Final Project: Advanced Security Blade IPS and DLP blades.

Slides:



Advertisements
Similar presentations
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Advertisements

 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
LittleOrange Internet Security an Endpoint Security Appliance.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Department Of Computer Engineering
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Chapter 5: Implementing Intrusion Prevention
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Module 7: Advanced Application and Web Filtering.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 40 Internet Security.
Final Project: Advanced security blade
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
Critical Security Controls
The Linux Operating System
Lesson Objectives Aims You should be able to:
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
Firewalls.
CIS 333 RANK Education for Service-- cis333rank.com.
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Information Security Session October 24, 2005
Intrusion Detection & Prevention
Fire-wall.
Firewall.
Cyber Operation and Penetration Testing Social Engineering Attack and Web-based Exploitation Cliff Zou University of Central Florida.
Firewalls.
FIREWALL.
By Seferash B Asfa Wossen Strayer University 3rd December 2003
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Firewall Installation
Presentation transcript:

Final Project: Advanced Security Blade IPS and DLP blades

2 Agenda 1 1 IPS DLP 2 2 About next assignment 3 3 How to research malware behavior 4 4

3 Agenda 1 1 IPS DLP 2 2 About next assignment 3 3 How to research malware behavior 4 4

4 Intrusion Prevention System - IPS

5  An IPS monitors network traffic by analyzing the content of the packets  Each packet is being examined to check if it contains any malicious content that appears in the signatures database  In case a malicious packet is identified and matched to a signature it can raise an alarm or even block the connection if required  IPS might affect network performance since it examines all incoming and outgoing network traffic

6 Agenda 1 1 IPS DLP 2 2 About next assignment 3 3 How to research malware behavior 4 4

7 Data Leak Prevention - DLP

8  Nowadays sensitive data can be easily accessed and transferred  DLP monitors data transfer by deeply inspecting and analyzing the data, source, destination and protocol  The data can be anything from accounting papers to source code  DLP can work in several ways: –Detect –Inform User –Ask User –Prevent

9 Agenda 1 1 IPS DLP 2 2 About next assignment 3 3 How to research malware behavior 4 4

10 Handle a real world vulnerability  In this final project, you’ll have to deal with real-world problem  In the IPS part, you’ll ask to make a research about the vulnerability – its cause, affect, how does it work etc.  After a complete research, you’ll write the protection to the vulnerability.  Your firewall will be tested with real exploits! We will see if your protection can stand against real penetration testing framework

11 Handle a real world vulnerability  In the DLP part you’ll have to keep an eye in order to minimize network data leakage risks  In order to make it easy for you, we’ll support only http and smtp text  You’ll have to protect your organization's source code by recognizing source code being sent through HTTP (GET, POST) or SMTP  Again, you’ll have to research yourself the methods to support, learn and protect

12 Agenda 1 1 IPS DLP 2 2 About next assignment 3 3 How to research malware behavior 4 4

13 Popular sites for vulnerabilities  You can find useful information in the following websites

14 Learn about SQL injection

15 Metasploit  Metasploit is a useful tool for vulnerabilities testing and research  This tool is integrated in Kali Linux  For this stage, you should consider using this tool for your research  Download the image of Kali Linux (iso file)  Create new virtual machine: –Type: Linux –Version: Debian (32-bit) –Allocate minimum 15GB hard drive