Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Slides:



Advertisements
Similar presentations
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
NESCOT CATC1 Access Control Lists CCNA 2 v3 – Module 11.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology. BRUCE SCHNEIER,
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
1 Enabling Secure Internet Access with ISA Server.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Computer Security Fundamentals by Chuck Easttom Chapter 9: Computer Security Software.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Chapter Three. Which of the following protocols is a file transfer protocol using SSH? A.SFTP B.TFTP C.SICMP D.CCMP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Windows 7 Firewall.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Privilege Management Chapter 22.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Click to edit Master subtitle style Chapter 15: Physical Security and Risk.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Copyright ©2016 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training What’s New in Fireware v
CHAPTER THREE TEST REVIEW COMPTIA SECURITY+ SYO-401.
Defining Network Infrastructure and Network Security Lesson 8.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Security fundamentals
Click to edit Master subtitle style
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
TECHNOLOGY GUIDE THREE
Computer Data Security & Privacy
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
FTP - File Transfer Protocol
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-401)
6.6 Firewalls Packet Filter (=filtering router)
Security+ Guide to Network Security Fundamentals, Third Edition
Firewalls (March 2, 2016) © Abdou Illia – Spring 2016.
Access Control Lists CCNA 2 v3 – Module 11
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Chapter 8 Network Perimeter Security
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Introduction to Network Security
LM 5. Wireless Network Security
Presentation transcript:

Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Defining Firewalls Firewalls are a combination of ___ & ___ What is a “black box?” (p. 502) Default deny or default allow – which one?

Types of Firewalls Network-based firewalls protect __ from __. Host-based firewalls protect ____.

Access Control Lists How they are processed Lines are compared in sequential order After a match is made, ACL is exited Implicit deny at the end – why? Standard ACLs vs Extended ACLs Inbound vs outbound ACLs

Ways to make things more secure DMZ - Image on page 507 Protocol switching – shift to IPX – why? Proxy Services IP proxy Web proxy FTP proxy SMTP proxy

More Firewall Stuff Network Layer Firewalls Stateful – Stateless – Application Layer Firewalls Slower, because they …

Scanning Services Default Scanning Settings:

Filtering for Content Common things to filter:

Local Browser Settings Zones Trusted Sites Customizing Settings

Intrusion Detection Systems (IDS) More of a watchdog than a firewall Can be software or an actual device Passive responses: (honeypot) -

VPN Concentrators Like a firewall, but made for VPNs Allows for higher-speed throughput Allows for encryption

Problems Affecting Device Security Physical security – where to keep stuff Climate conditions – Three barriers to your server – Security zones ID Badges

Logical Security Configurations Logging On Locally Only administrator can log onto server Administrator must log on locally – why?

Access-Control Principles Utilize implicit denies (UNIX) -.allow file (UNIX) -.deny file Least-privilege model Separate administrative duties Rotate administrator jobs

Access Control Methods Mandatory Access Control (MAC) Model … Discretionary Access Control (DAC) … Role-Based Access Control (RBAC) … Rule-Based Access Control (RBAC) …

Unsecure Protocols (UNIX) –

Secure Protocols