Network Security and Personally Managed Computers Jordan K. Wiens Copyright Jordan K. Wiens 2004
Introduction Who am I? Who are you? What are your biggest security concerns? Why are we here?
Today’s Tasks We will be designing a virtual network in phases –Review – discuss impact of each security component –Design – Choose a specific implementation for your virtual network Once the network is complete, we will attack and defend it.
Security Components Policies Physical Design/Infrastructure Required Services Security Services
Policies AUP Physical Host security Network security Incident Response Risk assessment Awareness Data security, etc…
AUP Strong passwords and good password management Current patches Current malware protection Safe Safe browsing
Host/Network Security Users implementing infrastructure Professional management Minimum services Minimum access Vulnerability Assessment
Physical Design/Infrastructure
Required Services DHCP DNS Mail Web
Security Services IDS Firewall Authentication Gateways Patch/AV management
Security Services contd. Secure proxies Security management platforms Flow monitoring/analysis Vulnerability Assessment
Put it all Together Take some time to fill in the gaps if necessary
Hacking the Matrix Now we’ll attack and defend our simulated networks to better understand them.
Notes
Debriefing What changes could you have made to better protect your network? Are those changes worth implementing? Can all attacks be prevented?
Questions/Comments? Jordan Wiens