Information Networking Security and Assurance Lab National Chung Cheng University Network Security (I) 授課老師 : 鄭伯炤 Office: Dept. of Communication Rm #112.

Slides:



Advertisements
Similar presentations
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Advertisements

Data Center Security Overview Dr. Natheer Khasawneh Ziad BashaBsheh.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Security Assurance Policy Helper (SAPH) 鄭伯炤 Speaker.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
9-Performing Vulnerability Assessments Dr. John P. Abraham Professor UTPA.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Firewalls and Intrusion Detection Systems
Chapter 12 Network Security.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Controls for Information Security
University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
NETWORK SECURITY.
COEN 252: Computer Forensics Router Investigation.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Penetration Testing.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
FIREWALL Mạng máy tính nâng cao-V1.
Storage Security and Management: Security Framework
Lab #2 CT1406 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Session 1 Framework Security Threat Responsibility and Policy Architecture Response Flow Preparation.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
每时每刻 可信安全 1The two most common implementations of Intrusion Detection are which of the following? A Netware-based and Host-based. B Network-based and Guest-based.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Chapter 6 of the Executive Guide manual Technology.
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
Securing Wired Local Area Networks(LANs)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
IS Network and Telecommunications Risks Chapter Six.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Information Networking Security and Assurance Lab National Chung Cheng University Network Security 授課老師 : 鄭伯炤 (Bo Cheng) 中正大學通訊系 Tel: Ext
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Module 11: Designing Security for Network Perimeters.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
DoS/DDoS attack and defense
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Network Security (I) 授課老師 : 鄭伯炤 Office: Dept. of Communication Rm #112 Tel: X33512
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 4 Network Security Tools and Techniques.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Network Devices and Firewalls Lesson 14. It applies to our class…
Securing Interconnect Networks By: Bryan Roberts.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
CompTIA Security+ Study Guide (SY0-401)
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
CompTIA Security+ Study Guide (SY0-401)
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Introduction to Network Security
Session 20 INST 346 Technologies, Infrastructure and Architecture
Chapter 1 Key Security Terms.
Presentation transcript:

Information Networking Security and Assurance Lab National Chung Cheng University Network Security (I) 授課老師 : 鄭伯炤 Office: Dept. of Communication Rm #112 Tel: X

2 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University We Are in Dangerous Zone! Insider Outsider Insider Outsider Unstructured Structured Unstructured Structured CERT: Computer Emergency Response Team

3 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

4 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

5 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University Attack Motivations, Phases and Goals Revenge Political activism Financial gain Data manipulation System access Elevated privileges Denial of Service Collect Information Public data source Scanning and probing Collect Information Public data source Scanning and probing Actual Attack  Network Compromise  DoS/DDoS Attack Bandwidth consumption Host resource starvation Actual Attack  Network Compromise  DoS/DDoS Attack Bandwidth consumption Host resource starvation Analyze Information & Prepare Attacks Service in use Known OS/Application vulnerability Known network protocol security weakness Network topology Analyze Information & Prepare Attacks Service in use Known OS/Application vulnerability Known network protocol security weakness Network topology Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses Author: Ed Skoudis; Publisher: Prentice Hall; ISBN

6 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University Tools, Tools, Tools Reconnaissance Nslookup Whois ARIN Dig Target Web Site Others Network Scanning Telnet Nmap Hping2 Netcat ICMP: Ping and Traceroute Vulnerability Assessment Nessus SARA Penetration Tool “Penetration Studies – A Technical Overview” GSEC SANS GIAC Certification: Security Essentials Toolkit Author: Eric Cole et al. ISBN

7 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

8 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

9 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

10 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

11 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University Firewall An gateway that restricts data communication traffic to and from one of the connected networks (the one said to be "inside" the firewall) and thus protects that network's system resources against threats from the other network (the one that is said to be "outside" the firewall). Access Control List (ACL): A mechanism that implements access control for a system resource by enumerating the identities of the system entities that are permitted to access the resource. Outside Inside ACL

12 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University Intrusion Detection System (IDS) A security service that monitors and analyzes system events for the purpose of finding, and providing real- time or near real- time warning of, attempts to access system resources in an unauthorized manner. (RFC2828) Types of IDS:  Host-based: operate on information collected from within an individual computer system.  Network-based: listen on a network segment or switch and detect attacks by capturing and analyzing network packets.

13 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

14 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

15 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University IPSec vs. SSL IPSec (Internet Protocol Security)  Tunnel between the two endpoints  Works on the Network Layer of the OSI Model- without an association to any specific application.  When connected on an IPSec VPN the client computer is “virtually” a full member of the corporate network- able to see and potentially access the entire network  The majority of IPSec VPN solutions require third-party hardware and / or software SSL  A common protocol and most web browsers have SSL capabilities built in.  More precise access control  Only work for web-based applications and possible to web-enable applications

16 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University Financial Losses by Type of Attack in 2002  Firewall  AAA  VPN  Anti-virus  Intrusion Detection $Million Source 2002 CSI/FBI Survey 100% security is impossible; Security can only mitigate, but not eliminate Authentication: "Are you who you say you are?" Authorization: "Can you do that?" Accounting: "What did you do?" RADIUS: Remote Authentication Dial-In User Service

17 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University Network Compromise & Denial of Service Internet Intranet Extranet 74% Authentication: Password Crackers Poor Service Configuration: e.g., DNS, Mail, FTP and Web Protocol Weakness: ARP, ICMP Application hole Backdoors Physical Access Remote Access 12% Internal System 33% Out-of-Bounds Attack: e.g., Ping of Death and IP fragment attack Host Resource Starvation: e.g., SYN flood DDoS: Client  Handler  Agent  Victim e.g., Trinoo and Tribe Flood Network Bandwidth Consumption: e.g., SMURF and Fraggle Hackers Beware Author: Eric Cole; ISBN

18 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

19 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

20 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

21 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

22 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

23 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

24 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

25 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

26 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

27 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University

28 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University Risk Management Risk is the possibility of something adverse happening. Risk Management: is the process of assessing risk, taking steps to reduce risk to an acceptable level and maintaining that level of risk. VPN Firewall IDS Risk Management Risk AssessmentRisk Mitigation

29 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University Threat, Vulnerability and Asset

30 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University Risk Mitigation Action Points

31 Network Security Class National Chung Cheng University Information Networking Security and Assurance Lab National Chung Cheng University