Managing Secure Network Systems

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Web Server Administration TEC 236 Securing the Web Environment.
Security+ Guide to Network Security Fundamentals
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Firewalls and Intrusion Detection Systems
IS Network and Telecommunications Risks
Web Server Administration
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Lecture 11 Reliability and Security in IT infrastructure.
Web server security Dr Jim Briggs WEBP security1.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
FIREWALL Mạng máy tính nâng cao-V1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
BUSINESS B1 Information Security.
NETWORK SECURITY PRESENTed By SADASIVARAO.G. ABSTRACT:  Network security is a complicated subject, historically only tackled by well-trained and experienced.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Note1 (Admi1) Overview of administering security.
Module 11: Designing Security for Network Perimeters.
Lesson 7: Network Security and Attacks. Computer Security Operational Model Protection = Prevention+ (Detection + Response) Access Controls Encryption.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
DoS/DDoS attack and defense
TCP/IP. The idea behind TCP/IP is exactly the same we explained about the OSI reference model: when transmitting data, programs talk to the Application.
Data Security in Local Network Using Distributed Firewall Presented By- Rahul N.Bais Guide Prof. Vinod Nayyar H.O.D Prof.Anup Gade.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Network Security. Introduction to Networking What is Network ? The ISO/OSI Reference Model - The International Standards Organization (ISO) Open Systems.
CompTIA Security+ Study Guide (SY0-401)
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Working at a Small-to-Medium Business or ISP – Chapter 8
FIREWALL configuration in linux
OSI model vs. TCP/IP MODEL
Network Security Marshall Leitem 11/30/04
Domain 4 – Communication and Network Security
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Outline Introduction Characteristics of intrusion detection systems
CompTIA Security+ Study Guide (SY0-401)
CS4622 Team 4 Worms, DoS, and Smurf Attacks
* Essential Network Security Book Slides.
Firewalls Jiang Long Spring 2002.
Lecture 2: Overview of TCP/IP protocol
Lecture 3: Secure Network Architecture
Introduction to Network Security
CSE 542: Operating Systems
CSE 542: Operating Systems
The TCP/IP Model.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Managing Secure Network Systems Melissa Peters COSC 481

Overview Introduction to Network Security Network Protocols Security Policy Network Attacks Intrusion Detection Systems Incident Response and Disaster Recovery

Network Security Brief Network Security consists of the provisions needed to effectively secure the infrastructure of the network to prevent unauthorized access of the network or its resources

Where Network Security Starts First step is authenticating the user After authentication, firewall enforces the rules Intrusion detection systems can detect what may have been missed because they examine network traffic ACL’s on a backup firewall can catch even more Honeypots look appealing to the unsuspecting hacker

Network Protocol: TCP/IP TCP/IP-Language of the Internet; links Network (IP) and Transport (TCP) layers in the OSI Model

Pros and Cons of TCP/IP PROS Open protocol; available to everyone Guaranteed packet delivery (‘syn/ack’) Our ultimate way to ‘map’ to each other via computer CONS Can easily be spoofed or hijacked Requires authentication and security at the Application level Not good for streaming media

UDP-User Datagram Protocol Although UDP is not as common as TCP/IP, it is much better suited for such tasks like streaming media simply because it doesn’t have to use the syn/ack like TCP/IP. It is not as robust as TCP/IP and is considered less reliable.

Security Policy Important part of managing a secure network system and should follow these steps: Identifying the assets Identify required security measures needed and the users responsibilities Identify who is responsible for implementing and maintaining the policy Include a training policy to improve employee awareness

When making critical systems design decisions regarding your network, management needs to identify exactly how the network will be used. Examples of these include: Groups of users who will be given Internet access The frequency in which they will be accessing The type of access required (i.e. email, web browser, file transfer, remote logons,etc.) The type of authentication method used The type of activity permitted, such as being monitored, hours of usage, or file transfers permitted. Following these steps can keep insider access limited as well as outsider access at a minimum

Network Attacks

Denial of Service One of the nastiest attacks on a network Easy to launch, difficult to track Floods host with incoming packets making it impossible to respond, shutting down the service and rendering it useless Becoming less popular now with better designed routers and rule bases

Other Attacks Teardrop Attack or the ‘Ping of Death’ Buffer overflow attacks Viruses, trojans, and worms Executing illicit commands Data diddling and data destruction

Ways to Prevent Network Attacks Use Packet Filtering IP Firewalling Update patches regularly Always backup your system Avoid systems with single points of failure Don’t put data where it doesn’t need to be!

Intrusion Detection Systems Can be protocol based, rate based, or behavior based Active or Passive Sensor, Console, Engine May catch potentially harmful things that may have slipped past firewall

Incident Response and Disaster Recovery

Can you handle it? Depending on your system, the amount of fault tolerance you allow depends on the level of security in your system If a product fails or if your system is breached, you must have an incident recovery and response plan in place to return things to normal

We’ve Covered… Network Security Basics Protocols Network Attacks and Defenses Intrusion Detection Systems Incident Recovery Any questions?