Formal Configuration Analytics for Provable & Measurable Security
|
|
|
- Jody Fleming
- 10 years ago
- Views:
Transcription
1 Formal Configuration Analytics for Provable & Measurable Security Ehab Al-Shaer Cyber Defense & Network Assurability (CyberDNA) Center Department of SIS, College of Computing and Informatics University of North Carolina Charlotte NSF US/Mideast Workshop on Trustworthiness in Emerging Distributed Systems and Networks June 4-6, 2012
2 Why Configuration Analytics Enforcing security and privacy objectives (identity management, intrusion detection cyber defense) is dependent on correct (and optimizing) security configurations. Cyber is a complex system of heterogonous interconnect systems: End hosts configuration (services, access controls, VM, registries etc) Firewalls IPSec IDS Proxies AP Mobile and pervasive devices Internet of things: sensor/actuators Smart devices for smart grid and others etc Assessing security requires holistic characterization of system (end-to-end) behavior considering the interdependences/interrelation between different components and configuration Formal analytics techniques are needed for provable configuration security
3 Why Configuration Analytics Eighty percent of IT budgets is used to maintain the status quo., Kerravala, Zeus. As the Value of Enterprise Networks Escalates, So Does the Need for Configuration Management. The Yankee Group January 2004 [2]. Most of network outages are caused by operators errors rather than equipment failure., Z. Kerravala. Configuration Management Delivers Business Resiliency. The Yankee Group, November It is estimated that configuration errors enable 65% of cyber attacks and cause 62% of infrastructure downtime, Network World, July Recent surveys show Configuration errors are a large portion of operator errors which are in turn the largest contributor to failures and repair time [1]. Management of ACLs was the most critical missing or limited feature, Arbor Networks Worldwide Infrastructure Security Report, Sept 2007.
4 Why Configuration Analytics December 2008 report from Center for Strategic and International Studies "Securing Cyberspace for the 44th Presidency" states that "inappropriate or incorrect security configurations were responsible for 80% of Air Force vulnerabilities" May 2008 report from Juniper Networks "What is Behind Network Downtime?" states that "human factors [are] responsible for 50 to 80 percent of network device outages". BT/Gartner [3] has estimated that 65% of cyber-attacks exploit systems with vulnerabilities introduced by configuration errors. The Yankee Group [4] has noted that configuration errors cause 62% of network downtime. A 2009 report [5] by BT and Huawei discusses how service outages caused by the human factor themselves cause more than 30% of network outages, a major concern for carriers and causes big revenue-loss.
5 Why Configuration Analytics
6 Why Configuration Analytics
7 Why Configuration Analytics
8 Why Configuration Analytics
9 Why Configuration Analytics Tufin Technologies study (2011) : "Nearly 85 percent of network administrators in the 2011 Firewall Management report said half of their firewall rule changes need to be fixed because they were configured incorrectly" Improperly-Configured-Managed-Survey-Finds / Gartner Research study (2008): "More than 99% of firewall security breaches are caused by configuration mistakes" %20firewall%20page%207%20qa_is_it_more_secure_to_use pdf Tufin Technologies study (2011): "a November 2011 survey from Tufin of 100 firewall managers revealed that only 1.3% of configuration changes that cause network downtime or pose a security breach are identified during the quarterly audit"
10 Science of Configuration Analytics & Automation Science of Configuration (SoC) is to constitute a scientific methodology for (1) creating and validating hypotheses (properties) about the global system behavior based on its components configurations or logs, and (2) synthesizing configurations of composite components that can provably satisfy global system properties deterministically or probabilistically. Configuration vs. s/w or h/w Configuration Analytic (Bottom-up): modeling, verification, repair, optimization, measuring/metrics Configuration Automation (top-donw): integration/unification, synthesis, planning, tuning /autonomics
11 Modeling ACL Configuration Using BDDs An ACL policy is a sequence of filtering rules that determine the appropriate action to take for any incoming packets: P = R1, R2, R3,..,Rn Each rule can be written in the form: where C i is the constraint on the filtering fields that must be satisfied in order to trigger the action a i The condition C i can be represented as a Boolean expression of the filtering fields f 1, f 2,, f k as follows: EA1 where each fv j expresses a set of matching field values for field f j in rule R i. Thus, we can formally describe a ACL policy as: rule n rule1 rule2 Ehab Al-Shaer, Science of Security Configuration
12 Slide 11 EA1 policy is a disjunction expression of set of conjuctive terms where each term i represents the firing condition for rule i since action must be binary here ==> I need an expression for each action exists in the policy Ehab Al-Shaer, 9/21/2005
13 Concise Formalization Single-trigger policy is an access policy where only one action is triggered for a given packet. C i is the 1st match leads to action a Multiple-trigger policy is an access policy where multiple different actions may be triggered for the same packet. C i is any match leads to action a where Ehab Al-Shaer, Science of Security Configuration
14 ESS2 ESS1 Formalization The Basic Model The network is modeled as a state machine each state determined by the packet header information and packet location on the network States = Locations X Packets The characterization function to encode the state of the network in the basic model (abstracting payload) Ehab Al-Shaer, Science of Security Configuration
15 Slide 13 ESS1 - if the function is true means this pkt with this specific header exist in this specif locaton - if there are 5 pkts in the network then the fucntion will have 5 statifying assignments ESS2 - I.e., every statisfying assignmetn for this fucntion represnerts a at least one packet with specific header exists on a specific location Ehab Al-Shaer, 4/9/2010 why location? - allows for global heterogneious devices analysis - more scalable than rul abstraction - allows for investigating devices-specific problmes - faster for rebuilding in dynamci update Ehab Al-Shaer, 4/9/2010
