Liquid Telecom Network Security. Network Security - Availability Physical Infrastructure – PoP Site Security/Traffic Protection Logical – Device Hardening/Traffic.

Slides:



Advertisements
Similar presentations
Point Protection 111. Check List AAA to the Network Devices Controlling Packets Destined to the Network Devices Config Audits.
Advertisements

Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.
Securing the Router Chris Cunningham.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Mobile IP Security Dominic Maguire Research Essay Presentation Communications Infrastructure Module MSc Communications Software, WIT
KBOM Aim Develop a series of Success Factors for infrastructure security Demonstrate the Success Factors in a Physical security analogy Extend the analogy.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Web server security Dr Jim Briggs WEBP security1.
Enterprise Network Security Accessing the WAN Lecture week 4.
COEN 252: Computer Forensics Router Investigation.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Securing Network Services.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
New Data Regulation Law 201 CMR TJX Video.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
Secure Your Documents. Protect Your Data. Lexmark Security for Solutions-Capable Printers and MFPs.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
FLOOR CANDY.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 7 – Secure Network Architecture and Management.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Chapter 2: Securing Network Devices
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Enterprise Network Security Accessing the WAN – Chapter 4.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Security fundamentals Topic 6 Securing the network infrastructure.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Remote monitoring solutions to protect mission critical infrastructures Remote monitoring and control solutions to guard your mission-critical IT equipment.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Network System Security - Task 2. Russell Johnston.
Instructor Materials Chapter 11: Build a Small Network
Chapter 11: Build a Small Network
Instructor Materials Chapter 5: Network Security and Monitoring
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 7: Identifying Advanced Attacks
Enterprise Network Security
Network Security 101 By: David Crim.
Chapter 2: Basic Switching Concepts and Configuration
Security of a Local Area Network
Chapter 5: Network Security and Monitoring
Network Security and Monitoring
– Chapter 3 – Device Security (B)
ISMS Information Security Management System
Enterprise Network Security
– Chapter 3 – Device Security (B)
Lock and Key by Linda Wier 2/23/2019.
Network hardening Chapter 14.
Welcome to all Participants
Enterprise Network Security
Network Security Mark Creighton GBA 576 6/4/2019.
Global One Communications
Presentation transcript:

Liquid Telecom Network Security

Network Security - Availability Physical Infrastructure – PoP Site Security/Traffic Protection Logical – Device Hardening/Traffic Protection Processes – Fraud Management

Physical Security – PoP site Surveillance CCTV Fire Alarms Motion sensors and door alarms Lock and Key Alarm Response from security companies

Physical Access (Access Authorisation) Call site access agent Your information and purpose Duration of access Access codes

Other - Power UPS Generators

Logical – Device Hardening Securing Device Unauthorised Access (login) and attacks Terminal passwords Alpha-numeric with minimum length AAA remote authentication Password expiration

Logical – Device Hardening (cont.) Disable unnecessary services & features (e.g.http, telnet, ip redirects, pad, etc) Use secure protocols (SNMP v3, ssh) Control plane policing Traffic policing/shaping

Logical – Device Hardening (cont.) Shut unused interfaces Software patches Logging Network Monitoring & Management Systems behind firewalls

Traffic Protection – Physical & Logical Physical route diversity Logical protection (MPLS)

NMMS High Availability Behind firewall

DDoS Monitoring devices Fingerprints continuously updating Sends Alerts to interested parties Mitigation

Processes Work Order process flow

Experiences Login attempts DDoS Solution – black hole

Discussion/Questions