1 10/31/05 NETWORK PLANNING TASK FORCE Information Security.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Guide to Network Defense and Countermeasures Second Edition
1 NETWORK PLANNING TASK FORCE FY’06 “ Final Session – Setting the Rates” 12/5/05.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Network Security In Education A Balancing Act Doug Klein CTO Vernier Networks, Inc.
Firewall Configuration Strategies
Chapter 7 HARDENING SERVERS.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
1 Information Security Vision Part II Network Planning Task Force 10/8/2003 Deke Kassabian and Dave Millar.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
1 11/21/05 NETWORK PLANNING TASK FORCE FY’06 Final Strategy Meeting.
1 NETWORK PLANNING TASK FORCE FY’07 “ Setting the Rates” 11/20/06.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Campus Firewalling Dearbhla O’Reilly Network Manager Dublin Institute of Technology.
Intranet, Extranet, Firewall. Intranet and Extranet.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 6 of the Executive Guide manual Technology.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FNAL System Patching Design Jack Schmidt, Al Lilianstrom, Andy Romero, Troy Dawson, Connie Sieh (Fermi National Accelerator Laboratory) Introduction FNAL.
Module 11: Remote Access Fundamentals
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Note1 (Admi1) Overview of administering security.
STRATEGY SESSION SEPTEMBER 15, YEAR SECURITY DISCUSSION 1 NETWORK PLANNING TASK FORCE.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Module 11: Designing Security for Network Perimeters.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Security fundamentals Topic 10 Securing the network perimeter.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Module 10: Windows Firewall and Caching Fundamentals.
Proposed UW Minimum Computer Security Standards From C&C 28 Jan 2005 Draft.
12/15/20031 Network Planning Task Force “Consensus Building: Final Rate Setting for FY ‘05”
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Managed IT Services JND Consulting Group LLC
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Security fundamentals
Working at a Small-to-Medium Business or ISP – Chapter 8
Securing the Network Perimeter with ISA 2004
IS4550 Security Policies and Implementation
Unit 27: Network Operating Systems
IS4680 Security Auditing for Compliance
6. Application Software Security
Fy ‘08 NETWORK PLANNING TASK FORCE
Presentation transcript:

1 10/31/05 NETWORK PLANNING TASK FORCE Information Security

2 Agenda ■Overview of ISC’s Security Architecture ■Discussion ■Scan and block ■Edge filtering ■VPN or other options ■Local firewall support ■Critical host policy

3 Security Architecture

4 Scan and Block ■Opportunity: Networks of unmanaged machines would be more secure if we could scan them at network connection time and then periodically (e.g. every four hours) for common backdoors. Vulnerable machines could be quarantined until they are remediated. Hacked machines could be kept off the network until remediated. ■Solution: Deploy a “scan and block” system to help prevent network access by compromised or vulnerable computers. ■Authenticated wired and wireless network access, with brief scan of hosts for major vulnerabilities at connection time. ■Quarantine those with problems found, until they can be patched or repaired. ■Allow those that “pass” the scan to access the network. ■Schedule deeper scans once connected. ■Advantages ■Limits the spread of worms, and will be more effective when coupled with edge filtering. ■Requires logging in. ■Disadvantages ■False positives ■Adds complexity to network access and makes troubleshooting difficult. ■Requires logging in. ■Implementation Considerations: ■Planned for implementation in the residential system Summer, ■What are the possibilities of implementing this in other “transient” networks like wireless Law, Dental, Library, etc. ■Funding required.

5 Scan and Block To PennNet -OR- Access Network Quarantine and Remediation Network Production Service Network Scanning Server Remediation Server

6 Scan and Block To PennNet -OR- Access Network Quarantine and Remediation Network Production Service Network Scanning Server Remediation Server

7 Some of the vendors with products in this (relatively new) space ■ Cisco Clean Access (nee Perfigo) ■ Lockdown Networks ■ Bradford Networks ■ Impulse Point ■ Risk Analytics (LAN Switchboard) ■ Bluesocket, Vernier authenticating gateways

8 Timeline ■ ISC work to design a solution for Network Access Protection started in summer ■ SUG and IT Roundtable talks in June ■ Evaluations of packaged vendor solutions began in September ■ Goal of deployment in residential buildings for start of Fall Could be expanded thereafter. Jul 04 Jan 05 Jul 05 Jan 06 Jul 06 Solutions Design EvaluationsPurchase & Integrate, or Build Planned Deployment Initial SUG And ITR Talks

9 Edge Filtering ■Opportunity: Windows machines at Penn get hacked more frequently than they would if there were better perimeter protection blocking NetBios at the edge. ■Option 1: Block NetBios on internal router interfaces (subnets) upon local request. ■Advantages ■Provides protection from the most common worms and attacks for only those subnets where such protection is desired. ■Disadvantages ■More complex to administer ■Limited protection ■May not be as granular as people want ■Would reduce mobility – local campus access across subnets would be blocked.

