PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.

Slides:



Advertisements
Similar presentations
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Advertisements

Chapter 3: Planning a Network Upgrade
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Firewall Configuration Strategies
Security+ Guide to Network Security Fundamentals
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Network Diagram with International Standard
Computer Networking Devices Seven Different Networking Components.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
By : Windi Widiastuti XII TKJ  DEFINITION.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
NW Security and Firewalls Network Security
GROUP INVOLVED IN A WEB APPLICATION DEVELOPMENT Continue.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Year 10 – Chapter 4 – Computer Networks Lesson 2: Setting up a Network Starter Task – Can you think of reasons to set up a network? Why Use Networks? 1.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Network Security Principles & Practices By Saadat Malik Cisco Press 2003.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
April 09, 2008 The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 1 The Demilitarized Zone as an Information Protection.
SAM-21 Fortress Model and Defense in Depth Some revision on Computer Architecture.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Enabling Port Security
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
Components of wireless LAN & Its connection to the Internet
Module 11: Designing Security for Network Perimeters.
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.
Security fundamentals Topic 10 Securing the network perimeter.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Chapter 4: Implementing Firewall Technologies
Network Devices Mr Conti Year 9 Lesson 5. Every computer on a network needs a network interface card (NIC) which is connected to the motherboard inside.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
CPT 123 Internet Skills Class Notes Internet Security Session B.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
EN Spring 2016 Lecture Notes FUNDAMENTALS OF SECURE DESIGN (NETWORK TOPOLOGY)
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
IT 244 Week 8 DQ 3 To purchase this material link 244-Week-8-DQ-3 For more courses visit our website
Security fundamentals
Chapter 7. Identifying Assets and Activities to Be Protected
Networking in the Enterprise
Critical Security Controls
Network Security Analysis Name : Waleed Al-Rumaih ID :
Computer Data Security & Privacy
How a Network Works The network in this presentation belongs to Informa Software, Maitland FL.
Introduction to Networking
Unit 27: Network Operating Systems
Chapter 26: Network Security
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
IS4680 Security Auditing for Compliance
Firewalls Routers, Switches, Hubs VPNs
Level 2 Diploma Unit 11 IT Security
Unit 36: Internet Server Management
Presentation transcript:

PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM

EQUIPMENT REDUNDANCY  THIS IS THE USE OF MULTIPLE COPIES OF IT INFRASTRUCTURE  THE IT RESOURCES IN USE SHOULD BE LOCATED AT DIFFERENT PLACES  ALLOWS FOR DISASTER RECOVERY IN CASE THERE IS EQUIPMENT FAILURE/DAMAGE  ENSURES MAXIMUM UPTIME

ACCESS CONTROL LIST FILTERS  CONFIGURED AT A NUMBER OF DIFFERENT LOCATIONS  MAINLY USED ON FIREWALLS  SUPPORTED BY SOME ROUTERS AND SWITCHES  DEFINE THE NETWORK RESOURCES THAT ARE ACCESSIBLE TO A USER  PRINCIPLE OF LEAST PRIVILEGE SHOULD BE EMPLOYED

BORDER ROUTERS  THESE ARE ROUTERS LOCATED AT THE LOGICAL EDGES IN THE NETWORK DESIGN LAYOUT  THEY ACT AS THE INTERFACE OF THE NETWORK TO THE OUTSIDE WORLD  EXPOSED TO A LOT OF RISK, MUST BE PROTECTED

PROXY FILTERS  THESE ARE SERVERS THROUGH WHICH LAN USERS ACCESS THE INTERNET  CAN BE CONFIGURED WITH ACCESS LISTS  RESTRICT UNAUTHORIZED USERS FROM ACCESSING THE WEBSITE  ONLY THE PROXY SERVER IS DIRECTLY EXPOSED TO THE INTERNET, MINIMIZING THE AREA OF EXPOSURE

DEMILITARIZED ZONES  THESE ARE SECURE ZONES ESTABLISHED WITHIN A BIGGER NETWORK  ESTABLISHED BETWEEN THE INTERNET AND THE OUTWARD-FACING DEVICES E.G. SERVERS  ADDS AN ADDITIONAL LAYER OF SECURITY TO THE SYSTEM  REDUCES AREA OF EXPOSURE

REFERENCES Northcutt, S., Zeltser, L., Winters, S., Kent, K., & Ritchey, R. W. (2005). Inside Network Perimeter Security (Inside). Sams.