Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.

Slides:



Advertisements
Similar presentations
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Advertisements

Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Intrusion Detection Systems and Practices
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
COEN 252: Computer Forensics Router Investigation.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Department Of Computer Engineering
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Computer Security Fundamentals by Chuck Easttom Chapter 9: Computer Security Software.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
1. 2 Device management refers to the IDS Sensor's ability to dynamically reconfigure the filters and access control lists (ACL) on a router, switch, and.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Linux Networking and Security
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Chapter 5: Implementing Intrusion Prevention
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Chapter 6: Securing the Local Area Network
Chapter 3.  Upon completion of this chapter, you should be able to:  Select and install network cards to meet network connection requirements  Connect.
Cryptography and Network Security Sixth Edition by William Stallings.
NetTech Solutions Protecting the Computer Lesson 10.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Module 10: Windows Firewall and Caching Fundamentals.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Click to edit Master subtitle style Chapter 15: Physical Security and Risk.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Chapter 6.  Upon completion of this chapter, you should be able to:  Configure switches  Configure VLANs  Verify configuration settings  Troubleshoot.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
Instructor Materials Chapter 7 Network Security
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
Digital Pacman: Firewall Edition
ISMS Information Security Management System
Network hardening Chapter 14.
Firewalls Chapter 8.
Protection Mechanisms in Security Management
Presentation transcript:

Chapter 14

 Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems  Describe how an IDS responds, detects threats and where it runs  Describe how to perform a vulnerability assessment  Harden a network and its devices  Identify switch port security methods

14.1

 After implementing security, you don’t wait for an attack  Use an IDS (Intrusion Detection System) or IPS (Intrusion Prevention System)  Two types of IDS’  Passive (IDS)  Active (IPS)  Classified by how they detect & respond to attacks

 Passive IDS  Monitors network for threats  Alert if threat is found  ONLY DETECTS - DOES NOT TRY TO STOP THREAT  Active IDS  AKA Intrusion Prevention System (IPS)  Detects attack – Takes action! Example: A port is attacked; it closes the port until the attack stops

 Signature Recognition  Has a list of known attacks  MATCH= take action  Can only detect identified/listed attacks  Anomaly Recognition  Identifies typical network traffic  Then looks for abnormal traffic  Uses a measurement above normal values to determine if action should be taken

 Host-based  Runs on a single PC  Monitors application activity & system files  Anti-virus software Uses list of virus definitions to detect; SIGNATURE-BASED IDS  Network-based  Acts like a firewall  Put AV on the device so it can scan all PCs  Centralized admin point

 Create fake resources  Honeypot  Device or virtual machine that entices intruders by having an obvious vulnerability  Distracts hackers from valuable resources  You can observe them, gather info about them, prosecute them

 Identifies vulnerabilities in a network  Vulnerability scanner  Scans open ports, software holes, missing patches, misconfigurations, default passwords  Ping scanner  Detects incoming ICMP requests  Allows you to block them on each device’s firewall  Port scanner  Scans for open ports  Password Cracker  Identifies weak passwords by trying to crack them

 TestOut DEMO Configuring an IDS/IPS  TestOut LAB Configure Intrusion Prevention  TestOut LAB Enable Wireless Intrusion Prevention  TestOut Practice Questions (15)

14.3

 Switches, routers, firewalls  Installed in secure location; locked doors  Change default username/password  Limit admin user access  Switches & routers  Use VLANs to isolate traffic  ACLs  Port security/MAC address  SSH (not Telnet)

 Servers  Install only needed software (no extras)  Install anti-malware software  Apply patches & service packs  User Accounts  Multi-factor; username/password & smartcard  Account lockout  Time of day restrictions  Passwords  Aging- change password every so often  Can’t reuse old passwords

 Switches have CAM table with MAC addresses learned & port they are on  Two security methods:  Restrict each port to a specific MAC address  Set max # of MAC addresses a port can learn

 Actions for port security  Protect Disallow unknown MAC  Restrict Disallow unknown MAC, creates a log message  Shut down Port shuts down & admin must reset it

 On a switch  Filters out untrusted DHCP messages  Prevents rogue DHCP servers (possibly from outside the network) from offering clients an IP address

 TestOut DEMO Configuring Switch Port Security  TestOut LAB Configure Port Security

 Complete the study guide handout  Complete TestOut  Practice in Packet Tracer  Jeopardy review

Chapter 14