System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

Slides:



Advertisements
Similar presentations
System Center Operations Manager 2007 Management Pack Roadmap (Apr/May 2008)
Advertisements

Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Module 3 Windows Server 2008 Branch Office Scenario.
Securing the Borderless Network March 21, 2000 Ted Barlow.
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Chapter 7 HARDENING SERVERS.
Security and Policy Enforcement Mark Gibson Dave Northey
Applied Cryptography for Network Security
Implementing Server Security on Windows 2000 and Windows Server 2003 Steve Lamb Technical Security Advisor
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Clinic Security and Policy Enforcement in Windows Server 2008.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
Storage Security and Management: Security Framework
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Cosmos Security Feature Overview Product Planning Group Samsung IT Solutions Business 12 July 2010.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 14: Configuring Server Security Compliance
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
Module 5: Designing a Terminal Services Infrastructure.
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
SAM-21 Fortress Model and Defense in Depth Some revision on Computer Architecture.
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Module 5: Designing Security for Internal Networks.
Chapter 2 Securing Network Server and User Workstations.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Module 11: Designing Security for Network Perimeters.
Module 9: Designing Security for Data. Overview Creating a Security Plan for Data Creating a Design for Security of Data.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Information Security tools for records managers Frank Rankin.
Securing Access to Data Using IPsec Josh Jones Cosc352.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Integrating the Healthcare Enterprise The Integration Profiles: Basic Security Profile.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
Basharat Institute of Higher Education
Module Overview Installing and Configuring a Network Policy Server
Chapter 17 Risks, Security and Disaster Recovery
ISMS Information Security Management System
Designing IIS Security (IIS – Internet Information Service)
Global One Communications
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

System Security Basics

Information System Security The protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.

Fortress Model Watch towers to detect threat Protection by: –Moat –Outer Wall –Inner Wall of Keep Draw bridge and Gate – controlled access

Fortress model for defense 1.Critical information 2.Physical protection 3.Operation system hardening 4.Information access 5.External access

1. Critical Information Data categorization –Public –Internal –Confidential –Secret Application hardening

2. Physical Protection Physical environment –Geographical location –Social environment –Building construction Physical controls Communications Surveillance

3. Operation Systems Hardening Security configuration Anti-malware File system –Encrypting File System ADDS security System redundancy

4. Information Access User identification Security policies Resources access Role base access control Access auditing Digital rights management

5. External Access Perimeter network VPN/ RRAS (Routing and Remote Access) SSTP (Secure Socket Tunneling Protocol) PKI Identity federation NAP (Network Access Protection)

Polices, Procedures & Awareness Data Application Host Internal Network Perimeter The Microsoft Model

Things to do Identify who enter your system Provide the user with the appropriate access right Identify the person modifying the data is authorized to do so Guarantee the confidentiality of information Guarantee the availability of information

Things to do Ensure the integrity of the information Monitor the activities of the system Audit security events Put in administrative procedures to ensure the system is secure

System composition File server/ Print server/ Fax server Web server Application server DNS server DHCP server Domain controller Terminal server

System composition server RADIUS server VPN server Certificate server UDDI server Network policy and access server Gateway/ Firewall/ Switch And users