Network Security. Announcements Review Assignment - Assessment 3 (due Tuesday, before class) Assessment 3 – Next Thursday Reminders: Network Design Project.

Slides:



Advertisements
Similar presentations
FIREWALLS Chapter 11.
Advertisements

Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd 
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
IS Network and Telecommunications Risks
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Firewalls: General Principles & Configuration (in Linux)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Information Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Exploring the Network.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Today’s Lecture Covers < Chapter 6 - IS Security
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Securing Wired Local Area Networks(LANs)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
IS Network and Telecommunications Risks Chapter Six.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Chapter 5: Implementing Intrusion Prevention
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Network Security. Announcements Review Assignment - Assessment 3 (due Tuesday, before class) Assessment 3 – Next Thursday Reminders: Network Design Project.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
MIS323 – Business Telecommunications Chapter 10 Security.
IS3220 Information Technology Infrastructure Security
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Eric Van Horn Cosc 356.  Nearly every organization in todays era uses computers and a network to send, receive, and store information  Very important.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Chapter 1: Explore the Network
Network security Vlasov Illia
Chapter 1: Exploring the Network
Working at a Small-to-Medium Business or ISP – Chapter 8
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Firewalls.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Protection Mechanisms in Security Management
6. Application Software Security
Introduction to Networking Security
Presentation transcript:

Network Security

Announcements Review Assignment - Assessment 3 (due Tuesday, before class) Assessment 3 – Next Thursday Reminders: Network Design Project No more than 2 per group Proposals due on the day of presentation Sign-ups shortly 2

Basics of Network Security Anti-virus / Anti-Spyware Access Controls Firewall Intrusion Protection/Detection Systems Identify fast spreading threats 3

Access Controls The four processes of access control

Firewalls

Example: Packet Filtering Firewalls

Intrusion Detection and Prevention Systems (IDPS)

Intrusion Detection and Prevention Systems (cont’d.)

Basic Network Facts Primary Core Located in Technology Support Center (TSC) Secondary Core located in CIS Disaster Recovery Facility Comprised of Cisco Systems 6500 series switches Distribution layer, Cisco Catalyst 4500 and 3750 series Total network is 311 switches Controller based wireless Access Points All devices monitored 24/7 by Netcom staff. Dual connections to the internet via NCREN. Primary pipe is 10gig and backup is 1gig via NCREN BTOP

Network Security Cisco Firewall Service Module UNCW uses Cisco Systems ASA5585 devices Primary and Secondary for Redundancy ASA provides up to 20 individual contexts Allows any VLAN on the switch to be passed through to the device to operate as a firewall port and integrates firewall security inside the network infrastructure. ASA evolved from Cisco PIX technology and uses the same time- tested Cisco PIX Operating System, a secure, real-time operating system. Defines the security parameter and enables the enforcement of security policies through authentication, access control lists, and protocol inspection.

Network Security Intrusion Prevention Systems UNCW’s Intrusion Prevention Systems – ASA5585 IPS We currently use redundant pairs for continuity. The ASA network intrusion prevention and detection system (IDS/IPS) reputational based, combining the benefits of signature, protocol and anomaly-based inspection. Capable of performing real-time traffic analysis and packet logging on IP networks. Can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts. Has a real-time alerting capability for Network Communications Staff Rules are pushed to all IPS systems nightly.

12

Logical Network Core Traffic Flow

Total Network Layout

Network Authentication Cisco Identity Services Engine (ISE) is a security policy management and control platform. It automates and simplifies access control and security compliance for wired, wireless, and VPN connectivity. Cisco ISE is primarily used to provide secure access and guest access, support BYOD initiatives. ISE authenticates against Active Directory, meaning credentials are required to access UNCW’s network. ISE is deployed in all building and wireless networks as of fall 2014.

STUXNET

STUXNET – How it Worked

Stuxnet What was it? How did it spread and how far? What are the implications?

Stuxnet Precursors: What should we do now?

Target – What Happened?

Target – How did it happen?

Target – How could it have been stopped?

Target – Modern Day Hacking

Security Discussion TJ Maxx RSA Epsilon Gawker Wikileaks HB Gary 24

11.1 Corporate Security: TJ Maxx War-Driving to seek vulnerabilities in wireless networks Breaches took place all the way back to 2005 Albert Gonzalez was mastermind sold as many as 170 million ATM/Credit Card #s Typically used SQL injection to launch packet sniffing Now serving 20 years in a federal prison

11.1 Corporate Security: RSA Security companies are often the target of many hackers. Another case of phishing s to get into the company Excel Spreadsheet had a Zero-day exploit Exploit took advantage of Adobe Flash allowing them to install a remote administration tool Used remote admin tool to get deeper information

11.1 Corporate Security: Epsilon Occurred earlier this year Primary purpose for stealing Phishing – maquerading as a trustworthy entity to gain access to information Form of Social Engineering Carried out by spoofing

11.1 Passwords: Gawker Hack After hack, the Wall Street Journal Examine a number of passwords (188,279) and here are some of the most commonly found: password qwerty letmein trustno1 passw0rd Can anyone guess the most commonly used?

11.1 Corporate Security: Higher Ed Threats Mobile Devices Social Media Viruses (hilarious video attack through FB) Virtualization Embedded devices (number of devices connected to the network) Consumerization of IT (personal devices for organizational use)

11.1 Corporate Security: Wikileaks Exposed major security flaws in the US government Not standardized across agencies No user restrictions on copying data Minimal monitoring of users accessing sensitive data Recently, new measures are in place to alleviate problems. Bradley Manning trial begins December 16 th

11.1 Corporate Security: HB Gary Found a flaw in content management system Used an SQL Injection to gain access Numerous issues with the system allowed hackers to obtain two passwords: the CEO (Aaron Barr) and COO (Ted Vera) Key takeaway: passwords! Don’t use short, easily deciphered Use different passwords for different accounts