Presentation is loading. Please wait.

Presentation is loading. Please wait.

11 SECURING A NETWORK INFRASTRUCTURE Chapter 7. Chapter 7: SECURING A NETWORK INFRASTRUCTURE2 OVERVIEW  List the criteria for selecting operating systems.

Similar presentations


Presentation on theme: "11 SECURING A NETWORK INFRASTRUCTURE Chapter 7. Chapter 7: SECURING A NETWORK INFRASTRUCTURE2 OVERVIEW  List the criteria for selecting operating systems."— Presentation transcript:

1 11 SECURING A NETWORK INFRASTRUCTURE Chapter 7

2 Chapter 7: SECURING A NETWORK INFRASTRUCTURE2 OVERVIEW  List the criteria for selecting operating systems for network servers and workstations.  List the default security settings for the Microsoft Windows Server 2003 and Microsoft Windows XP Professional operating systems.  Describe the problems inherent in keeping the software on a large network installation updated.  Use Microsoft Baseline Security Analyzer (MBSA).  List the criteria for selecting operating systems for network servers and workstations.  List the default security settings for the Microsoft Windows Server 2003 and Microsoft Windows XP Professional operating systems.  Describe the problems inherent in keeping the software on a large network installation updated.  Use Microsoft Baseline Security Analyzer (MBSA).

3 Chapter 7: SECURING A NETWORK INFRASTRUCTURE3 OVERVIEW (continued)  Use Microsoft Software Update Services (SUS).  Describe the security problems inherent in wireless networking.  List the mechanisms that Windows-based IEEE 802.11 WLANs can use to authenticate clients and encrypt transmitted data.  Determine the security requirements of your remote access installation.  Control remote access with user account properties.  Create remote access policies.  Use Microsoft Software Update Services (SUS).  Describe the security problems inherent in wireless networking.  List the mechanisms that Windows-based IEEE 802.11 WLANs can use to authenticate clients and encrypt transmitted data.  Determine the security requirements of your remote access installation.  Control remote access with user account properties.  Create remote access policies.

4 Chapter 7: SECURING A NETWORK INFRASTRUCTURE4 SELECTING COMPUTERS AND OPERATING SYSTEMS  Purchase and use of computer systems should be governed by policies.  Policies should dictate which operating systems are used for different purposes.  Policies should dictate which hardware is purchased for different purposes.  Purchase and use of computer systems should be governed by policies.  Policies should dictate which operating systems are used for different purposes.  Policies should dictate which hardware is purchased for different purposes.

5 Chapter 7: SECURING A NETWORK INFRASTRUCTURE5 UNDERSTANDING COMPUTER ROLES  Server Role  Desktop workstation role  Portable workstation role  Server Role  Desktop workstation role  Portable workstation role

6 Chapter 7: SECURING A NETWORK INFRASTRUCTURE6 UNDERSTANDING THE SERVER ROLE  Servers can perform a number of different roles.  Each role places different demands on the underlying hardware and operating system software.  Some roles require additional hardware: a server that is used for backups requires a connection to a tape drive or some other storage device.  Server systems often include fault-tolerant measures.  Servers can perform a number of different roles.  Each role places different demands on the underlying hardware and operating system software.  Some roles require additional hardware: a server that is used for backups requires a connection to a tape drive or some other storage device.  Server systems often include fault-tolerant measures.

7 Chapter 7: SECURING A NETWORK INFRASTRUCTURE7 UNDERSTANDING THE DESKTOP WORKSTATION’S ROLE  Workstation hardware is generally less powerful than server hardware.  Workstation hardware typically does not include fault-tolerant measures.  Some applications, such as computer-aided design (CAD), video and sound editing, and geographic mapping, require very high-performance hardware.  Workstation hardware is generally less powerful than server hardware.  Workstation hardware typically does not include fault-tolerant measures.  Some applications, such as computer-aided design (CAD), video and sound editing, and geographic mapping, require very high-performance hardware.

