C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 9 Analysis Policy © Routledge Richard.

Slides:



Advertisements
Similar presentations
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
Advertisements

C HAPTER 3 A CCEPTABLE U SE P OLICY C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES © Routledge.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 10 Privacy Policy © Routledge Richard.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Firewalls : usage Data encryption Access control : usage restriction on some protocols/ports/services Authentication : only authorized users and hosts.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 12 Electronic Bullying © Routledge.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 6 Access Policy © Routledge Richard.
(part 4).  Gateways  A gateway is responsible for translating information from one format to another and can run at any layer of the OSI model, depending.
Developing Network Security Strategies Network Security D ESIGN Network Security M ECHANISMS.
Intrusion Detection Systems and Practices
Chapter 7 Firewalls. Firewall Definition  A network device that enforces network access control based upon a defined security policy.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 2 Total Cost of Ownership © Routledge.
The Basics of Networking. Rick Graziani What is networking? Communication! An interconnection of computers and other devices: –Printers.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
NW Security and Firewalls Network Security
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Bill Trelease VP – CTO Delhi Telephone Company
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 13 Electronic Sexual Harassment.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 3 Tom Olzak, MBA, CISSP.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 6 of the Executive Guide manual Technology.
Windows 7 Firewall.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
N ETWORKING C OMPONENTS A-3 LTEC 4550 by Joe Garcia.
C HAPTER 4 A UTHENTICATION POLICY C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES © Routledge.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 7 Auditing Policy © Routledge Richard.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 1: Introduction © Routledge Richard.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 8 Physical Policy © Routledge Richard.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Components of wireless LAN & Its connection to the Internet
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
Cryptography and Network Security Sixth Edition by William Stallings.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
GOOD MORNING TO ONE AND ALL. OUR TEAM VENKATESH THARUN SADIK FROM AVANTHI ENGG. COLLEGE.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
CSC 116 Nov Administrative Required 2 nd exam will be next week on Wed  Nov 18th It will be short (10 questions) It will only cover chapters.
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 14: System Administration Mark Milan. System Administration Acquiring new IS resources Maintaining existing IS resources Designing and implementing.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
Slide Template for Module 4 Data Storage, Backup, and Security
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
CONNECTING TO THE INTERNET
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
CCNA Network Fundamentals
CompTIA Security+ Study Guide (SY0-401)
* Essential Network Security Book Slides.
IS4680 Security Auditing for Compliance
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 9 Analysis Policy © Routledge Richard Phillips and Rayton R. Sianjina

A NALYSIS P OLICY TCP Packet Analysis OS Hardening Router Security Firewall Encryption Network Address Translation (NAT) Intrusion detection/prevention systems (IDPS) © Routledge

A NALYSIS P OLICY One policy that continues to grow and change as technology grows and changes is analysis policy. Analysis policy consists of the following predetermined technology standards to maintain the security of a system’s infrastructure from outside threats: Open network port maintenance Transmission Control Protocol packet analysis Operating System Hardening Router security Firewall system maintenance Encryption development Network address translation Intrusion detection/prevention systems Virus/Malware protection. © Routledge

A NALYSIS P OLICY Symantec Technologies Inc.’s best practices for intrusion detection/prevention systems (IDPS) include: 1. the use of multiple types or all four kinds of IDPS technologies to create a comprehensive protection base; 2. working with IDPS technologies that are capable of integrating 3. defining the system IDPS needs before purchasing the technology. © Routledge

A NALYSIS P OLICY Four types of IDPS: 1. network-based which monitors network segments or devices 2. wireless which monitors wireless systems for suspicious traffic 3. network behaviour analysis (NBA) which monitors network traffic for unusual traffic flow 4. host-based which monitors a single host for suspicious activity. © Routledge

A NALYSIS P OLICY Disaster recovery: best and most widely adopted disaster recovery strategy is known as GFS (Grandfather, Father, Son) where system data is backed up in three ways. Daily backups can be either differential (a backup of all changes made since the last full backup) or incremental (a backup of only the additions to data since the last backup). © Routledge

C ONCLUSION Overall, an effective system analysis policy requires system administrators who know the smallest details of the network and the technology. They should meet with and report results to district and building administrators to keep them informed. © Routledge