10 Edge Filtering (cont.) ■Option 2: Block NetBios at edge routers. ■Advantages ■More complete protection ■Allows mobility on campus ■Disadvantages ■May necessitate a campus VPN solution ■Implementation Considerations: ■Primary implementation timing considerations are: ■Availability of a VPN or some other option to provide secure remote access to NetBios services ■The need to broadly communicate that filtering will be implemented and how to get secure, remote access. This is probably a 3-5 month communication effort. ■Determining the exception lists will add to delivery time. ■Need to pick a firm date for implementation like July 1, ■This approach above could be implemented with existing funding. ■We recommend option 2.

11 VPN or Other Options ■Opportunity: If NetBios is blocked either at the edge or on internal routers, faculty, staff, students with legitimate need for remote access to Windows file sharing, Exchange, etc. need a mechanism or approach to get through the filters. ■Option 1: Central Campus VPN Service ■Advantages ■Besides providing remote access to Netbios, also provides network encryption for those applications that aren’t amenable to a network encryption solution. ■Disadvantages ■Cost ■Complexity, both centrally for ISC and for users ■Implementation considerations: Could be implemented FY07 if funded.

12 VPN or Other Options ■Option 2: Allow NetBios in a reserved range of addresses. External traffic bound for Netbios services on all other Penn IP addresses would be blocked. NetBios would be remotely available for machines in the subnet. ■Advantages ■Cost saving over VPN solution ■User simplicity ■Local IT control ■Disadvantages ■Requires renumbering IP addresses by LSPs ■Implementation Considerations ■Could be implemented FY06 with existing funding ■Requires work-arounds to support Windows browsing. ■Option 3: Block NetBios at the edge and manage host-by-host exception lists in the edge filtering rules. ■Advantages ■Cost saving over VPN solution ■User simplicity ■Disadvantages ■Complex administration ■Reduced control for server administrators compared to option 2. ■Implementation Considerations ■Could be implemented FY06 with existing funding if exception list is small (200 campus-wide) and changes infrequently.

13 VPN or Other Options ■Option 4: Replace remote access to NetBios services with functional equivalents that don’t use NetBios – e.g. Exchange Server 2003 RPC over HTTP and a campus “MyFiles” service, likely using WebDAV. ■Advantages ■File Handing – Better way to share large documents without . ■Less complex for end users and support providers. ■Built in clients. ■Disadvantages ■Requires changes from Exchange Administrators and individual end users. ■End users must run Outlook 2003 ■Implementation Considerations ■Could be implemented FY07 if funded. ■More investigation required.

14 Local Firewall Support ■Opportunity: There is currently no supported firewall product. Each group that implements a firewall has to climb the learning curve independently. ■Proposed Solutions: ■ISC to select a recommended firewall product. ■ISC to provide a for-fee firewall consulting service. ■Streamline ISC intake for this service to coordinate with TSS, Networking and Security. Work to improve awareness of ISC’s support for local firewalls. ■Recommend external consultants. ■Implementation Considerations: ■Target to implement May 2006.

15 Rationale for Distributing Security Responsibility ■Goal: Find the proper balance of what security services to provide centrally vs. perform locally. ■Planning Assumption: For local services, you may either “do-it- yourself” or hire ISC for-fee. ■Rationale: ■Provide services centrally when they can be most efficiently and effectively done over the network. ■Provide security services locally when it is more effective and efficient to perform them locally. ■Examples: ■Vulnerability and compromise scans be effectively and efficiently performed centrally, except for machines behind firewalls. ■Password cracking can be most effectively and efficiently done locally with host-based password cracking software.

16 Proposed Next Version Critical Host & Proposed Services NEW LOCAL DUTYSUPPORTING ISC PRODUCT/SERVICE By 1/1/07, scan critical hosts for vulnerabilities monthly.Provide training on security scanners – ISS, Nessus, Scanline Provide a for-fee security scanning service By 1/1/07, run password cracking software monthly.Recommend platform-specific cracking software. By 7/1/07, place critical hosts with confidential data behind a firewall. Establish a supported firewall product, matched with for-fee, vendor-provided firewall administrator training. Provide a for-fee firewall consulting service to select and configure a firewall. Publish a list of approved and qualified firewall consulting services. By 7/1/07, implement a program of local Intrusion Detection or Prevention to detect common network attacks promptly. Recommend an intrusion detection product and provide supporting training. By 7/1/07, encrypt confidential data stored on Personal Computing Devices. Recommend encryption tools (e.g. encrypting file systems, PGP) By 7/1/07, all access to Critical Hosts by individuals with Administrator or Root-level privileges must use two-factor authentication. Commit to provide supporting documentation and infrastructure Deploy documentation and infrastructure. Establish two-factor authentication standard