8 Chapter 7: SECURING A NETWORK INFRASTRUCTURE8 UNDERSTANDING THE PORTABLE WORKSTATION’S ROLE  Portable workstations can include laptops, notebooks, PDAs, and tablet PCs.  Portable workstations have different hardware and configuration requirements from desktop workstations.  Some users may have a desktop workstation and one or more portable workstations.  Portable workstations create additional security concerns since they can be moved both within and outside of the physical security perimeter.  Portable workstations can include laptops, notebooks, PDAs, and tablet PCs.  Portable workstations have different hardware and configuration requirements from desktop workstations.  Some users may have a desktop workstation and one or more portable workstations.  Portable workstations create additional security concerns since they can be moved both within and outside of the physical security perimeter.

9 Chapter 7: SECURING A NETWORK INFRASTRUCTURE9 CREATING HARDWARE SPECIFICATIONS  Server hardware specifications  Desktop hardware specifications  Portable hardware specifications  Server hardware specifications  Desktop hardware specifications  Portable hardware specifications

10 Chapter 7: SECURING A NETWORK INFRASTRUCTURE10 SERVER HARDWARE SPECIFICATIONS  Create a hardware specification based on the applications that the server will host.  Use company information such as expected increases in personnel or customer activity when creating the specification.  Factor a reasonable growth margin into the specification.  Consider the ease of future upgrades to preserve investment.  Create a hardware specification based on the applications that the server will host.  Use company information such as expected increases in personnel or customer activity when creating the specification.  Factor a reasonable growth margin into the specification.  Consider the ease of future upgrades to preserve investment.

11 Chapter 7: SECURING A NETWORK INFRASTRUCTURE11 DESKTOP HARDWARE SPECIFICATIONS  Specify a base hardware configuration that supports most users.  Create additional specifications as needed to accommodate special requirements.  Where possible, use a small number of standard configurations.  Standardized hardware provides many advantages in terms of support.  Specify a base hardware configuration that supports most users.  Create additional specifications as needed to accommodate special requirements.  Where possible, use a small number of standard configurations.  Standardized hardware provides many advantages in terms of support.

12 Chapter 7: SECURING A NETWORK INFRASTRUCTURE12 PORTABLE HARDWARE SPECIFICATIONS  Different types of portable hardware have different hardware requirements.  Many portable computing devices use proprietary technologies.  As with desktop workstations, keep the number of standard configurations to a minimum.  Different types of portable hardware have different hardware requirements.  Many portable computing devices use proprietary technologies.  As with desktop workstations, keep the number of standard configurations to a minimum.

13 Chapter 7: SECURING A NETWORK INFRASTRUCTURE13 SELECTING OPERATING SYSTEMS When selecting operating systems, you must consider the following:  Application compatibility The operating system you select must support the application software needed by the organization.  Support issues Familiarity with operating systems decreases training costs and improves technical support service.  Security features In highly secure environments, operating systems with advanced security features should be chosen.  Cost Operating system software represents a significant investment, and the availability of funds for software purchases must be considered. When selecting operating systems, you must consider the following:  Application compatibility The operating system you select must support the application software needed by the organization.  Support issues Familiarity with operating systems decreases training costs and improves technical support service.  Security features In highly secure environments, operating systems with advanced security features should be chosen.  Cost Operating system software represents a significant investment, and the availability of funds for software purchases must be considered.

14 Chapter 7: SECURING A NETWORK INFRASTRUCTURE14 CHOOSING WORKSTATION OPERATING SYSTEMS

15 Chapter 7: SECURING A NETWORK INFRASTRUCTURE15 CHOOSING SERVER OPERATING SYSTEMS

16 Chapter 7: SECURING A NETWORK INFRASTRUCTURE16 IDENTIFYING CLIENT AND SERVER DEFAULT SECURITY SETTINGS  Operating systems install with a default set of security settings.  These settings should be evaluated to determine whether they satisfy security requirements.  Windows Server 2003 is designed to be more secure in a default installation than are previous versions of Windows.  Operating systems install with a default set of security settings.  These settings should be evaluated to determine whether they satisfy security requirements.  Windows Server 2003 is designed to be more secure in a default installation than are previous versions of Windows.

