Chapter Fifteen Working with Network Security. Objectives To discover what dangers lurk in that great big world To examine the basic concepts of security.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Module 5: Configuring Access for Remote Clients and Networks.
Chapter 7 HARDENING SERVERS.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Lesson 19: Configuring Windows Firewall
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Firewall Slides by John Rouda
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11.
1 Guide to Network Defense and Countermeasures Chapter 2.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Chapter 13 – Network Security
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Lesson 11: Configuring and Maintaining Network Security
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Module 10: Windows Firewall and Caching Fundamentals.
A Network Security -Firewall Bruce Turin.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Windows Vista Configuration MCTS : Network Security.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Network System Security - Task 2. Russell Johnston.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Chapter 40 Internet Security.
Top 5 Open Source Firewall Software for Linux User
Working at a Small-to-Medium Business or ISP – Chapter 8
Configuring Windows Firewall with Advanced Security
Firewalls.
Unit 27: Network Operating Systems
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
6. Application Software Security
Presentation transcript:

Chapter Fifteen Working with Network Security

Objectives To discover what dangers lurk in that great big world To examine the basic concepts of security To find out when you might have too much security To learn what security features are offered by the NOS To find out what makes a good password policy To review data encryption To learn to block out unwanted visitors To examine some security protocols

What Are the Dangers? Data accessed or destroyed by intruders Data accessed or destroyed from the inside Physically stolen data or equipment Data lost or corrupted due to equipment failure Protecting against viruses

Some Security Considerations Physical security –Equipment and drives must be protected from theft. Environmental damage Levels of risk –Just how sensitive is your data?

Physical Security Hard disks are easily removed. –The data can be extracted at leisure in a safe location. A physical disaster can destroy the equipment housing your critical data.

Environmental Damage The Tsunami of 2005 showed how much damage nature can wreak. Voltage surges and/or static electricity can cause data loss.

Risk Levels Low risk –Loss or damage to data will not cause an interruption of business or personal risk to people. Medium risk –Loss or damage to data results in noticeable disruption of workflow and/or involves putting people at noticeable risk. High risk –Loss or damage to data could bring the company to a standstill and/or cause serious harm to people.

Can You Have Too Much Security? If files or other resources can’t be accessed by the people who need them… If passwords are made too difficult for the average person to remember… Three levels of firewalls to protect your saved Redneck Rampage games might be a bit much.

Opening Doors to the Outside Internet access and are now essential parts of doing business. Work at home users need to be able to log in remotely. Customer support might require maintaining an accessible intranet.

Guarding the Gates Firewalls can limit access from the outside Access control lists on a router interface Securing remote access services (RAS) connections

Security in the NOS A network operating system will include a certain degree of security. –Share level versus security user level (discussed earlier) –User authentication (discussed earlier) –File system security –Securing printing devices –Directory services IPSec Kerberos

File System Security The Novell File System and NTFS both provide extensive security barriers. –Each one provides different permissions to resources. –Each one allows you to monitor users and what they’re doing on the network.

Windows Permissions Full control Modify Read and execute List folder contents Read Write

Novell Permissions Browse Create Delete Inheritance control Rename Supervisor

A Good Password Policy Never reveal your password to anyone. Force periodic password changes. Do not use common names or words in a password. Mix alpha and numeric characters with a nice mix of punctuation. Mix upper and lower-case letters. Force a minimum password length. Don’t allow repeat passwords to be used.

Data Encryption NTFS 5.0 provides the Encrypting File System. –Allows users to individually encrypt files or folders –Provides a recovery agent for getting back lost data –Uses a 128-bit encryption key

Basic Rules for Using Encryption Make sure a recovery agent is assigned and trained. Be careful who you choose as a recovery agent. Don’t use it if you don’t need it.

Building Barriers Firewalls Proxy servers Access lists

Firewalls They can be an application gateway or a circuit gateway. –A circuit gateway directs all outbound traffic to a certain point. –The source IP address is substituted with that of the gateway. –Application gateways work on the software level and mask IP addresses. All firewalls can filter packets by IP address or protocol; more advanced firewalls filter by content.

Proxy Servers A single machine provides access to the outside world (similar to a circuit gateway). Private IP addressing is used inside the network. Only the ISP-assigned IP address of the proxy server is visible to the outside world. They can cache frequently accessed pages to provide faster Internet browsing for users.

Access Lists Configured as either inbound or outbound lists on the interface of a router Can filter traffic by IP address, protocol, host name, MAC address, or content Outbound traffic can have different rules than inbound traffic

Security Protocols Secure Socket Layers Transport Layer Security Secure Multipurpose Internet Mail Extensions IPSec Kerberos

Defense Against Viruses Viruses and other malevolent code can do any of the following: –Bring performance to a crawl –Destroy or redirect data to unauthorized people –Render a machine unbootable –Turn an otherwise harmless machine into a SPAM redirector

Types of Malevolent Code Viruses Worms Trojan horses Logic bombs Trap doors Embedded macros

Good Antivirus Procedures Install an effective antivirus solution. Keep all updates and patches up to date. Regularly update signature files. Scan all incoming files as though your life depended on it.

The Virtual LAN It allows a few devices on a network to communicate as if they are a self-contained network. Make use of an intelligent switch configured to create the VLAN.

Static VLANs All devices on a single switch are part of the VLAN. Data from other parts of the network can’t get in. Data from the VLAN doesn’t get out to the rest of the network.

Dynamic VLANs It requires a switch with intelligent management capability. Switches are configured to group devices together using a list of MAC addresses, by the applications running on systems or by protocol.