Rwanda GovNet Xuan Pan Nkusi Issa Claude Hakizimana Joakim Slettengren Innocent Nkurunziza Xuan Pan Nkusi Issa Claude Hakizimana Joakim Slettengren Innocent.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Standardization Framework (Myanmar) Ye Yint Win President Myanmar Computer Professionals Association Chair-Standardization Committee, Myanmar Computer.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
UNITS meeting September 30, 2004 Network Security Roger Safian
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Stephen S. Yau CSE , Fall Security Strategies.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Basel Accord IITRANSITIONSERVICES Business Integration Support FCM Management Limited Paris New York Toronto.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
NASA PKI for PKI FORUM Presenters: Paul Ma, NASA-Ames Research Center
Security Guide for Interconnecting Information Technology Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Storage Security and Management: Security Framework
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Voice over IP Spring LNA Meeting April 1, What is Voice over IP? n A technology for transporting integrated digital voice, video and data over IP.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Rwanda GovNet Xuan Pan Nkusi Issa Claude Hakizimana Joakim Slettengren Innocent Nkurunziza Xuan Pan Nkusi Issa Claude Hakizimana Joakim Slettengren Innocent.
Module 14: Configuring Server Security Compliance
University of Murcia 8 June 2011 IPv6 in Europe Jacques Babot European Commission - DG INFSO Directorate, Emerging Technologies and Infrastructures.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
E-GOVERNMENT IN VIETNAM Ph.D Tran Cong Yen Deputy Director Information and Communication Technology Center Ministry of Science and Technology, Vietnam.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
Natick Public Schools Technology Update April 23, 2007 Dennis Roche, CISA Director of Technology.
NuolSec VIspace Vientiane, Laos.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
NUOL Internet Application Services Final Presentation 24 th of May, 2004.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
ICT status in Rwanda The Rwanda ICT vision – NICI Plan: a 5 years plan which started in 2000 and extends to 2020 in 4 phases; NICI Plan comprises projects.
Wide Area Network for Govt. of Delhi. The most needed information infrastructure For connecting all offices of Delhi eventually For having a secured network.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Note1 (Admi1) Overview of administering security.
Africa IXP. Outline / Overview Connectivity in Africa 400’000’000.
Introduce the project Africa IXP (Team 4). Introduce team members.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Security fundamentals Topic 10 Securing the network perimeter.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
IS3220 Information Technology Infrastructure Security
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
Interaction with Vendors that Support the PFMS: Experience of Kazakhstan Treasury Committee of the Ministry of Finance of the Republic of Kazakhstan, 2016.
Security and resilience for Smart Hospitals Key findings
Virtual Private Networks (VPN)
Working at a Small-to-Medium Business or ISP – Chapter 8
IS4550 Security Policies and Implementation
السلوك التنظيمى المعاصر
Security week 1 Introductions Class website Syllabus review
In the attack index…what number is your Company?
Global One Communications
Presentation transcript:

Rwanda GovNet Xuan Pan Nkusi Issa Claude Hakizimana Joakim Slettengren Innocent Nkurunziza Xuan Pan Nkusi Issa Claude Hakizimana Joakim Slettengren Innocent Nkurunziza Team 2 -

Rwanda GovNet2 Agenda  Overview  Project background  Project goals  Current status  Questions  Overview  Project background  Project goals  Current status  Questions

Rwanda GovNet3 Overview Project background Project goals Current status Questions Overview Project background Project goals Current status Questions

Rwanda GovNet4 Overview  Following project plan  Small deviations due to new input  We are on our way to realize all our main goals  Removed optional goals due to time constraints  Following project plan  Small deviations due to new input  We are on our way to realize all our main goals  Removed optional goals due to time constraints

Rwanda GovNet5 Overview Project background Project goals Current status Questions Overview Project background Project goals Current status Questions

Rwanda GovNet6 Rwanda  Located in central east Africa  Economy based on subsistence agriculture  Limited natural resources  Low skilled man power  65% of Rwandans below poverty line  There is no choice other than using ICT  Located in central east Africa  Economy based on subsistence agriculture  Limited natural resources  Low skilled man power  65% of Rwandans below poverty line  There is no choice other than using ICT Source: CIA World Factbook

Rwanda GovNet7 NICI Plan and GovNet  National Information and Communication Infrastructure policy and Plan (NICI) in 20 years (1 st, 2 nd, 3 rd and 4 th phase)  RITA coordinating body to support the implementation of the NICI plan  GovNet broadband was implemented to allow deployment of e-government applications and facilitate information interchange and exchange  National Information and Communication Infrastructure policy and Plan (NICI) in 20 years (1 st, 2 nd, 3 rd and 4 th phase)  RITA coordinating body to support the implementation of the NICI plan  GovNet broadband was implemented to allow deployment of e-government applications and facilitate information interchange and exchange

