Security Policy. TOPICS Objectives WLAN Security Policy General Security Policy Functional Security Policy Conclusion.

Slides:



Advertisements
Similar presentations
Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Secure Computing Network
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Security Controls – What Works
Information Security Policies and Standards
Chapter 12 Network Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Payment Card Industry (PCI) Data Security Standard
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 6 of the Executive Guide manual Technology.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Information Systems Security
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Lecture 24 Wireless Network Security
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Network System Security - Task 2. Russell Johnston.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS
CompTIA Security+ Study Guide (SY0-401)
Security of a Local Area Network
Security in Networking
Lesson 16-Windows NT Security Issues
PLANNING A SECURE BASELINE INSTALLATION
LM 5. Wireless Network Security
Presentation transcript:

Security Policy

TOPICS Objectives WLAN Security Policy General Security Policy Functional Security Policy Conclusion

Objectives Learn the different phases of security policy development Understand the purpose and goals of different security policies.

WLAN Security Policy Wireless LAN Security Policy falls into two categories: –General Security Policy –Functional Security Policy

General Security Policy General Security Policy consists of: –Getting Started –Risk Assessment –Impact Analysis –Security Auditing

Getting Started Every Organization with wireless technology needs a policy in accordance with a security plan. –Statement of authority Emergency Response Team Applicable Audience Violation reporting procedures and Enforcement This plan should address at least the following three issues: Resources – Controlled access to prevent unauthorized users from consuming limited wireless network resources. Privacy - controlled access to prevent unauthorized users from accessing confidential or sensitive data located on the network. Intrusion Monitoring – a monitored environment alerts an organization about unauthorized activities and allows security managers to respond appropriately. (Emergency Resource Team) & (IT security/admin team)

Risk Assessment Risk Assessment: –Risk Assessment is the process of examining each scenario in which an organization can experience loss due to negative impact events. –Risk Assessment involves four themes that require analysis prior to creating a security policy. These include: Asset protection (sensitive data, network services) Threat Prevention Legal liabilities Costs

Impact Analysis –Impact Analysis help organizations understand the degree of potential and associated loss that could be involved with a network intrusion. –It covers not only direct financial loss but many other issues such as loss of customer confidence, reputation damage, regulatory effects etc.

Security Auditing –Wireless security audits identify flaws in wireless networks before the networks become exposed to a malicious threat. –It recommends organizations periodically engage in security reviews involving independent consultants. Internal Testing Independent Testing Sources of Information

Functional Policy: Guidelines & Baselines Every Security policy, at a minimum,should cover topics that include: –Policy Change, Control & Review –Password Policies –Networking staff and user training requirements –Acceptable use –Consistent implementation –Readily available implementation and management procedures –Regular audits and penetration tests by independent professionals.

Password Polices Choosing a strong password –What to do: Use a password that is mixed case and uses alpha and numeric digits Force periodic password changes through network security mechanisms Lockout accounts after 5 unsuccessful login attempts Make sure all passwords are at least 8 characters in length and use other forms of authentication such as smart cards or biometrics in combination with passwords when users need more secure levels of authentication

Cont.. What not to do: –Use a user name, first name or last name. –Use pets name, childs name or spouses name. –Use of number combination such as telephone numbers, social security, birth dates or home address numbers. –Use of a common word found in the dictionary –Allow passwords to be reused

Networking staff and user training requirements The needed training for network staff will include: –Wireless hardware implementation, configuration and maintenance. –Wireless software: protocol analyzers, intrusion detection systems, configuration management etc. –Wireless standards and certifications.

Cont… The training needed by end users will include: –Acceptable use training: Networking Staff, Contractors, Visitors, Consultants Violation Enforcement Who can use the wireless connections? For what purpose may they be used? What purposes are banned from wireless use? –Connecting to the wireless network. Understand data rate issues. Distance from the access point. Number of users connected.

Acceptable use Acceptable use polices are used to outline the proper use of computer systems and network services available in an organization. In order to prevent the introduction of viruses, worms, spyware and other malicious software, the policy should outline how a user must interact with these systems. An acceptable use policy should include: –Allowed actions. –Disallowed actions. –Personal use rules.

Baseline Practices Baseline practices should be consider the minimum security. It will eliminate 95% of all the wireless LAN security. A thorough list include: –WPA or WPA2 must be used in place of WEP. –Default passwords are always weak passwords. –Default configuration setting on all access points should be changed. –SSID: Default SSID should be changed on all access points. –MAC Filters: MAC filters should not be relied upon to prevent unauthorized access to the WLAN. MAC address filtering is another method by which the IEEE task group attempted to secure wireless network.

Cont… –Firmware Upgrades: Periodic firmware upgrades can provide new security functionality and compatibility. Firmware should be upgraded as necessary for the following devices: –Access Points –Wireless Bridges –Client Devices –Enterprise Wireless Gateways –Enterprise Encryption Gateways. Firmware upgrades are suggested ASAP in order to gain any of the following features: –TKIP support (legacy) – WPA/WPA2 uses CCMP –Kerberos support –802.1x/EAP support –WPA compliance –AES support –VPN support –Rogue access point detection –RADIUS or LDAP support (AAA will discuss in future sessions) –Role-based access control (RBAC instead of MAC) – discussed later

Functional Policy Monitoring and Responses –Rogue Equipment: The process of eliminating rogue devices include: –Setting Corporate Policy Regarding Rogue Equipment –Network Administrator Training –Help Desk & End User Training –Intrusion Detection Systems & Audits. –SNMP Community Strings: It should be changed or disabled. –Discovery Protocols: When discovery protocols are not in use, they should be disabled.

Functional Policy: Design & Implementation The Design and Implementation section of the Functional Policy include: –Interoperability –Layering –Segmentation and VLANs –Authentication –Encryption

Interoperability Interoperability is the capability of different mechanisms or network processes from differing vendors to communicate. By including interoperability as a policy statement, one ensure that only widely compatible equipment and solutions are implemented.

Layering Layering solutions is a method of utilizing solutions from different layers of the OSI model. It can provide very high levels of security, but it may also introduce a significant amount of complexity to the implementation and administration of the network. The four components to be addressed when layering is considered are: –OSI Layer of each solution considered –Costs versus benefits –Management resources required –Throughput & Latency.

Segmentation & VLANs Segmentation is a method of implementing solutions that divide the network into smaller, more manageable pieces by using controlled layer 2 and layer 3 boundaries. Wired VLANs may be used in place where the physical separation of the wireless network is not possible.

Authentication & Encryption Authentication & Encryption help alleviate security risks involved in implementing wireless solutions They assist in determining who can access the network and determine whether the data is encrypted while it traverses the wireless segment. The choice of what type of authentication and encryption to use for the deployment of a secure WLAN will include the consideration of : –Existing implementations –Data Sensitivity –Scalability (ability of a system, network, or process, to handle growing amounts of work without diminishing QoS) –Availability –Budget

Conclusion Each organization needs to evaluate and design policies, procedures and training tailored to the unique conditions found in their environment. Physical security is always an important component of a good policy. Audits should be considered to identify where further training is needed and to measure the effectiveness of current policies.