Ongoing Administration Chapter 11. Learning Objectives Learn how to evolve a firewall to meet new needs and threats Adhere to proven security principles.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Guide to Network Defense and Countermeasures Second Edition
Chapter 8: Firewall Configuration and Administration
Intrusion Detection Systems and Practices
Firewall Configuration and Administration. 2 Learning Objectives Set up firewall rules that reflect an organization’s overall security approach Identify.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Intrusion Detection MIS ALTER 0A234 Lecture 3.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
COEN 252: Computer Forensics Router Investigation.
Host Intrusion Prevention Systems & Beyond
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Department Of Computer Engineering
Network security policy: best practices
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Security Guidelines and Management
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Guide to Firewalls and VPNs, 3rd Edition
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Hands-On Microsoft Windows Server 2008
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
1 Guide to Network Defense and Countermeasures Chapter 2.
Hacker Zombie Computer Reflectors Target.
COEN 252 Computer Forensics
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Guide to Network Defense and Countermeasures
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Chapter 5: Implementing Intrusion Prevention
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 8 Firewall Configuration and Administration By Whitman, Mattord, & Austin© 2008.
Security fundamentals Topic 13 Detecting and responding to incidents.
Cryptography and Network Security Sixth Edition by William Stallings.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IS3220 Information Technology Infrastructure Security
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Security Methods and Practice CET4884
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Securing Network Servers
Critical Security Controls
Click to edit Master subtitle style
Introduction to Networking
6. Application Software Security
Presentation transcript:

Ongoing Administration Chapter 11

Learning Objectives Learn how to evolve a firewall to meet new needs and threats Adhere to proven security principles to help the firewall protect network resources Use a remote management interface Track log files for security continued

Learning Objectives Follow basic initial steps in responding to security incidents Take advanced firewall functions into account when administering a firewall

Making Your Firewall Meet New Needs Throughput Scalability Security Recoverability Manageability

Verifying Resources Needed by the Firewall Ways to track memory and system resources Use the formula: MemoryUsage = ((ConcurrentConnections)/ (AverageLifetime))*(AverageLifetime + 50 seconds)*120 Use software’s own monitoring feature

Verifying Resources Needed by the Firewall

Allocating More Memory

Identifying New Risks Monitor activities and review log files Check Web sites to keep informed of latest dangers; install patches and updates

Adding Software Updates and Patches Test updates and patches as soon as you install them Ask vendors (of firewall, VPN appliance, routers, etc) for notification when security patches are available Check manufacturer’s Web site for security patches and software updates

Using an Automated Update Feature

Obtaining Updates from the Vendor’s Web Site

Adding Hardware Identify network hardware so firewall can include it in routing and protection services Different ways for different firewalls List workstations, routers, VPN appliances, and other gateways you add as the network grows Choose good passwords that you guard closely

Dealing with Complexity on the Network Distributed firewalls Installed at endpoints of the network, including remote computers that connect to network through VPNs Add complexity  Require that you install and/or maintain a variety of firewalls located on your network and in remote locations Add security  Protect network from viruses or other attacks that can originate from machines that use VPNs to connect (eg, remote laptops)

Dealing with Complexity on the Network

Adhering to Proven Security Principles Generally Accepted System Security Principles (GASSP) apply to ongoing firewall management Secure physical environment where firewall- related equipment is housed Importance of locking software so that unauthorized users cannot access it

Environmental Management Measures taken to reduce risks to physical environment where resources are stored Back-up power systems overcome power outages Back-up hardware and software help recover network data and services in case of equipment failure Sprinkler/alarm systems reduce damage from fire Locks guard against theft

BIOS, Boot, and Screen Locks BIOS and boot-up passwords Supervisor passwords Screen saver passwords

Using Remote Management Interface Software that enables you to configure and monitor firewall(s) that are located on different network locations Used to start/stop the firewall or change rulebase from locations other than the primary computer

Why Remote Management Tools Are Important Reduce time and make the job easier for the security administrator Reduce chance of configuration errors that might result if the same changes were made manually for each firewall on the network

Security Concerns with Remote Management Tools Can use a Security Information Management (SIM) device to prevent unauthorized users from circumventing security systems Offers strong security controls (eg, multi-factor authentication and encryption) Should have an auditing feature Should use tunneling to connect to the firewall or use certificates for authentication Evaluate SIM software to ensure it does not introduce new vulnerabilities

Basic Features Required of Remote Management Tools Ability to monitor and configure firewalls from a single centralized location View and change firewall status View firewall’s current activity View any firewall event or alert messages Ability to start and stop firewalls as needed

Tracking Contents of Log Files for Security Reviewing log files can help detect break- ins that have occurred and possibly help track down intruders Tips for managing log files Prepare usage reports Watch for suspicious events Automate security checks

Preparing Usage Reports Sort logs by time of day and per hour Check logs to learn when peak traffic times are on the network Identify services that consume the largest part of available bandwidth