17 Chapter 7: SECURING A NETWORK INFRASTRUCTURE17 EVALUATING SECURITY SETTINGS  File System permissions  Share permissions  Registry permissions  Active Directory permissions  Account Policy settings  Audit policies  File System permissions  Share permissions  Registry permissions  Active Directory permissions  Account Policy settings  Audit policies

18 Chapter 7: SECURING A NETWORK INFRASTRUCTURE18 FILE SYSTEM PERMISSIONS file or folder’s ownership, permissions, and file system attributes N N T T F F S S F F o o l l d d e e r r P P e e r r m m i i s s s s i i o o n n E E n n a a b b l l e e s s t t h h e e U U s s e e r r o o r r G G r r o o u u p p T T o o Full ControlChange file/folder permissions, take ownership of files/folders, and delete subfolders and files, plus perform the actions permitted by all of the other NTFS permissions. ModifyModify or delete a file/folder, plus perform all actions permitted by the Write permission and the Read & Execute permission. Read & ExecuteRun applications; browse through folders to reach other files and folders, even if the user does not have permission to access those files/folders; and perform all actions permitted by the Read permission and the List Folder Contents permission. List Folder ContentsSee the names of files and subfolders in a folder. ReadRead a file; see the files and subfolders in a folder; and view a (such as Read-only, Hidden, Archive, and System). WriteOverwrite a file, create new files and subfolders within a folder, change a file or folder’s attributes, and view the file or folder’s ownership and permissions.

19 Chapter 7: SECURING A NETWORK INFRASTRUCTURE19 SHARE PERMISSIONS

20 Chapter 7: SECURING A NETWORK INFRASTRUCTURE20 REGISTRY PERMISSIONS

21 Chapter 7: SECURING A NETWORK INFRASTRUCTURE21 ACTIVE DIRECTORY PERMISSIONS  Active Directory has over 25 standard permissions and 67 special permissions.  The following default permission assignments are made to cover most requirements:  Enterprise Admins Receives the Full Control permission for the entire forest  Domain Admins and Administrators Receives a selection of permissions that enables him or her to perform Active Directory object maintenance tasks within their domain  Authenticated Users Receives the Read permission for the entire domain, plus a small selection of very specific Modify permissions  Active Directory has over 25 standard permissions and 67 special permissions.  The following default permission assignments are made to cover most requirements:  Enterprise Admins Receives the Full Control permission for the entire forest  Domain Admins and Administrators Receives a selection of permissions that enables him or her to perform Active Directory object maintenance tasks within their domain  Authenticated Users Receives the Read permission for the entire domain, plus a small selection of very specific Modify permissions

22 Chapter 7: SECURING A NETWORK INFRASTRUCTURE22 ACCOUNT POLICY SETTINGS

23 Chapter 7: SECURING A NETWORK INFRASTRUCTURE23 AUDIT POLICIES

24 Chapter 7: SECURING A NETWORK INFRASTRUCTURE24 PLANNING A SECURITY UPDATE INFRASTRUCTURE  Understanding software update practices  Using Windows Update  Updating a network  Understanding software update practices  Using Windows Update  Updating a network

25 Chapter 7: SECURING A NETWORK INFRASTRUCTURE25 UNDERSTANDING SOFTWARE UPDATE PRACTICES  Microsoft distributes software updates in two forms:  Service pack A collection of patches and updates that have been tested as a single unit  Hotfix A small patch designed to address a specific issue  Microsoft recommends that service packs are installed on all applicable systems. Hotfixes should only be applied to systems that are experiencing a specific problem.  Microsoft distributes software updates in two forms:  Service pack A collection of patches and updates that have been tested as a single unit  Hotfix A small patch designed to address a specific issue  Microsoft recommends that service packs are installed on all applicable systems. Hotfixes should only be applied to systems that are experiencing a specific problem.

