SAFE AND SOUND. INTRODUCTION Elements of Security Auditing Elements of Security Auditing Applications to Customers Network Applications to Customers Network.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
LittleOrange Internet Security an Endpoint Security Appliance.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network Perimeter Security Yu Wang. Main Topics Border Router Firewall IPS/IDS VLAN SPAM AAA Q/A.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Lecture 11 Reliability and Security in IT infrastructure.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
IT security By Tilly Gerlack.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Honeypot and Intrusion Detection System
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Security at NCAR David Mitchell February 20th, 2007.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Small Business Security Keith Slagle April 24, 2007.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Module 11: Designing Security for Network Perimeters.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Network System Security - Task 2. Russell Johnston.
Securing Information Systems
Managing Windows Security
Top 5 Open Source Firewall Software for Linux User
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
EN Lecture Notes Spring 2016
Lesson Objectives Aims You should be able to:
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Cyber Security By: Pratik Gandhi.
Teaching Computing to GCSE
Information Security Session October 24, 2005
Computer Security.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Introduction to Internet Worm
6. Application Software Security
Presentation transcript:

SAFE AND SOUND

INTRODUCTION Elements of Security Auditing Elements of Security Auditing Applications to Customers Network Applications to Customers Network

Modular Approach User layer…….Server layer……..Network layer User layer…….Server layer……..Network layer …………..interconnects (cabling)…………… …………..interconnects (cabling)……………

User Layer Thin-clients, or physically-secure workstations Thin-clients, or physically-secure workstations Login + passworded access Login + passworded access Access only to relevant services, applications Access only to relevant services, applications Run background malware prevention software Run background malware prevention software

Server Layer Remove unnecessary services Remove unnecessary services User groups to match physical topology User groups to match physical topology Don’t run services as root / admin Don’t run services as root / admin Run OS as read-only Run OS as read-only

Network Layer Backup IOS, OS, data Distribute & centralise topology (failover, and ordered & documented design & layout) Use firewalls & logging Use IDS, IPS, traffic monitoring

Cabling Use more secure cable types Use more secure cable types Use patch-panels and colour-coding Use patch-panels and colour-coding Layouts that make testing, fault-finding easy Layouts that make testing, fault-finding easy

Security Considerations

Network Threats Viruses Viruses Tend to be inadvertently activated Tend to be inadvertently activated ….or may be installed deliberately ….or may be installed deliberately

Network Threats Worms Worms Travel the internet, scanning for vulnerabilities Travel the internet, scanning for vulnerabilities Often disrupt networks by flooding, forking Often disrupt networks by flooding, forking

Network Threats Spiders and webbots Spiders and webbots Can be used maliciously – Can be used maliciously – Automated signups, website duplication, spam Automated signups, website duplication, spam

Network Threats Trojans Trojans Masquerade as regular software Masquerade as regular software Tend to allow attacker to control infected machine Tend to allow attacker to control infected machine

Network Threats Spyware and Phishing Spyware and Phishing Information stealing, user profiling Information stealing, user profiling Used in advert targeting, spam, ID theft Used in advert targeting, spam, ID theft

Network Threats Spam Spam Can contain other malware Can contain other malware Congests networks Congests networks

Network Threats Delete traces of intrusions Delete traces of intrusions Alter logs Alter logs Forensics get-around Forensics get-aroundBombs

Solutions for Customer Separate physical network for WAN access Separate physical network for WAN access Honeypot to track & ID intrusions Honeypot to track & ID intrusions Monitoring station for internal LANs Monitoring station for internal LANs

Solutions for Customer Honeypot Honeypot Mimics internal network or DMZ Mimics internal network or DMZ Allows profiling of network threats Allows profiling of network threats

Solutions for Customer SAN - storage area network SAN - storage area network RAID 40 : RAID level 4 & RAID level 0 4 – block striping with parity: failure tolerant & faster rebuilds 0 – striping: faster writes

Solutions for Customer RAID 40 RAID 40

Tenable’s Security Center Each node is a router, hosts behind router

Advisor Parallel co-ordinate plot of firewall logs

Flamingo Port scan 1 source manytargets

Rumint Visualisation Jamming Attack

Psad Nachi worm network behaviour Red nodes are ICMP packets

Web server log, Raju Varghese Spider attack on web server from single IP Red colouration indicates 5xx status codes

f i n Network monitoring visualisations from: Network monitoring visualisations from: galleries/graph-exchange galleries/graph-exchange