Securing Network Servers

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

Database Administration and Security Transparencies 1.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Security+ Guide to Network Security Fundamentals
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
System and Network Security Practices COEN 351 E-Commerce Security.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Security Guidelines and Management
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Data Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Secure System Setup COEN 250. System Administration Lifecycle Harden / Secure  Install only minimal essential OS configuration  Install patches to known.
Chapter 6 of the Executive Guide manual Technology.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information Systems Security
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Module 6: Designing Security for Network Hosts
Database Role Activity. DB Role and Privileges Worksheet.
Chapter 2 Securing Network Server and User Workstations.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Network System Security - Task 2. Russell Johnston.
Information Systems Security
Security Architecture of Windows
Security Issues in Information Technology
CS457 Introduction to Information Security Systems
Securing Information Systems
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Secure Software Confidentiality Integrity Data Security Authentication
Chapter 2: System Structures
UNIT 19 Data Security 2.
Active Directory Administration
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Business Risks of Insecure Networks
Firewalls.
Security in Networking
Unit 27: Network Operating Systems
Chapter 27: System Security
An Introduction to Computer Networking
Lesson 16-Windows NT Security Issues
County HIPAA Review All Rights Reserved 2002.
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
12 STEPS TO A GDPR AWARE NETWORK
Information Security Awareness
King Saud University- College OF Applied Studies
IS4680 Security Auditing for Compliance
King Saud University- College OF Applied Studies
PLANNING A SECURE BASELINE INSTALLATION
Test 3 review FTP & Cybersecurity
Presentation transcript:

Securing Network Servers By: Kevin Arnold

Outline Need For Networked Servers Types Need For Secure Servers Major Issues Activities Performed In Securing Servers Summary Questions

Need For Networked Servers Server – In Theory, Any Computerized Process That Shares A Resource To One Or More Client Processes Started Out As Just Normal Computers, Industrial Sized Businesses Made It What It Is Today Need For Centralized Access To Information And Resources

Types Of Servers Inward-Facing: Only Available To The Organization That Owns And Runs The Server And Are Managed Via A Firewall Outward-Facing: Available To The Public Database, File, Mail, Print, And Web Servers

Need For Secure Servers With Centralized Information, It Makes File And Database Servers The Most Useful To An Attacker Security Breaches On A Network Can Result In The Disclosure Of Critical Information That Can Affect The Entire Organization

4 Major Issues In Network Security Confidentiality Refers To Protecting Information From Being Accessed By Unauthorized Parties Integrity Refers To Ensuring The Authenticity Of Information, That Information Is Not Altered, And That The Source Of The Information Is Genuine Availability Means That Information Is Accessible By Authorized Users Mutual Authentication Ensures That The User Is Who He Claims To Be And That The Network Server Host Is Who It Claims To Be

3 Part Approach Many Security Problems Can Be Avoided If Servers And Networks Are Appropriately Configured 1. Planning And Executing The Deployment Of Servers (2 Steps) 2. Configure The Server To Help Make Them Less Vulnerable To Attacks (5 Steps) 3. Maintaining The Integrity Of The Deployed Servers (3 Steps)

Planning And Executing The Deployment Of Servers - Step 1 Identify The Purpose Of The Server What Information Categories Will Be Stored On This Server? What Are The Security Requirements For This Information? Which Users Or Categories Will Be Able To Access The Server, Along With How They Will Authenticate Themselves And The Privileges They Are Allotted?

Planning And Executing The Deployment Of Servers - Step 2 Include Explicit Security Requirements When Selecting A Server 3 Steps To Accomplishing These Goals Identify Your Functionality And Performance Requirements Review The Recommended Practices That Address The Configuration And Operation Of The Server Product Identify Specific Security-Related Features, Such As Types Of Authentication, Level Of Access Control, Support For Remote Administration And Logging Features Absence Of Vulnerabilities Used By Known Forms Of Attacks Ability To Restrict Administrative Activities To Authorized Users Only Log Certain Activities

Configure The Server - Step 1 Keeping Operating Systems And Applications Software Up-to-date Minimize The Gap In Time Between The Vulnerability And The Fix Can Be Done By Developing And Maintaining A List Of Sources Of Information About Problems That Apply To Your System

Configure The Server - Step 2 Offer Only Essential Network Services And Operating System Services By Isolating Hosts It Allows For Each Host To Have Only One Administrator And Implements What Is Known As Separation Of Duties Reduce The Number Of Logs For Each Individual Host By Reducing Services On A Host, Making It Easier To Identify A Problem Create And Record Cryptographic Check- sums And Baselines For The System

Configure The Server - Step 3 Configure The Server For User Authentication Adding User’s Information To The Authentication Server Setting Up Authentication Hardware Such As Tokens, One- time Password Devices, Or Biometric Devices Remove Unneeded Default Accounts And Groups Hardware Based Password Computer’s Firmware Offers The Feature Of Requiring A Password When The System Is Turned On; This Is Known As A BIOS Or EEPROM Password

Configure The Server - Step 4 Identify And Enable System And Network Logging Mechanisms Collecting Data Generated By System, Network, Application, And User Activates Is Essential For Analyzing The Security Of These Assets And Detecting Intrusion *One Big No-No In Logs Is Logging Passwords, Correct Or Incorrect User’s Logs Logging Login/Logout Information, Location And Time Of Failed Attempt, And Changes In Authentication Status System Logs Status Or Errors Reported By Hardware Or Software Subsystems, Along With Changes In System Status, Including Shutdowns And Restarts Network Logs Service Initiation Requests Along With The Names Of Users/Hosts Requesting A Service

Configure The Server - Step 5 Setting Up A Backup System For Each Server Without A Backup, You May Be Unable To Restore A Computer’s Data After System Failures And Security Breaches Create A Plan With The Following Guidelines Specify That The Data Is Encrypted Before It Is Sent Over The Network Or To A Storage Medium Data Should Remain Encrypted While On The Backup Storage Medium Storage Media Should Be Kept In A Physically Secure Facility That Is Secure From Man-Made And Natural Disasters

Maintain The Integrity Of Deployed Servers - Step 1 Protect The Server From Viruses And Similar Threats Virus Is A Code Fragment That Reproduces By Attaching To Another Program. It Can Damage Data Directly Or Degrade System Performance By Consuming System Resources Trojan Horse Is An Independent Program That Appears To Perform A Useful Function But Hides Another Unauthorized Program Inside Of It Worm Is An Independent Program That Reproduces By Coping Itself From One System To Another, Usually Over A Network

Maintain The Integrity Of Deployed Servers - Step 2 Distribute Anti-Virus Programs Train Users To Use And Monitor These Anti-Virus Programs To Spot Any Suspicious Activity Check For Updates To Anti-Virus Programs Venders Usually Release Updates Weekly Or Monthly

Maintain The Integrity Of Deployed Servers - Step 3 Only Allow Appropriate Physical Access To The Servers, Monitors And Keyboards Servers Should Not Be Placed In An Individual’s Office Protect The Wiring And Other Network Connection Components Away From Physical Access Should Be A List Of Who Is Allowed To Access The Server, Monitor And Keyboard In Order To Install Hardware And Modify Existing Hardware Or Software

Summary Need For Networked Servers Types Need For Secure Servers Major Issues Activities Performed In Securing Servers

Sources Scarfone, Karen, Wayne Jansen, Miles Tracy “Guide To General Server Security” National Institute Of Technology And Standards, July 2008 Allen, Julie, Gary Ford, Klaus-Peter Kossakowski “Securing Network Servers” CMU/SEI-SIM-010, April 2000

Questions?