“Secure” Remote Access Submitted To Mr.: Ahmed Abu Mosameh Preparation By: Mohammed N. Abu Shammala For telecommuters and roaming users.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Separate Domains of IT Infrastructure
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security Issues and Challenges in Cloud Computing
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Chapter 12 Network Security.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Web server security Dr Jim Briggs WEBP security1.
NETWORK SECURITY.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Virtual Private Network
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Course 201 – Administration, Content Inspection and SSL VPN
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
The Impact of Physical Security on Network Security
Video Following is a video of what can happen if you don’t update your security settings! security.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
Computer & Network Security
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
Security at NCAR David Mitchell February 20th, 2007.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Scott Teeters, Jr. MicroSolved, Inc. in partnership with Sogeti USA How to Fail A Penetration Test Concepts in Securing a Network.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Network Security & Accounting
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Lesson 20. E-commerce Software Intershop Enfinity WebSphere Commerce Professional Edition Microsoft Commerce Server 2002.
Computer Security By Duncan Hall.
Securing A Wireless Home Network. Simple home wired LAN.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Securing Interconnect Networks By: Bryan Roberts.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Chapter 40 Internet Security.
Methods of Securing Data in Windows Networks
Port Knocking Benjamin DiYanni.
Working at a Small-to-Medium Business or ISP – Chapter 8
Securing the Network Perimeter with ISA 2004
12 STEPS TO A GDPR AWARE NETWORK
Implementing Client Security on Windows 2000 and Windows XP Level 150
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

“Secure” Remote Access Submitted To Mr.: Ahmed Abu Mosameh Preparation By: Mohammed N. Abu Shammala For telecommuters and roaming users

“Secure” Remote Access Requirements Authentication (Knock, knock, who’s there?) Access to the laptop Access to your network Physical Security Lost or mislaid laptops Unauthorised Access to a laptop Network Security Network-based attacks/intrusions Information confidentiality Malware Protection Management/Low support cost Ease of Use

Authentication Authentication is needed to: Prevent unauthorised access to the laptop Prevent unauthorised access to your network The Authentication Scheme needs to: Be easy and seamless to the user Use multiple factors to prevent capture and replay of credentials (e.g. key-logging of passwords) Prevent man-in-the-middle attacks Rainbow iKey cryptographic tokens

Physical Security Laptop’s contain your agency’s information Try and keep as little information on the laptop as possible - Don’t use a laptop as a mass file-store Make it difficult to obtain information even with physical access to the laptop – Boot time authentication Media could be removed and read from elsewhere – Disk Encryption Procedures + Citrix + WinMagic + Rainbow Crypto Tokens

Disk Encryption – Implementation Choices Disk vs File Encryption File Encryption Choose a file, decrypt, use, encrypt, secure erase unencrypted file Disk Encryption Encrypts and decrypts all files (including temporary files) “on the fly”. This process is extremely transparent to the end user. Issues for ‘pooled’ resources If laptop L is encrypted with user A’s key then users B,C,D… cannot use the laptop. Use a device access key rather than a user authentication key ‘Master’ Keys If a user loses their key, or is not present can IT Support read the disk? Encrypt the disk encryption key using the user’s key and a key owned by IT Support staff

Network Security Your Agency’s information travels over the Internet. Make sure that nobody can watch it go past; Prevent unauthorised access to your information resources. Packet sniffing – Session encryption e.g. IPSEC or SSL Man-in-the-middle Authenticate both the “Server” and the “client”! Capture-and-replay Network Attack Prevention Protect the client system Disable unneeded services Use a personal firewall to only allow access from applications that should be using the network/internet Agency owned systems versus staff owned (or internet café’) systems Filter traffic from the client to your network – it should only be trying to access expected services! E.g. CodeRed, MSBlaster, SQLSlammer! Cisco VPN Client + Rainbow Crypto Token + ZoneAlarm

Malware Prevention Personal Firewall Use a personal firewall that authenticates which applications connect to the internet or your network – this prevents rogue software from spreading over the network Anti-virus Prevents detected Malicious Software from executing on the laptop Does it update ‘automagically’? System Resources Multiple instances of security software for disk encryption, network encryption, authentication, firewall, anti-virus... Is this a DoS attack in itself? ZoneAlarm + McAfee + WinMagic + Cisco VPN RAM

Management and Support Managing and supporting LAN clients and Remote clients can be very different Physical access to hardware Access to bandwidth for downloading patches Login scripts and domain management tools may be unavailable Thin-client – one update for all users The biggest support headache… Getting roaming connected to the internet

Ease of Use and End-User Awareness A “Secure” Remote Access System needs to be really easy to use so that: End Users use it and not circumvent it! E.g. Choose to use WebMail instead of secure Remote Access connections Make it intuitive Don’t rely on all end users to read the documentation If possible train/demo the system before they leave

Questions