Introduction to Network Defense

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Security Controls – What Works
Security+ Guide to Network Security Fundamentals
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
Introducing Computer and Network Security
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lecture 11 Reliability and Security in IT infrastructure.
Computer Security: Principles and Practice
Controls for Information Security
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Risk Management.
Stephen S. Yau CSE , Fall Security Strategies.
Risk Management Vs Risk avoidance William Gillette.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Session 3 – Information Security Policies
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Conostix S.A. Sensible defence.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Lecture 32 Risk Management (Cont’d)
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Computer Security: Principles and Practice
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
1 TenStep Project Management Process ™ PM00.7 PM00.7 Project Management Preparation for Success * Manage Risk *
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
CC3020N Fundamentals of Security Management CC3020N Fundamentals of Security Management Lecture 2 Risk Identification and Risk Assessment.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Note1 (Admi1) Overview of administering security.
Information Security What is Information Security?
Alaa Mubaied Risk Management Alaa Mubaied
SOFTWARE PROJECT MANAGEMENT
Scott Charney Cybercrime and Risk Management PwC.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Risk Identification and Risk Assessment
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
IS3220 Information Technology Infrastructure Security
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
The NIST Special Publications for Security Management By: Waylon Coulter.
RISK MANAGEMENT: CONTROLLING RISK IN INFORMATION SECURITY By Collin Donaldson.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Stoimen Stoimenov QA Engineer SitefinityLeads,SitefinityTeam6 Telerik QA Academy Telerik QA Academy.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Principles of Information Security, Fourth Edition Risk Management Ch4 Part I.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.
Risk management.
Compliance with hardening standards
Risk Assessment Richard Newman
I have many checklists: how do I get started with cyber security?
How to Mitigate the Consequences What are the Countermeasures?
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

Introduction to Network Defense INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh

Outline Assessment Protection Detection Response Network defense and security process Assessment Protection Detection Response

Defense What does network security mean in terms of defense? Security is the process of maintaining an acceptable level of perceived risk Note acceptable, not completely eliminating risk Remember: cost vs. benefit It is a continual process Security must continually be checked and updated It is an uncertain process You never really know how secure you are

The security process involves several steps Just as attacks have general stages (or processes), so does defense Also, like attacks, there is no one de-facto standard The security process involves several steps Assessment Protection Detection Response

Security Process: Assessment Preparation for the remaining three stages Assessment often deals with the following processes Business evaluation of security Cost vs. Benefit Technical evaluation of security Current status and feasibility Policy and procedure development Laws and regulations What security measures a business must use Other managerial concerns Team assembly, budgeting, support, etc.

Risk Analysis A critical part of the assessment stage Types Qualitative – enumerating attacks and their impacts Consideration of organizational goals, asset value, threats, vulnerabilities and effectiveness of current safeguards Subjective in nature measured by “High, Medium, or Low” values given by staff/experts, etc. Quantitative – estimating the likelihood of attacks Precise measurement of risks based on modeling and analysis together with historical data Assigns objective numeric values to components of risk analysis and potential loss

Risk Analysis Includes Asset identification and valuation Threat definition Threat vector – Information about a threat, its origin and the target assets Likelihood and impact analysis Basic risk analysis assumes that threats are equally likely and merely identifies assets A more advanced analysis values assets, classifies threats, and analyzes the threat on each asset Surveys such as CSI – e.g., internal threats usually amount to 70-80% Take a look at CSI survey 2010/2011 and Sophos report 2013 (available on CourseWeb)

CSI 2010/2011: Types of attacks by percentage of respondents

Risk Analysis Once risk has been clearly defined, it dictates What needs to be protected What is threatened? What is vulnerable? What is of value? What the priorities of assets / protections are What is most threatened or vulnerable? What is of most value? What protections should be used What measures counter the vulnerabilities? How much is OK to spend on preventative measures? You can think of protections as decreasing the risk

Security Process: Protection Involves the realization of information gained and plans made in the assessment stage Drafting of policies and procedures Including the training of employees, etc. Deploying software and hardware protections Firewalls, IDS/IPS Password policies, access control policies, etc. Monitoring and logging Patching One key assumption that security personnel should make is that protections will eventually fail

Security Process: Detection Assumes that assessment and protection will fail Aims at detecting attacks once in progress Security breaches are hard to prevent (zero day exploits, user vulnerabilities, etc.) Detection ensures that when protections fail, an organization knows in order to respond Assumes that assessment and protection have been conducted properly Assumes continual monitoring and assessment of existing protections

Security Process: Response Validates the findings of detection The response stage may include Removing the attacker Or “jailing” the attacker Or even just ignoring him/her Preventing damage Or recovering from it Patching holes and closing backdoors Documenting evidence May include taking machines offline May have to trade off with rapid recovery Prosecuting the attacker

Security Process Cycle A repeating and evolving process

Defense Models There is always a defense model, e.g., Perimeter security model if firewall is the primary defense mechanism Layered model if multiple defense mechanisms are employed Effective security infrastructure requires understanding the defense model as well as trust definitions What is fully trusted? What is partially trusted? What is not trusted?

Lollipop Model of Defense Most common model Focuses on perimeter security Protection is concentrated on keeping the outsider out Has many limitations Once attacker penetrated the outside wall, no other defense measures Does not provide different levels of security appropriate to the assets i.e., it protects everything equally against everything Does not protect against insider attacks

Onion Model od Defense Defense is deployed in many layers Does not rely on one, single layer of defense Much harder to predict and penetrate than lollipop model Can be achieved in many ways Segmenting network (based on access and need) Defining zones of trust Protections at various levels Network System personal firewall software, system access controls, etc. Application Multi-factor authentication, authorization levels, etc.