Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.

Slides:



Advertisements
Similar presentations
BalaBit Shell Control Box
Advertisements

Mr C Johnston ICT Teacher
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Module 5: Configuring Access for Remote Clients and Networks.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Chapter 12 Network Security.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Chapter 7 HARDENING SERVERS.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Security Awareness: Applying Practical Security in Your World
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Lecture 11 Reliability and Security in IT infrastructure.
Accounting Management IACT 918 April 2005 Glenn Bewsell/Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Host Intrusion Prevention Systems & Beyond
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Intranet, Extranet, Firewall. Intranet and Extranet.
COEN 252 Computer Forensics
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 9: Novell NetWare
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Vantage Report 3.0 Product Sales Guide
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Computer Emergency Notification System (CENS)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Information Systems Security
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Network Security & Accounting
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Module 8 Implementing Security Using Group Policy.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Computer Security Sample security policy Dr Alexei Vernitski.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Network System Security - Task 2. Russell Johnston.
8 – Protecting Data and Security
Securing Network Servers
Common Methods Used to Commit Computer Crimes
Module Overview Installing and Configuring a Network Policy Server
Configuring and Troubleshooting Routing and Remote Access
Business Risks of Insecure Networks
Firewalls.
File Transfer Protocol
Firewalls Jiang Long Spring 2002.
AbbottLink™ - IP Address Overview
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong

2 Overview Security Management Security management is the process of protecting sensitive information Sensitive information is any data an organisations wants to secure It may include –Payroll data –Customer accounts –Research and development schedules

3 Overview Security Management Security management enables network engineers to protect sensitive data by –Limiting access to hosts and network devices –Notifying the engineer of actual breaches

4 Overview Security Management It consists of –Identifying the sensitive information to be protected –Finding the access points software services Hardware components Network media –Securing the access points –Maintaining the secure access points

5 Overview Security Management Should NOT be confused with –Application security –Operating system security –Physical security

6 Benefits of the Security Management Process Primary concern of users –Lack of security for sensitive information located on HOST One solution –Remove network access to host Whilst secure this method is not efficient and removes need for data network altogether Drawbacks of NOT having security management –All users have access to ALL information –What happen if network connects to a public network –Virus and worm attacks

7 Accomplishing Security Management Balance required between –Need to secure sensitive information –Needs of users to access information to do their job Security Management involves the following four steps –Identify the sensitive information –Find the access points –Secure the access points –Maintain the secure access points

8 Identify the Sensitive Information Determine which hosts on the network have sensitive information –Organisation may have polices on what is considered sensitive Information may relate to –Accounting –Financial –Customer –Market –Engineering –Employees What is defined as sensitive may vary depending on the specific environment Most difficult part may be identifying WHERE the information resides

9 Find the Access Points Once you know –What data is considered sensitive –Where the data is located Need to find out how network users access the information Access methods and points may be –Physical –Software

10 Find the Access Points Software that accesses the network can potentially access any data on the network Most networks allow for remote login –If remote login doesn’t Identify users uniquely and Limit their movements to authorised areas –This access point needs to be examined

11 Find the Access Points File transfer programs –If users cannot be uniquely identified Use needs to be examined or limited Restrict access to onsite DMZs Firewall anonymous FTP

12 Find the Access Points Other programs to examine may include – –Remote process execution –File and directory servers –Name servers –Web servers

13 Find the Access Points Security management can be accomplished by –Hiding information from client systems –Segmenting network into regions Apple zones

14 Find the Access Points Leaks may come from –Network analysers –Network management protocols –Network management system Policies may include –Hosts with sensitive information may not also allow anonymous FTP –Personal computer software packages MUST meet security standards before installation

15 Secure the Access Points Access points can be secured by –Using encryption at the data link layer –Secure traffic flow by using packet filters at the network layer –On every host use one or more of Host authentication User authentication Key authentication

16 Maintain the Secure Access Points Key to maintaining security is the location of actual or potential security breaches –May be done as part of the security audit –Hard to keep current with volume of networking software May use a program itself to check for known security problems May offer a cash prize to first to breach security –Generally offered by company who designed software/hardware

17 Attaching to a Public Network Three types of access from a public data network to an organisations network –No access Send and receive Modem used –Full access –Limited access Small subset of hosts authorised to provide public access service These hosts should be separated with firewall from private zone

18 Security Management on a Network Management System Simple –Show where security measures have been set up –Show all security measures applicable to device or host –Query configuration database

19 Security Management on a Network Management System More Complex –Include real time application to monitor access points –Query number of breaches using network management tool –Produce reports on breaches –Automatic notification Advanced –Use data to guide network engineers –Examine types of security required –Alerts for repercussions

20 Reporting Security Events Audit trails that summarise and report on security Example –Key personnel leaving to go to competition –Remove physical access to network –Remove accounts, change passwords etc –Set up, or confirm, audit trails on device former employee had access to –Look for files application employee may have altered to gain future access