Trey Shaffer PostNet.com OneCo.net.

Slides:



Advertisements
Similar presentations
Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Business Solutions Network Security Solutions Gateway Security
COSC 541 Project: Firewalls Instructor: Professor Mort Anvari Students: Wei Li Houcheng Zhai Quarter: Spring 2001.
Firewalls Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Secure Lync mobile Authentication
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Chapter 12 Network Security.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Firewalls: General Principles & Configuration (in Linux)
Firewall Slides by John Rouda
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
1 Enabling Secure Internet Access with ISA Server.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 6 of the Executive Guide manual Technology.
Today’s Lecture Covers < Chapter 6 - IS Security
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Security Considerations for Health Care Organizations Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation.
Firewall Security.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security fundamentals Topic 10 Securing the network perimeter.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
APPLICATION PERFORMANCE MANAGEMENT The Next Generation.
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood,
Janis Buikauskis Joe Kubena Kyle Nelson Chris Schrader.
CPT 123 Internet Skills Class Notes Internet Security Session B.
GOOD MORNING TO ONE AND ALL. OUR TEAM VENKATESH THARUN SADIK FROM AVANTHI ENGG. COLLEGE.
Module 3 l Objectives –Identify the security risks associated with specific NT Services –Understand the risk introduced by specific protocols –Identify.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
IS3220 Information Technology Infrastructure Security
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Security fundamentals
CONNECTING TO THE INTERNET
Network Security Analysis Name : Waleed Al-Rumaih ID :
Firewalls.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
6.6 Firewalls Packet Filter (=filtering router)
Security Securing IS.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Jiang Long Spring 2002.
Presentation transcript:

Trey Shaffer PostNet.com OneCo.net

Intros, Background Trey Class

Security, broadly speaking Threat assessment Approach Solution

Risk Assessment Mission Critical Data Mission Critical Transactions Public Image Lost Productivity –Data recovery –Virus

Security Overview 80/20 rule 95/5 rule Send attackers to your neighbor

Corporate Data Loss Sneaker Net Laptops PDAs RAS/VPN Hacker

Methods of Protection Unplug Restrict Access Control Access

Restrict Access – Who User/Password Certificates Random Generator Biometric

Certificates You Are Who You (say you) Are Three Parties –User –Host –Cert Authority

Restrict Access – Where Certificates Telephone Number IP Address DNS Reverse

Methodology Choose one Thorough Repeatable

Break?

Techie Stuff TCP/IP Protocol –How it works Barrier Solutions –Address translation –Proxy –Firewall

TCP/IP Postal Mail Analogy Unique address –Network –Host Gateway Ports

Control Access Naked Isolation DMZ Internal

Solutions Meet Various Needs –Features –Ease of use –Performance –Cost Hybrid Feature Sets

Address Translation Mask Addresses –Many internal –Single/few external Inexpensive Universal Limited Flexibility

Proxy Address Translation Caching –Performance –Utilization Management –Control –Reporting

Firewall Hardware/Software Extended Features Complex/Flexible Policy Multi-Point Implementation Complementary Services –VPN –Web filtering