1 NES554: Computer Networks Defense Course Overview.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Guide to Network Defense and Countermeasures Second Edition
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
5-Network Defenses Dr. John P. Abraham Professor UTPA.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
A First Course in Information Security
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
BotNet Detection Techniques By Shreyas Sali
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Dr. Faouzi Kamoun (MSUD 538) Tel: College of Information Technology Dubai University College ITGN 235: Principles of Networking.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Lecture 7 Network & ISP security. Firewall Simple packet-filters Simple packet-filters evaluate packets based solely on IP headers. Source-IP spoofing.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Securing Wired Local Area Networks(LANs)
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Chapter 5: Implementing Intrusion Prevention
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
CIS 3360: Security in Computing Cliff Zou Spring 2012.
 Lê Nhật Duy.  Reference books  Subject introduction  Examination  Rules.
Module 11: Designing Security for Network Perimeters.
Introduction & Overview Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Chapter 4: Implementing Firewall Technologies
Internet and Intranet Fundamentals William R. Mussatto.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
Presented by : Dr. Sarah Mustafa Eljack Babiker
MIS 4850 Systems Security Abdou Illia, Ph.D School of Business Eastern Illinois University (Monday 1/11/2016)
IS3220 Information Technology Infrastructure Security
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Securing Information Systems
CompTIA Security+ Study Guide (SY0-401)
SECURING NETWORK TRAFFIC WITH IPSEC
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Securing Information Systems
CompTIA Security+ Study Guide (SY0-401)
IS4550 Security Policies and Implementation
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Firewalls Purpose of a Firewall Characteristic of a firewall
Introduction to the course
Chapter 4: Protecting the Organization
Implementing Firewalls
Presentation transcript:

1 NES554: Computer Networks Defense Course Overview

Instructor’s Information Dr. Basheer Al-Duwairi Location: E1L3 Office Hours: SUN, TUE, THU (10:15 – 11:15) or by appointment Webpage:

Resources Lecture notes and research papers Textbook: Guide to Network Defense and Countermeasures, 3 rd edition, by Randy Weaver, Dawn Weaver, Dean Farwood, Cengage Learning, 2013, ISBN- 10: , ISBN-13: Secondary/References: Computer Security: Principles and Practice, 2/E, William Stallings, Lawrence Brown ISBN-10: , ISBN-13: , Publisher: Prentice Hall, Copyright: 2012

Course Objectives Identify, investigate and analyze threats to network security. Identify the fundamental concepts and practices in network defense. Design, implement and operate effective network defense measures to protect the networks from intrusions. Describe router security controls and create access control lists. Describe the concepts of signature analysis and detect normal and suspicious traffic signatures Identify the components of an intrusion detection and prevention system

Course Objectives (Contd.) Describe options for implementing intrusion detection and prevention systems Describe common approaches to packet filtering design packet filtering and firewall rule sets Design and deploy and operate appropriate firewalls. Describe Virtual Private Network (VPN) Concepts. Understand the process involved in IT security management. Outline the process of selecting suitable controls to address risks

Topics to be covered Introduction Attacks and Hacker Tools Botnets Network Traffic Signatures Router Security IP Traceback

Topics to be covered (Contd.) Intrusion Detection and Prevention Systems Firewalls Virtual Private Networks Security Management and Risk Assessment Security Controls, Plans and Procedures

Introduction-Security review Basic security concepts Information Security vs. Infrastructure Security Emerging Security Threats

Introduction-Attackers Motivation for us Identification of Them – Skills - Hierarchy – Motives – Notable Individuals and Groups - History Impact of Them on us Resources

Attacks and Hacker Tools Reconnaissance Network mapping Port scanning Sniffing IP address spoofing Session hijacking

Botnets Botnet formation Botnet Life Time IRC-Based Botnets P2P- Botnets New Trends in Botnet Design Botnet-Based Attacks DDoS Attacks Spam Identity Theft Phishing Click Fraud

Network Traffic Signatures Describe the concepts of signature analysis Detect normal and suspicious traffic signatures Identify suspicious events Explain the Common Vulnerabilities and Exposures (CVE) standard

Router Security Creating and Using Access Control Lists Use and Rules Standard ACLs Extended ACLs Named ACLs Examining Cisco Router Logging Cisco Authentication and Authorization

IP Traceback Probabilistic packet marking Hash-based IP traceback

Intrusion Detection & Prevention Goals of an IDPS Common Detection Methodologies Examining IDPS Components Options for IDPSs Securing IDPS Components Developing IDPS Filter Rules Examining Intrusion Detection Step by Step

Firewalls Overview of Firewalls Packet Filtering and Firewall Rule Sets Designing Firewall Configurations Examining Proxy Servers Choosing a Bastion Host Network Address Translation

VPNs VPN Components Types of VPNs Evaluating Business Needs for VPNs Advantages and Disadvantages of VPNs Examining VPN Design and Architecture

Security Management and Risk Assessment IT Security Management Organizational Context and Security Policy Security Risk Assessment Detailed Security Risk Analysis Case Study: Silver Star Mines

Security Controls, Plans and Procedures IT Security Management Implementation Security Controls or Safeguards IT Security Plan Implementation of Controls Implementation Follow-up Case Study: Silver Star Mines

Grading Policy Two midterm exams 20% each HW assignments 20 % Final exam 40 %