Network Security
Download
Report
Transcript Network Security
NETWORK SECURITY
Presented by: Brent Vignola
MATERIAL OVERVIEW…
Basic security components that exist in all
networks
Authentication
Firewall
Intrusion prevention system
Antivirus program
Honeypots
General locations where networks exist, the
security required in each, and how to manage
each
Homes
Small businesses
Large businesses
Schools
Government
BASIC SECURITY COMPONENTS:
AUTHENTICATION
Establish as genuine
Authorize
Validate
Usually in the form of an ID and password
Example:
Ecom user name and password to log on to university
computers
BASIC SECURITY COMPONENTS:
FIREWALL
Prevents unauthorized access to and from a
network
Considered to be the first line of defense in
protecting information on the network
Different methods of a firewall:
Packet-filter: examines every packet that enters and
leaves the network
Application gateway: security directly to an
application such as FTP
Circuit-level gateway: used while a connection is
being established
Proxy server: improves network performance by
filtering requests; all requests go through proxy
before reaching the real network
BASIC SECURITY COMPONENTS:
INTRUSION PREVENTION
SYSTEM
Detection of malware that has entered the network and of
suspicious activity on the network
Network-based IPS:
Designed to examine, identify, and report
For example: the IPS…
Examines the network
Identifies a worm on the network
Reports the finding to the user
Three types of the network-based IPS:
Content-based: examines each packet entering the network
for any unique areas (called signatures)
Protocol analysis: decodes the protocol to find anything out
of the norm
Rate-based: prevents Denial of Service attacks
DoS: malicious attack that is designed to bog-down the
traffic
BASIC SECURITY COMPONENTS:
ANTIVIRUS PROGRAM
Scans the files on the computer for viruses and malware
Two ways to scan:
Virus dictionary approach: keeps a database of
known viruses
Suspicious behavior approach: monitors the
performance of all programs
Once scan is complete there are 3 options to fix files:
Repair the file: removes the virus portion of the file
Remove the file: removing the file completely if
repairing cannot be done
Quarantine the file: “cover” the file so the virus
cannot spread to other files and so the file cannot be
accessed by other programs
BASIC SECURITY COMPONENTS:
HONEYPOT
Decoy on the network
Used to distract attackers from the actual
network
May look like the actual network
May “appear” to have valuable information
Most of the time it is a computer
But may be:
An unused IP address
Files
Data records
Two types:
Production: help alleviate the risk to a business
Research: learn how and why attackers enter the
network
NETWORK LOCATIONS:
HOMES
Simplest
network
Lowest level of security
Basic firewall
Basic Antivirus program
Strong password for wireless connection
Wireless connection should be set to at least
WPA or WPA2
NETWORK LOCATIONS:
SMALL BUSINESSES
More complex than home networks
Higher level of security than home networks
Stronger firewall and Antivirus program than home
networks
Similarity with home network:
Strong password for wireless connection
Strong authentication method:
ID and password for employees
Password should be updated on a monthly basis
Packet analyzer should be implemented:
Examines each packet that enters the network and
analyzes its content
Increase employee awareness of physical security:
Log-off computers; shut-down computers; lock office doors
NETWORK LOCATIONS:
LARGE BUSINESSES
Similarities with small business networks:
Strong firewall and Antivirus program
Strong password for authentication and wireless
devices
Implementation of packet analyzer
Increase employee awareness of physical security
Additional security:
Proxy server: implemented to improve performance
by filtering requests
Authentication: passwords should be updated biweekly
Physical security:
install cameras around premises
Place fire extinguishers are sensitive material
Hire security guards
NETWORK LOCATIONS:
SCHOOLS
Network is unique because students need to be
able to access it both on-campus and offcampus
Strong, but flexible firewall and proxy
Schools’ faculty should have responsibility of
supervising the access of indecent websites
Children’s Internet Protection Act (CIPA)
signed into law in December 2000:
protect students from viewing inappropriate content
on the internet such as pornography
Filtering software on the internet browser
One similarity with other networks:
strong Antivirus program
NETWORK LOCATIONS:
GOVERNMENT
Highest security and most complex
Strongest: Firewall; Proxy; Antivirus program
Strong encryption:
usually 256 bit key
Hides the information with a key
Example: used by military for covert operations
Wireless connection:
Only selected people can access the network
(President)
Area should be limited to the government property
(White House)
Network should be invisible to the outside
THE END
Any Questions?