26 Chapter 7: SECURING A NETWORK INFRASTRUCTURE26 USING WINDOWS UPDATE

27 Chapter 7: SECURING A NETWORK INFRASTRUCTURE27 UPDATING A NETWORK  Updating PCs on a network presents many challenges to the administrator.  A network security update infrastructure is a series of policies that are designed to help the administrator manage software and security updates on the network.  The security update infrastructure should specify procedures for the identification, testing, and deployment of software updates.  Updating PCs on a network presents many challenges to the administrator.  A network security update infrastructure is a series of policies that are designed to help the administrator manage software and security updates on the network.  The security update infrastructure should specify procedures for the identification, testing, and deployment of software updates.

28 Chapter 7: SECURING A NETWORK INFRASTRUCTURE28 USING MBSA

29 Chapter 7: SECURING A NETWORK INFRASTRUCTURE29 TESTING SECURITY UPDATES  All updates, including those related to security, should be tested before they are implemented.  If possible, use a test system with a configuration similar to that of the system on which the update will be applied.  If a test system is not available, updates should be deployed progressively, and systems with the updates should be closely monitored.  All updates, including those related to security, should be tested before they are implemented.  If possible, use a test system with a configuration similar to that of the system on which the update will be applied.  If a test system is not available, updates should be deployed progressively, and systems with the updates should be closely monitored.

30 Chapter 7: SECURING A NETWORK INFRASTRUCTURE30 USING MICROSOFT SOFTWARE UPDATE SERVICES

31 Chapter 7: SECURING A NETWORK INFRASTRUCTURE31 SECURING A WIRELESS NETWORK  Wireless networks are becoming increasingly popular as related hardware becomes more affordable, and companies begin to realize the flexibility that wireless networks offer.  Wireless networks present more and different security challenges than their wired counterparts.  Wireless networks are becoming increasingly popular as related hardware becomes more affordable, and companies begin to realize the flexibility that wireless networks offer.  Wireless networks present more and different security challenges than their wired counterparts.

32 Chapter 7: SECURING A NETWORK INFRASTRUCTURE32 UNDERSTANDING WIRELESS NETWORKING STANDARDS  Wireless networking standards are developed and ratified by the Institute of Electrical and Electronics Engineers (IEEE).  Three standard have been defined:  802.11b The current standard. Offers speeds up to 11 Mbps.  802.11a In development. Uses different frequency ranges than 802.11b. Offers speeds up to 54 Mbps.  802.11g Uses the same frequency ranges as 802.11b. Offers speeds up to 54 Mbps.  Wireless networking standards are developed and ratified by the Institute of Electrical and Electronics Engineers (IEEE).  Three standard have been defined:  802.11b The current standard. Offers speeds up to 11 Mbps.  802.11a In development. Uses different frequency ranges than 802.11b. Offers speeds up to 54 Mbps.  802.11g Uses the same frequency ranges as 802.11b. Offers speeds up to 54 Mbps.

33 Chapter 7: SECURING A NETWORK INFRASTRUCTURE33 WIRELESS NETWORKING TOPOLOGIES

34 Chapter 7: SECURING A NETWORK INFRASTRUCTURE34 UNDERSTANDING WIRELESS NETWORK SECURITY  Wireless networking presents security risks that are not present when using traditional wired networks.  Logical security becomes of paramount concern, as physical security measures are not necessarily preventative.  Two main concerns when using wireless networks are unauthorized access and data interception.  Wireless networking presents security risks that are not present when using traditional wired networks.  Logical security becomes of paramount concern, as physical security measures are not necessarily preventative.  Two main concerns when using wireless networks are unauthorized access and data interception.

35 Chapter 7: SECURING A NETWORK INFRASTRUCTURE35 CONTROLLING WIRELESS ACCESS USING GROUP POLICIES

36 Chapter 7: SECURING A NETWORK INFRASTRUCTURE36 AUTHENTICATING USERS  Open system authentication  Shared key authentication  IEEE 802.1x authentication  Open system authentication  Shared key authentication  IEEE 802.1x authentication

37 Chapter 7: SECURING A NETWORK INFRASTRUCTURE37 OPEN SYSTEM AUTHENTICATION  The default authentication method used by IEEE 802.11 devices.  Despite the name, it offers no actual authentication.  A device configured to use Open System authentication will not refuse authentication to another device.  The default authentication method used by IEEE 802.11 devices.  Despite the name, it offers no actual authentication.  A device configured to use Open System authentication will not refuse authentication to another device.

