Network Security 101 By: David Crim.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Advertisements

Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Sales presentation 2012 fdxtended.
Security Firewall Firewall design principle. Firewall Characteristics.
Network Security Overview Tales from the trenches.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Course 201 – Administration, Content Inspection and SSL VPN
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Intranet, Extranet, Firewall. Intranet and Extranet.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
“DMZ In a Box”. What is a DMZ? As a military term As a computing term.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005.
Chapter 13 – Network Security
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
PCI Compliance Technical Overview. RM PCI Calendar Dec 2005: Began PCI 15.1 development Feb 2006: Initial PCI Audit Sept 2006: Official 15.1 PCI Release.
Section 10: Security CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
20 21 Remote Wipe.
Protecting Students on the School Computer Network Enfield High School.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Firewall Security.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Homework 02 NAT 、 DHCP 、 Firewall 、 Proxy. Computer Center, CS, NCTU 2 Basic Knowledge  DHCP Dynamically assigning IPs to clients  NAT Translating addresses.
Module 7: Advanced Application and Web Filtering.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Network Security & Accounting
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
James Robnett EVLA M&C Software PDR May EVLA Monitor & Control Software PDR Monitor & Control Network Security.
Firewalls Group 11Group 12 Bryan Chapman Richard Dillard Rohan Bansal Huang Chen Peijie Shen.
© 2005,2006 NeoAccel Inc. Partners Presentation Authentication & Access Control.
BNL PDN Enhancements. Perimeter Load Balancers Scaleable Performance Fault Tolerance Server Maintainability User Convenience Perimeter Security.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
SIS - Security Lab Introductory Session University of Pittsburgh 2008.
20 21 Remote Wipe.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Liquid Telecom Network Security. Network Security - Availability Physical Infrastructure – PoP Site Security/Traffic Protection Logical – Device Hardening/Traffic.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Linux Firewalls By Shane Lofgren. Definition from wikipedia.org: A firewall is a security device which is configured to permit, deny or proxy data connections.
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
NAT、DHCP、Firewall、FTP、Proxy
CSCE 548 Student Presentation By Manasa Suthram
Module 3: Enabling Access to Internet Resources
Enabling Secure Internet Access with TMG
FORTINET Network Security NSE8 Dumps - 100% Success
Configuring Windows Firewall with Advanced Security
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
PROJECT PRESENTATION ON INTERNET FIREWALLS PRESENTED BY THE GUARDS
FTP - File Transfer Protocol
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS
Implementing TMG Server Publishing
Firewall Exercise.
Services Provided by Network Operating Systems
6.6 Firewalls Packet Filter (=filtering router)
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
Office 365 – How NOT to do it UKNOF43.
Presentation transcript:

Network Security 101 By: David Crim

Security Balance between oposing interests Security v.s. Convienience Security v.s. Resources Security v.s. Risk

Security v.s. Convenience Long Passwords, or easy to remember Open access, or forced authentication http web-site, or https

Security v.s. Resources $$$ Configuration of devices Review of logs Follow through on problems Create and enforce policies

Security v.s. Risk Telnet v.s. SSH Credit Card company v.s. weblog Microsoft v.s. local shop

Security Scope You secure your house with alarm systems, a Doberman, barbed wire, electric fences,etc… Result: Your house is more secure For you! Police View The robbery is still going to happen This simply shifts the security risk around

Network Security Traffic Control Traffic Management Authentication Firewalls ACLs Traffic Management Packetshaper NetFlow Authentication Passwords / biometrics Policies

Traffic Control Firewall ACLs Cisco PIX IP Cop / Smoothwall Windows Firewall ACLs VLAN Subnet Intranet <-> Internet

Traffic Management Packetshaping NetFlows Packeteer Packetshaper Linux tools NetFlows Ntop Cisco NetFlow accounting

Authentication Passwords Complexity Expiration Rules Length Upper/Lower case Special characters Expiration Rules Password = lv89jdNm45 Rule – All numbers are proceeded by N+1 Written “hint” = lv8jdNm4 Rule 2 – All n’s are capitalized Written “hint” becomes lv8jdnm4

Policies Enforceable policies Unenforceable policies Passwords ACLs Proxy servers Unenforceable policies Network attachment EULA Plausible deniability 