Download presentation
Presentation is loading. Please wait.
Published byMargarethe Kneller Modified over 5 years ago
1
Security week 1 Introductions Class website Syllabus review
Course outline Homework Security overview Scenario – evaluating two attacks Packet Tracer scenario
2
Network Security Organizations
CERT - CERT Coordination Center (CERT/CC) CERT is chartered to work with the internet community in detecting and resolving computer security incidents, as well as taking steps to prevent future incidents. Part of US-CERT. US-CERT - Computer Emergency Readiness Team. Established in 2003 to protect the nation's Internet infrastructure. Coordinates defense against and responses to cyber attacks. IETF - Internet Engineering Task Force Open international community of network designers, operators, vendors, and researchers concerned with the evolution and operation of the Internet. SANS - SysAdmin, Audit, Network, Security Source for information security, training and certification
3
Security Certifications
International Information Systems Security Certification Consortium (ISC)2 CISSP - Certified Information System Security Professional SSCP - Systems Security Certified Practitioner CheckPoint CCSA - Check Point Certified Security Administrator CCSE - Check Point Certified Security Engineer Cisco CCNA Security CCNP Security CCIE Security Comptia Security+
4
Security Regulations HIPAA (Health Insurance Portability & Accountability Act of 1996) Improved efficiency in healthcare delivery by standardizing electronic data interchange, and Protection of confidentiality and security of health data through setting and enforcing standards.
5
The Security Process Identify and assess assets
Identify and assess threats and risks Create security policy Design network security implementation Test security design- modify as appropriate Implement security design Educate users Monitor per security policy Test, re-evaluate and modify periodically Handle incidents, modify security implementation/policy as appropriate, document
6
What are your assets/items that need to be protected?
Exercise - In groups, see how many assets/items you can identify that warrant protection by IS.
7
Some Network Assets Cabling/wireless - bandwidth Patch panels Switches
Routers Firewalls Servers and workstations- cpu, memory and hard disks Network services - WEB, FTP, , application, database Data Personnel - time, productivity Business assets - Reputation, good will, secrets Other?
8
How do you assess risk? Risk= cost of loss x level of threat
Example – customer data base If unavailable for a while If irretrievably lost If improperly modified If acquired by a competitor
9
How do you evaluate threat?
By type of threat Human conduct Intentional – Damaging, stealing, exploring Negligent, inadvertent Events – disasters, etc Device failures By source of threat Internal v external
10
How do you invoke security?
Fault tolerance/redundancy/high availability Protective procedures - testing security, backups, monitoring Protective policies (acceptable use, saving procedures) Physical security Protective software (anti-virus) Protective configurations (strong passwords) Protective implementations - using encryption, VPNs, certificates Protective devices – firewalls, routers, switches, etc User education Other?
11
Evaluating two attacks on the United States
Russian election interference – 2016 Pearl Harbor – December 7, 1941
12
Exercise – List United States assets
13
Exercise – Evaluate damage to US assets from each attack
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.