38 Chapter 7: SECURING A NETWORK INFRASTRUCTURE38 SHARED KEY AUTHENTICATION  Devices authenticate each other using a secret key that both possess.  The key is shared before authentication using a secure channel.  All the computers in the same BSS must possess the same key.  Devices authenticate each other using a secret key that both possess.  The key is shared before authentication using a secure channel.  All the computers in the same BSS must possess the same key.

39 Chapter 7: SECURING A NETWORK INFRASTRUCTURE39 IEEE 802.1X AUTHENTICATION  The IEEE 802.1x standard defines a method of authenticating and authorizing users on any 802 LAN.  Most IEEE 802.1x implementations use Remote Authentication Dial-In User Service (RADIUS) servers.  RADIUS typically uses one of the following two authentication protocols:  Extensible Authentication Protocol-Transport Level Security (EAP-TLS)  Protected EAP-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2)  The IEEE 802.1x standard defines a method of authenticating and authorizing users on any 802 LAN.  Most IEEE 802.1x implementations use Remote Authentication Dial-In User Service (RADIUS) servers.  RADIUS typically uses one of the following two authentication protocols:  Extensible Authentication Protocol-Transport Level Security (EAP-TLS)  Protected EAP-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2)

40 Chapter 7: SECURING A NETWORK INFRASTRUCTURE40 ENCRYPTING WIRELESS TRAFFIC  The IEEE 802.11 standard uses an encryption mechanism called Wired Equivalent Privacy (WEP) to secure data while in transit.  WEP uses the RC4 cryptographic algorithm developed by RSA Security, Inc.  WEP allows the key length, as well as the frequency with which the systems generate new keys, to be configured.  The IEEE 802.11 standard uses an encryption mechanism called Wired Equivalent Privacy (WEP) to secure data while in transit.  WEP uses the RC4 cryptographic algorithm developed by RSA Security, Inc.  WEP allows the key length, as well as the frequency with which the systems generate new keys, to be configured.

41 Chapter 7: SECURING A NETWORK INFRASTRUCTURE41 SECURING REMOTE ACCESS  Determining security requirements  Controlling access using dial-in properties  Planning authentication  Using remote access policies  Determining security requirements  Controlling access using dial-in properties  Planning authentication  Using remote access policies

42 Chapter 7: SECURING A NETWORK INFRASTRUCTURE42 DETERMINING SECURITY REQUIREMENTS  Which users require remote access?  Do users require different levels of remote access?  Do users need access to the entire network?  What applications must users run?  Which users require remote access?  Do users require different levels of remote access?  Do users need access to the entire network?  What applications must users run?

43 Chapter 7: SECURING A NETWORK INFRASTRUCTURE43 CONTROLLING ACCESS USING DIAL-IN PROPERTIES

44 Chapter 7: SECURING A NETWORK INFRASTRUCTURE44 PLANNING AUTHENTICATION

45 Chapter 7: SECURING A NETWORK INFRASTRUCTURE45 USING RADIUS  Windows Server 2003 with IAS can be a RADIUS server or a RADIUS proxy.  When configured as a RADIUS server, the computer receiving the authentication request will process and authorize the connection request.  When configured as a RADIUS proxy, the authenti- cation request is forwarded to the configured RADIUS server.  Windows Server 2003 with IAS can be a RADIUS server or a RADIUS proxy.  When configured as a RADIUS server, the computer receiving the authentication request will process and authorize the connection request.  When configured as a RADIUS proxy, the authenti- cation request is forwarded to the configured RADIUS server.

