Network Security
Presented by: Brent Vignola
Material overview…
Basic security components that exist in all networksAuthenticationFirewallIntrusion prevention systemAntivirusprogramHoneypotsGeneral locations where networks exist, the security required in each, and how to manage eachHomesSmall businessesLarge businessesSchoolsGovernment
Basic security components:authentication
Establish as genuineAuthorizeValidateUsually in the form of an ID and passwordExample:Ecom user name and password to log on to university computers
Basic security components:firewall
Prevents unauthorized access to and from a networkConsidered to be the first line of defense in protecting information on the networkDifferent methods of a firewall:Packet-filter: examines every packet that enters and leaves the networkApplication gateway: security directly to an application such as FTPCircuit-level gateway: used while a connection is being establishedProxy server: improves network performance by filtering requests; all requests go through proxy before reaching the real network
Basic security components:intrusion prevention system
Detection of malware that has entered the network and of suspicious activity on the networkNetwork-based IPS:Designed to examine, identify, and reportFor example: the IPS…Examines the networkIdentifies a worm on the networkReports the finding to the userThree types of the network-based IPS:Content-based: examines each packet entering the network for any unique areas (called signatures)Protocol analysis: decodes the protocol to find anything out of the normRate-based: prevents Denial of Service attacksDoS: malicious attack that is designed to bog-down the traffic
Basic security components:antivirus program
Scans the files on the computer for viruses and malwareTwo ways to scan:Virus dictionary approach: keeps a database of known virusesSuspicious behavior approach: monitors the performance of all programsOnce scan is complete there are 3 options to fix files:Repair the file: removes the virus portion of the fileRemove the file: removing the file completely if repairing cannot be doneQuarantine the file: “cover” the file so the virus cannot spread to other files and so the file cannot be accessed by other programs
Basic security components:honeypot
Decoy on the networkUsed to distract attackers from the actual networkMay look like the actual networkMay “appear” to have valuable informationMost of the time it is a computerBut may be:An unused IP addressFilesData recordsTwo types:Production: help alleviate the risk to a businessResearch: learn how and why attackers enter the network
Network locations:homes
Simplest networkLowest level of securityBasic firewallBasic Antivirus programStrong password for wireless connectionWireless connection should be set to at least WPA or WPA2
Network locations:small businesses
More complex than home networksHigher level of security than home networksStronger firewall and Antivirus program than home networksSimilarity with home network:Strong password for wireless connectionStrong authentication method:ID and password for employeesPassword should be updated on a monthly basisPacket analyzer should be implemented:Examines each packet that enters the network and analyzes its contentIncrease employee awareness of physical security:Log-off computers; shut-down computers; lock office doors
Network locations:large businesses
Similarities with small business networks:Strong firewall and Antivirus programStrong password for authentication and wireless devicesImplementation of packet analyzerIncrease employee awareness of physical securityAdditional security:Proxy server: implemented to improve performance by filtering requestsAuthentication: passwords should be updated bi-weeklyPhysical security:install cameras around premisesPlace fire extinguishers are sensitive materialHire security guardsPut a fence around the parameter of the property
Network locations:schools
Network is unique because students need to be able to access it both on-campus and off-campusStrong, but flexible firewall and proxySchools’ faculty should have responsibility of supervising the access of indecent websitesChildren’s Internet Protection Act (CIPA) signed into law in December 2000:protect students from viewing inappropriate content on the internet such as pornographyFiltering software on the internet browserOne similarity with other networks:strong Antivirus program
Network locations:government
Highest security and most complexStrongest: Firewall; Proxy; Antivirus programStrong encryption:usually 256 bit keyHides the information with a keyExample: used by military for covert operationsWireless connection:Only selected people can access the network (President)Area should be limited to the government property (White House)Network should be invisible to the outside
THE END
Any Questions?
1
Embed
Upload