Purpose Present Drivers and Context for Firewalls Define Firewall Technology Present examples of Firewall Technology Discuss Design Issues Discuss Service.

Slides:



Advertisements
Similar presentations
DMZ (De-Militarized Zone)
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Module 5: Configuring Access to Internal Resources.
Firewalls : usage Data encryption Access control : usage restriction on some protocols/ports/services Authentication : only authorized users and hosts.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Firewall Configuration Strategies
1 Firewalls at Stanford: May 14, 2004 Sunia Yang The Group Formerly Known as Networking.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Chapter 12 Network Security.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Stephen S. Yau 1CSE , Fall 2006 Firewalls.
Payment Card Industry (PCI) Data Security Standard
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
1 Enabling Secure Internet Access with ISA Server.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Intranet, Extranet, Firewall. Intranet and Extranet.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 11: Remote Access Fundamentals
Access Control List (ACL)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Firewall Security.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Module 11: Designing Security for Network Perimeters.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Security fundamentals Topic 10 Securing the network perimeter.
Defense in Depth. 1.A well-structured defense architecture treats security of the network like an onion. When you peel away the outermost layer, many.
Module 10: Windows Firewall and Caching Fundamentals.
Windows ® Azure ™ Platform. Network Architecture Packet Filtering Built-In Firewalls Connect Service SSL WCF Security Agenda.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Security fundamentals
Chapter 7. Identifying Assets and Activities to Be Protected
Securing the Network Perimeter with ISA 2004
Implementing TMG Server Publishing
Introduction to Networking
Introduction to Networking
Security in Networking
6.6 Firewalls Packet Filter (=filtering router)
* Essential Network Security Book Slides.
Server-to-Client Remote Access and DirectAccess
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Firewalls Routers, Switches, Hubs VPNs
Lecture 3: Secure Network Architecture
Firewalls.
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Purpose Present Drivers and Context for Firewalls Define Firewall Technology Present examples of Firewall Technology Discuss Design Issues Discuss Service and Support Issues Exchange Ideas and Concerns about Risk, Security and Firewalls

NOT An unveiling of a firewall service at SU A definition of a firewall service A forum for final decisions An exhaustive technical presentation A specific review of SU implementations

Data

Category A

Client

Access

Security

S = 1/A

Remote

Wireless

Risk

Mitigation

Affiliation

Authentication

Authorization

Host

Firewall

Balance

Packet

Header

Source

Destination

Port

Firewall

Router

Classic

Rules

Permit

Deny

Established

Tiers

Layers

Zones

Vulnerabilities

Horizontal

Vertical

Development

Production

NOT An unveiling of a firewall service at SU A definition of a firewall service A forum for final decisions An exhaustive technical presentation A specific review of SU implementations

Service

SPOC

Inventory

Questions APPLICATION INVENTORY FOR FIREWALL What is the name of the application? What are the names, locations, OS types, and IP addresses of the computers that host the application? Include the TCP ports that the application uses. Are there unique development and/or testing environments? If yes to #3, will the application use http or https or both? What measures of usage do you have? Are there peak periods of usage? Is there a web server component to the application? If yes, on which computer will it be installed? Is there a database component to the application? If yes, on which computer(s) will it be installed? If yes to #7, is the data sensitive University data – data that is protected by one of the Federal Privacy Acts? If there a unique application layer that mediates between the web services and the database services? If yes, on which computer(s) will it be installed? Who will install, upgrade and maintain the application? These are the application supporters. Will the application supporters need direct access to the web, application and/or database server? Will Firewall Exceptions rules be needed to grant this access? Are the application supporters Stanford employees or outside vendors/contractors? How is change managed in the application? What are the maintenance windows? Will the servers need AFS access? Will the servers need NFS access? Will the servers need Kerberos access? How will the servers be backed up? Will the servers need NTP access? What Windows domain will the servers be using? What type of ongoing service monitoring will be in place? Who is the appropriate person to make Security decisions about the application? How many users do you expect to be using the application? What is the user authentication that will be used for the application?

Pictures

Rules

Risk

Escalation

Moves

Acceptance

Troubleshooting

VPN

Monitoring

Audit

Costs

Numerator

Denominator

Risk Costs