46 Chapter 7: SECURING A NETWORK INFRASTRUCTURE46 SELECTING AN AUTHENTICATION PROTOCOL

47 Chapter 7: SECURING A NETWORK INFRASTRUCTURE47 USING REMOTE ACCESS POLICIES  Sets of conditions that users must meet before RRAS authorizes them to access the server or the network  Can be configured to limit user access based on group memberships, day and time restrictions, and many other criteria  Can specify what authentication protocol, and what type of encryption clients must use  Policies can be created based on type of connection, such as dial-up, VPN, or wireless  Sets of conditions that users must meet before RRAS authorizes them to access the server or the network  Can be configured to limit user access based on group memberships, day and time restrictions, and many other criteria  Can specify what authentication protocol, and what type of encryption clients must use  Policies can be created based on type of connection, such as dial-up, VPN, or wireless

48 Chapter 7: SECURING A NETWORK INFRASTRUCTURE48 REMOTE ACCESS POLICY COMPONENTS  Conditions  Specific attributes that the policy uses to grant or deny authorization to a user. If more than one condition is defined, the user must meet all the conditions before the server can grant access.  Remote access permission  Defines whether the user is allowed to connect to the system through a remote access connection.  Remote access profile  A set of attributes applied to a client once it has been authenticated and authorized.  Conditions  Specific attributes that the policy uses to grant or deny authorization to a user. If more than one condition is defined, the user must meet all the conditions before the server can grant access.  Remote access permission  Defines whether the user is allowed to connect to the system through a remote access connection.  Remote access profile  A set of attributes applied to a client once it has been authenticated and authorized.

49 Chapter 7: SECURING A NETWORK INFRASTRUCTURE49 CREATING REMOTE ACCESS POLICIES

50 Chapter 7: SECURING A NETWORK INFRASTRUCTURE50 CHAPTER SUMMARY  When selecting operating systems for servers, you can choose the platform best suited to the server’s role. When selecting workstation operating systems, standardization takes precedence over specialization.  When you install Windows Server 2003 or Windows XP Professional, the operating system Setup program configures a number of security settings with default values that you can either keep or modify.  Microsoft releases updates for its operating systems and applications. Major updates are called service packs. Individual updates are called hotfixes.  MBSA is a tool that scans computers on a network and examines them for security vulnerabilities.  When selecting operating systems for servers, you can choose the platform best suited to the server’s role. When selecting workstation operating systems, standardization takes precedence over specialization.  When you install Windows Server 2003 or Windows XP Professional, the operating system Setup program configures a number of security settings with default values that you can either keep or modify.  Microsoft releases updates for its operating systems and applications. Major updates are called service packs. Individual updates are called hotfixes.  MBSA is a tool that scans computers on a network and examines them for security vulnerabilities.

51 Chapter 7: SECURING A NETWORK INFRASTRUCTURE51 CHAPTER SUMMARY (continued)  SUS is a tool that streamlines the approval and implementation of software updates.  Most wireless LANs today are based on the 802.11 standards published by the IEEE. WLANs present additional security risks over wired networks.  To secure a wireless network, you must authenticate the clients before they are granted network access, and encrypt all packets transmitted over the wireless link.  To determine the security requirements you need for your remote access server, determine which users need access and what type of access they need.  Remote access policies are sets of conditions that must be met by remote clients attempting to connect to the Routing and Remote Access server.  SUS is a tool that streamlines the approval and implementation of software updates.  Most wireless LANs today are based on the 802.11 standards published by the IEEE. WLANs present additional security risks over wired networks.  To secure a wireless network, you must authenticate the clients before they are granted network access, and encrypt all packets transmitted over the wireless link.  To determine the security requirements you need for your remote access server, determine which users need access and what type of access they need.  Remote access policies are sets of conditions that must be met by remote clients attempting to connect to the Routing and Remote Access server.


Download ppt "11 SECURING A NETWORK INFRASTRUCTURE Chapter 7. Chapter 7: SECURING A NETWORK INFRASTRUCTURE2 OVERVIEW  List the criteria for selecting operating systems."

Similar presentations


Ads by Google