Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.

Slides:



Advertisements
Similar presentations
FIREWALLS Chapter 11.
Advertisements

Protection of Information Assets I. Joko Dewanto 1.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
SECURITY ISSUES IN NETWORKS WITH INTERNET ACCESS PRESENTED BY Sri Vallabh Aida Janciragic Sashidhar Reddy.
Security+ Guide to Network Security Fundamentals
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Chapter 12 Network Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
BUSINESS B1 Information Security.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Unit 17 – Local Area Network Security
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Lecture 7 Network & ISP security. Firewall Simple packet-filters Simple packet-filters evaluate packets based solely on IP headers. Source-IP spoofing.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
1 NES554: Computer Networks Defense Course Overview.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 4 Network Security Tools and Techniques.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
IS3220 Information Technology Infrastructure Security
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Information Security KRISHNAKUMAR RAGHAVAN (KK) NASWA's Information Technology Support Center 1.
Securing Information Systems
Unit 3 Section 6.4: Internet Security
Securing Information Systems
Security Unit 1 Business skills for e-commerce
Network Security (the Internet Security)
CHAPTER FOUR OVERVIEW SECTION ETHICS
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Operating system Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Exam Review.
Security Securing IS.
IS4550 Security Policies and Implementation
Intrusion Detection & Prevention
Message Digest Cryptographic checksum One-way function Relevance
امنیت شبکه علی فانیان
ISMS Information Security Management System
Computer Security.
IS4680 Security Auditing for Compliance
Computer Security.
سمینار آموزشی امنیت شبکه
برنامج أمن أنظمة الحاسب
Identity & Access Management
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
INFORMATION SYSTEMS SECURITY and CONTROL
CHAPTER FOUR OVERVIEW SECTION ETHICS
Intrusion Detection system
CSE 542: Operating Systems
Network Security Mark Creighton GBA 576 6/4/2019.
Protection Mechanisms in Security Management
Presentation transcript:

Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption

Security Policy Steps Assets Threats Vulnerabilities Risk Protective measure –Virus protection –Firewall –Authentication –Encryption

Auditing Personal: internal or external Methods –Manual auditing: policy auditing or off-line audit (policy development & implementation) –automated auditing: event detection or real-time audits (software & exception reports) –Security probes: weak spots & improvement Intrusion detection systems or Security Analyzer Tool for Analyzing Networks (SATAN) Courtney

Antivirus Technology Virus scanning: signature scanners Emulation technology: activity monitors (virtual PC) CRC checkers: hashing checkers

Firewall Architectures Packet filtering Application gateway

Packet Filtering Port-level filter, network-level filter, or packet filter Filter tables: source and destination addresses Weakness: IP spoofing

Application Gateways Application-level filters, assured pipe-lines, application gateways, or proxies Sources, services or application Weakness –Inability to detect malicious code

Firewall Functions Encryption Virus scanning Violation notification Authentication System monitoring Auditing and logging Attack protection

Authentication categories –What you know –What you have –What you are Types –Token authentication –Biometric authentication

Encryption methods Private key encryption –Same algorithm –Data encryption standard (DES): 64-bit key Public key encryption –Rivest-Shamir-Adelman: RSA –Public/private key encryption Digital signature encryption –Private key, hashing program, original document

Assignment Review chapters 8, 9, & 13