Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Barracuda Web Application Firewall
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Firewalls and Intrusion Detection Systems
Chapter 12 Network Security.
Developing Network Security Strategies Network Security D ESIGN Network Security M ECHANISMS.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
SECURE CLOUD-READY DATA CENTERS AppSecure development IDC IT Security conference – 2011 Budapest.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Host Intrusion Prevention Systems & Beyond
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Department Of Computer Engineering
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
A Survey on Interfaces to Network Security
Network Perimeter Security Yu Wang. Main Topics Border Router Firewall IPS/IDS VLAN SPAM AAA Q/A.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
Securing Information Systems
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Market Analysis Decision Group.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Unify and Simplify: Security Management
What is FORENSICS? Why do we need Network Forensics?
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Access Control Chapter 3 Part 4 Pages 227 to 241.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Basic Edge Core switch Training for Summit Communication.
Some Great Open Source Intrusion Detection Systems (IDSs)
Barracuda NG Firewall ™
Securing Information Systems
CompTIA Security+ Study Guide (SY0-401)
Critical Security Controls
Securing the Network Perimeter with ISA 2004
CompTIA Security+ Study Guide (SY0-401)
IS4550 Security Policies and Implementation
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Protection Mechanisms in Security Management
Presentation transcript:

Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356

Road Map  Juniper Networks  Mobile Security Solution  Roles of the Solution Components  Solution cons  Conclusion

Juniper Networks  Networking company  Services: routing, switching security, applications acceleration, identity policy, network control and network management  Customers – top 130 global service providers  96 global fortune 100  Federal, state and local government agencies  Higher education institutions across the globe

Mobile Security Solution  Provide a comprehensive multilayered security.

Mobile Security Solution  1 st Security Layer  Unified Access Control  Series Steel Belted Radius Servers (SRBS)  2 nd Security Layer  Router-based security provides packet handling layer security at the following levels: Secure data plane Access to Infrastructure Network Protocols Securing the law enforcement Audits and session flow security

2 nd Security Layer  Secure data plane  Anti-spoofing, IP fragment filtering, line-rate and Multi-level Access Control Lists  Secure access into Infrastructure  Terminal Access Controller Access-Control System (TACACS)  Secure Password Authentication Protocol (Secure PAP)  RADIUS  Authentication Authorization Accounting (AAA)  Challenge-Handshake Authentication Protocol (CHAP)

2 nd Security Layer  Network Protocols  Secure Shell (SSH)  Secure File Transfer Protocol (FTP)  Border Gateway Protocol (BGP)  Session security (MD5)  Securing the law enforcement  Utilizing the Communications Assistance for Law Enforcement Act (CALEA) and VLAN mirroring.

2 nd Security Layer  Security Audits  Real-Time Active Logs and traffic flow captures.  Session flow  Router-based security that filters and blocks unwanted flows or rates flow limits based on bandwidth.  Allows for prioritization of flows across the core network.

2 nd Layer Security Routers  Juniper Networks T Series Core Routers  E Series Broadband Service Routers  M Series Multiservice Edge Routers  MX Series 3D Universal Edge Routers

3 rd Security Layer  Juniper Stateful firewall  Monitors and controls the flow of traffic  Rule base  Deep Inspection firewall  Block application-level attacks before they infect the network/ cause any damage  Encryption of IP packets  Integration of the Secure Socket Layer (SSL) and Transport Layer Security (TLS)

4 th Security Layer  Occurs at the Application/Service layer  Unusual or suspicious behavior is detected by customizable signatures based on stateful protocol inspection, attack patterns and behavioral learning.  Protects over 60 protocols including VoIP over the application/service layer against malware penetration.

4 th Security Layer  Intrusion Detection and Prevention (IDP Series)  Provide support to the application/service layer as they monitor network traffic and drop traffic that may have a malicious user  Provides information of rogue servers or other applications, operating systems  Customized signatures  Application signatures

Solution Cons  TACACS vs. TACACS+  Costs  No mention of throughput provided by the Network components

Conclusion  Juniper Networks  Mobile Security Solution  Solution Layers  Cons of Solution

References  Alex Zinin. Protecting Internet Routing Infrastructure from Outsider DoS Attacks. Internet Engineering Task Force. May Web. Retrieved April 6,  F5 Networks. BIG-IP Solutions Guide, version 4.5. Mirroring Traffic to an Inspection Device. February 27, Web. April 7,  Juniper Networks. Juniper Networks Company Profile. Juniper Networks Web. Retrieved April 6,  Juniper Networks Juniper Networks Mobile Security Solution. Juniper Networks. January Web. Retrieved April 6,  Juniper Networks. Tackling the Top Five Network Access Control Challenges. Netutils. January Web Retrieved April 6, 2012.

Questions ?