Preparing Usage Reports

Suspicious Events to Watch For Rejected connection attempts Denied connections Error messages Dropped packets Successful logons to critical resources

Responding to Suspicious Events Firewall options Block only this connection Block access of this source Block access to this destination Track the attacks Locate and prosecute the offenders

Tools for Tracking Attacks Sam Spade Netstat NetCat

Compiling Legal Evidence 1.Identify which computer or media may contain evidence 2.Shut down computer and isolate work area until computer forensic specialist arrives 3.Write protect removable media 4.Preserve evidence (make a mirror image) so it is not manipulated continued

Compiling Legal Evidence 5.Examine the mirror image, not the original 6.Review log files and other data; report findings to management 7.Preserve evidence by making a “forensically sound” copy

Compiling Legal Evidence Observe the three As of computer forensics Acquire Authenticate Analyze

Automating Security Checks Outsource firewall management

Security Breaches Will Happen! Use software designed to detect attacks and send alert notifications Take countermeasures to minimize damage Take steps to prevent future attacks

Using an Intrusion Detection System (IDS) Detects whether network or server has experienced an unauthorized access attempt Sends notification to appropriate network administrators Considerations when choosing Location Intrusion events to be gathered Network-based versus host-based IDS Signature-based versus heuristic IDS

Network-Based IDS Tracks traffic patterns on entire network segment Collects raw network packets; looks at packet headers; determines presence of known signatures that match common intrusion attempts; takes action based on contents Good choice if network has been subject to malicious activity (eg, port scanning) Usually OS-independent Minimal impact on network performance

Host-Based IDS Collects data from individual computer on which it resides Reviews audit and system logs, looking for signatures Can perform intrusion detection in a network where traffic is usually encrypted Needs no additional hardware Cannot detect port scans or other intrusion attempts that target entire network

Signature-Based IDS Stores signature information in a database Database requires periodic updating Can work with either host-based or network-based IDS Often closely tied to specific hardware and operating system Provides fewer false alarms than heuristic IDS

Heuristic IDS Compares traffic patterns against “normal activity” and sets off an alarm if pattern deviates Can identify any possible attack Generates high rate of false alarms

Receiving Security Alerts A good IDS system: Notifies appropriate individuals (eg, via , alert, pager, or log) Provides information about the type of event Provides information about where in the network the intrusion attempt took place

When an Intrusion Occurs React rationally; don’t panic Use alerts to begin assessment Analyze what resources were hit and what damage occurred Perform real-time analysis of network traffic to detect unusual patterns Check to see if any ports that are normally unused have been accessed Use a network auditing tool (eg, Tripwire)

During and After Intrusion Document the existence of: Executables that were added to the system Files that were  Placed on the computer  Deleted  Accessed by unauthorized users Web pages that were defaced messages that were sent as a result of the attack Document your response to the intrusion

Configuring Advanced Firewall Functions Ultimate goal High availability Scalability Advanced firewall functions Data caching Redundancy Load balancing Content filtering

Data Caching Set up a server that will Receive requests for URLs Filter those requests against different criteria Options No caching URI Filtering Protocol (UFP) server VPN & Firewall (one request) VPN & Firewall (two requests)

Hot Standby Redundancy Secondary or failover firewall is configured to take over traffic duties in case primary firewall fails Usually involves two firewalls; only one operates at any given time The two firewalls are connected in a heartbeat network

Hot Standby Redundancy

Advantages Ease and economy of set up and quick back-up system it provides for the network One firewall can be stopped for maintenance without stopping network traffic Disadvantages Does not improve network performance VPN connections may or may not be included in the failover system

Load Balancing Practice of balancing the load placed on the firewall so that it is handled by two or more firewall systems Load sharing Practice of configuring two or more firewalls to share the total traffic load Traffic between firewalls is distributed by routers using special routing protocols Open Shortest Path First (OSPF) Border Gateway Protocol (BGP)

Load Balancing

Load Sharing Advantages Improves total network performance Maintenance can be performed on one firewall without disrupting total network traffic Disadvantages Load usually distributed unevenly (can be remedied by using layer four switches) Configuration can be complex to administer

Filtering Content Firewalls don’t scan for viruses but can work with third-party applications to scan for viruses or other functions Open Platform for Security (OPSEC) model Content Vectoring Protocol (CVP)

Filtering Content

Filtering Content Guidelines Install anti-virus software on SMTP gateway in addition to providing desktop anti-virus protection for each computer Choose an anti-virus gateway product that: Provides for content filtering Can be updated regularly to account for recent viruses Can scan the system in real time Has detailed logging capabilities

Chapter Summary How to expand a firewall to meet new needs Importance of observing fundamental principles of network security when maintaining the firewall Importance of being able to manage the firewall remotely and having log files for review Responding to security incidents Advanced firewall functions