Rwanda GovNet8 Challenges and Needs Challenges after the first GovNet implementation  Network instability due to viruses, DoS etc.  Difficult to detect or prevent the user causing the problems  Difficult to monitor who is using the network Needs of the GovNet pilot project  Establishment of network security  Need to prevent unauthorized users to access the network resources  Bandwidth monitoring, network management Challenges after the first GovNet implementation  Network instability due to viruses, DoS etc.  Difficult to detect or prevent the user causing the problems  Difficult to monitor who is using the network Needs of the GovNet pilot project  Establishment of network security  Need to prevent unauthorized users to access the network resources  Bandwidth monitoring, network management

Rwanda GovNet9 Overview Project background Project goals Current status Questions Overview Project background Project goals Current status Questions

Rwanda GovNet10 Project goals 1/2  Upgrade selected sites to industry standard equipment  Increase network security  Develop an Acceptable Use Policy  Select and implement managing and monitoring tools  Select and implement bandwidth monitoring tools  Upgrade selected sites to industry standard equipment  Increase network security  Develop an Acceptable Use Policy  Select and implement managing and monitoring tools  Select and implement bandwidth monitoring tools

Rwanda GovNet11 Project goals 2/2  Conduct a training session for the network administrators  Demonstration of VoIP solution  VoIP study for long term solution  Conduct a training session for the network administrators  Demonstration of VoIP solution  VoIP study for long term solution

Rwanda GovNet12 Overview Project background Project goals Current status Questions Overview Project background Project goals Current status Questions

Rwanda GovNet13 Upgrade sites to industry standard equipment  Budget  Equipment procurement process  Routers, switches, servers, racks  Collecting quotations from Rwandese and Swedish equipment suppliers  Will be installed in Rwanda  Budget  Equipment procurement process  Routers, switches, servers, racks  Collecting quotations from Rwandese and Swedish equipment suppliers  Will be installed in Rwanda

Rwanda GovNet14 Training session  Conduct training session for network administrators  Training location-KIST  Training focus (Radius,ntop,snort)  Prepared training plan  Material still under development  Conduct training session for network administrators  Training location-KIST  Training focus (Radius,ntop,snort)  Prepared training plan  Material still under development

Rwanda GovNet15 Present a security solution for GovNet 1. Cost-efficient 2. Centralized 3. Scalable 1. Cost-efficient 2. Centralized 3. Scalable

Rwanda GovNet16 Methodology Attack Impact Create Exploited Result in Reduce Decrease Discover Protect Deterrent Control Detective Control Preventative Control Trigger Corrective Control Vulnerability Risk analysis Acceptable User Policy System Weakness analysis-Nessus Intrusion DetectionSystem Emergency Response Plan 802.1x+Radius EAP-TLS Cisco VPN solution Threat

Rwanda GovNet17 IPsec VPN Home Agent Post Office Ministry of Infrastructure RITA Ministry of Finance Remote organizations from other provinces Internet Authentication Traffic VOIP Traffic Confidential Document Transmission Traffic Backup Traffic

Rwanda GovNet18 Authentication Certification Authority And Authentication Server … … Ministry A … Ministry B ISP x x Client side certificate Certificate of CA Server side certificate

Rwanda GovNet19 Intrusion Detection System … Ministry A Sensor SQL … Ministry B Sensor SQL … Snort Center ACID ISP Sensor SQL

Rwanda GovNet20 Implement NW managing and monitoring tools  Network monitoring system, Nagios  Final implementation will be carried out in Rwanda, since it depends on the equipment  Important to involve LAN managers in Rwanda  Network monitoring system, Nagios  Final implementation will be carried out in Rwanda, since it depends on the equipment  Important to involve LAN managers in Rwanda

Rwanda GovNet21 Implement bandwidth monitoring tools  Several options depending on the equipment  Ntop, Cacti and MRTG  Measure traffic  Find bottlenecks  Measure outbound traffic  Several options depending on the equipment  Ntop, Cacti and MRTG  Measure traffic  Find bottlenecks  Measure outbound traffic

Rwanda GovNet22 VoIP  Conduct a first study  Demonstrate open source VoIP solution  Conduct a first study  Demonstrate open source VoIP solution

Rwanda GovNet23 ”Doing the best at this moment puts you in the best place for the next moment” Oprah Winfrey ”Doing the best at this moment puts you in the best place for the next moment” Oprah Winfrey

Rwanda GovNet24 Overview Project background Project goals Current status Questions? Overview Project background Project goals Current status Questions?

Rwanda GovNet25 Thanks for listening Rwanda GovNet team