CompTIA Security+ Study Guide (SY0-501)

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Access Control Chapter 3 Part 5 Pages 248 to 252.
1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
(part 4).  Gateways  A gateway is responsible for translating information from one format to another and can run at any layer of the OSI model, depending.
Guide to Network Defense and Countermeasures Second Edition
Firewall Configuration Strategies
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
seminar on Intrusion detection system
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Department Of Computer Engineering
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Security Guide for Interconnecting Information Technology Systems
Computer Security Fundamentals by Chuck Easttom Chapter 9: Computer Security Software.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Intrusion Detection Chapter 12.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
By Jim White WiredCity, Div. of OSIsoft Copyright c 2004 OSIsoft Inc. All rights reserved. Cyber Security Tools.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Chapter 2 Securing Network Server and User Workstations.
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
IS3220 Information Technology Infrastructure Security
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Some Great Open Source Intrusion Detection Systems (IDSs)
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
OSSEC HIDS ● Jonathan Schipp ● Dubois County Linux User Group ● Sept 4 th, 2011 ● jonschipp (at) gmail.com.
Defining Network Infrastructure and Network Security Lesson 8.
CompTIA Security+ Study Guide (SY0-401)
Proventia Network Intrusion Prevention System
CONNECTING TO THE INTERNET
1.
Security Methods and Practice CET4884
Click to edit Master subtitle style
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-401)
NETWORK SECURITY LAB Lab 9. IDS and IPS.
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Computer Security Network Security
IT Vocab IT = information technology Server Client or host
ISMS Information Security Management System
Home Internet Vulnerabilities
IS4680 Security Auditing for Compliance
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
CORE Security Technologies
Intrusion Prevention Systems
Chapter 4: Protecting the Organization
Intrusion Detection system
Introduction to Network Security
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

CompTIA Security+ Study Guide (SY0-501) Chapter 3: Understanding Devices and Infrastructure

Chapter 3: Understanding Devices and Infrastructure Install and configure network components, both hardware- and software-based to support organizational security

Designing with Security in Mind Firewalls VPNs and VPN concentrators Intrusion detection systems

Intrusion Detection Systems

Intrusion Detection Systems An intrusion detection system (IDS) is software that runs on either individual workstations or network devices to monitor and track network activity. Intrusion detection systems (IDSs) are becoming integral parts of network monitoring. Intrusion detection (ID) is the process of monitoring events in a system or network to determine whether an intrusion is occurring An intrusion is defined as any activity or action that attempts to undermine or compromise the confidentiality, integrity, or availability of resources.

Chapter 3: Protecting Networks IDSs use four primary approaches Behavior-based detection Signature-based detection, also commonly known as misuse-detection IDS (MD-IDS) Anomaly-detection IDS Heuristic IDS

Network-Based IDS

Using a Hub to Attach NIDS to the Network

Implementing a Passive Response Passive response : The most common type of response to many intrusions. In general, passive responses are the easiest to develop and implement. Some passive response strategies Logging Notification Shunning

Implementing an Active Response Involves taking an action based on an attack or threat An active response will include one of these reactions: Terminating processes or sessions Network configuration changes Deception

Host-Based IDs A host-based IDS (HIDS) is designed to run as software on a host computer system. HIDSs are popular on servers that use encrypted channels or channels to other servers.

Chapter 3: Protecting Networks Network Intrusion Prevention Systems (NIPSs) focus on prevention. These systems focus on signature matches and then take a course of action.

Security-Related Devices Router Switch Proxy Load balancer Access point SIEM DLP NAC Mail gateway Bridge SSL/TLS accelerators SSL decryptors Media gateway