Network Management Session 1 Network Basics
Download
Report
Transcript Network Management Session 1 Network Basics
COMP1321
Networks in Organisations
Richard Henson
April 2013
Protecting
Organisational Data
By the end of this session you should be
able to:
– explain why the internal network user is
potentially a threat
– explain the importance of protecting entry to
the network by outsiders
– suggest ways to identify vulnerabilities of
the network, so action can be taken to
reduce the risk
Network Management
A network manager has two (conflicting?)
responsibilities
– provide facilities and services that users need to
do their jobs
– protect the network against abuse by naïve or
malign users
General perception (by users!)…
– network managers are more concerned with
“protecting the network” than servicing the needs
of its users
The “good insider”.. Threat (?)
Users: employees, who (generally) want to do
their job, and do it well…
Possible conflict with the “security-orientated”
or “nanny-state” approach to network
management
Personal opinion: needs balance
– the network IS there for the benefit of the users…
» fulfill business objectives
– the network MUST be as secure as reasonably
possible
» protect valuable company data
“unthinking” insiders
Employees who do stupid things on the
network
– bring in viruses
– spread passwords around
– forward email inappropriately
– engage with phishing emails…
– etc…
Bad Insiders
Could be disillusioned
– just plain corrupt
– maybe a temp?
Could cause real damage
– bring network down
– put company out of business…
What to do about the
Insider Threat?
A
matter for organisational
management
– Establish policy
» negotiated with users…
– Educate/train users
– Enable breaches of policy to be detected…
– Enforce policy!
What about Outsiders?
Two types:
– employees working “in the field”
– the rest of the world…
Organisational management can’t
enforce policy on the latter…
– network only protected through good, wellresourced network management
Firewalls: checking/blocking
data coming in and out…
INTERNET
Firewall
Internal
Network
...
Do we have a problem?
Perceptions “from the inside” quite
different from “outside looking in”
Should we find out…?
Almost impossible to tell if the network
is secure from within…
– could just hope so (!)
– could go outside, and try to penetrate
defences
– better still, the organisation could get a
benign expert to do it for them…
One such expert will be
presenting on Thursday…
Name: Campbell Murray
– Technical Director
– Encription Ltd
Location: BY1150
Time: 1015
Assuming no security…
Data cannot be made completely
secure if it uses a public network
– naïve to think so
Also (especially…) true on a wireless
public network
– necessary to have a system that ensures
data that is hacked en route is unintelligible
Authentication
had better be good…
Generally means control via the
desktop or application layer
– Browser/Windows desktop
If Internet-based, should use PKI
» public-key encrypted email
user digital certificate tied to computer & email
address
» public-key encrypted web pages
use https protocol
server has an SSL certificate
End-device
controlled security
Two types of identification (as in
previous e.g.):
– via computer (device) ID
– via user ID
Either/both can (should?) have a
password to control access
Security & Privacy
Closely related technologies
– important differences
Privacy
– about informational self-determination
» ability to decide what information about you goes
where
Security
– offers the ability to be confident that
privacy decisions are respected
Privacy, Security and
Mobile Networks
Mobile voice privacy
– can someone listen in on my call?
» privacy goal: allow user to say no
» security technology, e.g. encryption: allows user to
enforce it
Sometimes goals of security and
privacy are the same
– other times orthogonal, or even in conflict
Security/Privacy v Availability
“I want it all, and I want it now…”
– http://www.youtube.com/watch?v=1pm4fQ
Rl72k
“Only if your request conforms with the
rules…”
– society: bad for other people
– organisational: confidentiality
– personal: human rights
Balancing Rules on
Privacy/Security
Ideal:
– keeps the data secure…
– allows the user freedom to do their
job, participate in legitimate leisure
activity, etc.
Unnecessarily restrictive or
unexplained rules…
– users get frustrated…
NOT Getting the balance right…
Worrying survey & report (BBC, 19/11/10):
http://www.bbc.co.uk/news/business11793436
BBC’s own network users so frustrated
about IT restrictions stopping them doing
their jobs that many (typically 41% according
to a CISCO survey) ignored the rules!
Is it the same everywhere?
Is it any better today?