Detection Reaction High-risk environments: risk factors are relatively high

8 Security processes Every day New processes are being transformed into electronic forms New vulnerabilities and patches emerge Event logs must be analyzed Appropriate actions must be taken Etc. As a consequence Security is a process Services serve better than products Expert teams specialized in security are needed Some processes may be (internally) outsourced

9 Fighting complexity Minimalism Rarely used in software design Unusual parameter combinations Number of interactions Modularity Modules are more easily verifiable Well-defined interfaces between modules Minimal design Customization

10 Event logging Full, fine-grained event logs are vital for detection Easy to process, human readable Log analysis: statistics, expert systems, manual Audit Logs

11 Open architecture Not necessarily open-source Source code serves for –Verification –Documentation No “security through obscurity” No “breakthroughs” Compliance with open standards

12 Conclusion Design principles to follow when building network security defense in high-risk environments Processes, not solutions MinimalismModularity Thorough audit trails and log analysis Open architecture Expert teams Outsourcing


Download ppt "Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc."

Similar presentations


Ads by Google