16 Formalization The Basic Model Network devices are modeled based on the packet matching semantic and packet transformation Each rule consists of a condition (Ci) and an action (a): Ci a Policy are set of rules matched sequentially with single- or multitrigger actions Firewall (single trigger) policy encoding using BDD Transformation: if a pkt state matches the rule condition, the Action can change the packet location and possibly the headers means change over the bits of the state Transition relation is characterization function as follows: t: (Curr_pkt x Curr_loc)x (New_pkt x New_loc) {true, false} Device Model φ = loc Match_Condition t {true, false} Ehab Al-Shaer, Science of Security Configuration
17 Formalization The Basic Model Global Transitions relation of the entire network: Variables Locations is every place that can describe packet position: firewall, router, IPSec device, or application layer service, etc. We allow Location to be different than IPsrc for spoofing There are two versions of each variable: current and new state. Each property and field describing the state (i.e., location IP; packet properties: src/dst IP; port, proto, transformation, etc) is represented by bits, according to its size. These variables are used via a symbolic representation using Ordered Binary Decision Diagrams. Model Checking and CTL are used to answer the queries posed by the administrator. 15 Ehab Al-Shaer, Science of Security Configuration
18 ConfigChecker: Global Configuration Analytics in a Box
19 CONFIGCHECKER: What and How? What is ConfigChecker? Automated security analytic tool for global network configuration verification, diagnosis, repair and hardening ConfigChecker Engine is based on symbolic model checker using BDDs and SAT tools. ConfigChecker allows for abstraction and composition; the entire network configuration represented in a Boolean formula Bottom up analysis: given security and risk requirements, find what is non compliant in the existing configuration. Why ConfigChecker is Unique? Global end to end analytics that includes routing, firewalls, NAT, IPSec/VPN, IDS, multicast, proxies, wireless AP, VMs, smart phone. Provable analytics (not simulation) Scalable (more than 4000s of devices, and 6 millions rules) Provides an expressive Temporal Logic based interface languages Integrate configuration and (host/network) log analysis
20 WHAT IS CONFIGCHECKER? Network Configuration System Requirements Logs/Traces ConfigChecker Analyzer Security Hardening Configuration Diagnosis Security Violation
21 Architecture System Requirements Security Hardening Network Configuration ConfigChecker Analyzer Configuration Diagnosis Network Configuration Routing Tables Firewalls ACL NAT Tables. IPSec Transformation. IDS Logs/Traces Wireless AccessPoints Host Configuration Gateway and subnet mask. Services. Applications. Security Mobility Violation
22 Architecture Network Configuration System Requirements ConfigChecker Logs/Traces General CTL extended language. Reachability Requirements Language. Analyzer Security Requirements Language. Risk Language. Security Hardening Configuration Diagnosis Security Violation
23 EXAMPLES OF CONFIGCHECKER ANALYTICS CAPABILITIES Reachability Analysis: Is there any service unreachable due to routing or firewall misconfigurations or potential route failures? Security Analysis: Is there any violation to a the end toend access control with required credentials? Consistency Analysis: Is there any conflict in policy actions or packet transformations in the network? Risk Analysis: Is there any violation to Risk based access control policies defined based vulnerabilities, exposure and impact
24 CONFIGCHECKER REACHABILITY ANALYTICS Reachability Analysis: Is there any service unreachable due to routing or firewall misconfigurations or potential route failures? Proof of Routing Completeness: Considering services interdependency and access control rules, all network services are reachable by authorized users/customers. E.g., Who ever access SQL server should also access authentication server before. Proof of Routing Soundness: every entry in FIB is a valid forward entry. No bogus routing bogus entries, no black holes, no routing loops. End to end reachability does not violate access control rules (e.g., No file upload To Internet from local machines even using WiFi or Bluetooth.) Routing Resiliency Given link or router failure scenario, is there route redundancy? How many? What is the quality (number of hops) of each route? Is there disjoint of degree X redundant paths? What firewalls changes are needed in order to allow for (1) at least 2 redundant routes, (2) disjoint for at least 50%, and (3) route length is less than x number of hops. Consistency checking between firewalls and routers Network and Application level access control compliance: Every DB user level access controls is implemented in network access control (routing and firewalls). If the user x has access to a DB table in server y then routing and firewall must allow machine of x to access machine y.
25 CONFIGCHECKER CONSISTENCY ANALYTICS Consistency Analysis: Is there any conflict in policy actions or packet transformations in the network? Intra policy Rule Anomaly Detection: Is there any conflict between ANY two rules (or more) in the same device, e.g., firewalls? Flow Shadowing and spuriousness Inter policy Rule Anomaly Detection: Is there any conflict between ANY two similar devices or packet transformation in the network? Upstream firewall accepts but downstream denies (spuriousness) or vice versa (shadowing) Inter device Anomaly Detection Is there any conflict between ANY two similar devices or packet transformation in the network? Packets should be inspected before encrypted How to identify complete, partial and conditional action conflicts? What are the most effective (minimum) fixes to resolve conflict?
26 CONFIGCHECKER SECURITY ANALYTICS Security Analysis: Is there any violation to a the end to end access control with required credentials? Are access control enforced across all paths? Is there any back door or hidden tunnels due to misconfiguration or failures? Considering various communication means such as cyber, WiFi, cell, Bluetooth using many wired and wireless devices, the potential of access control violation due to misconfiguring is significant. Trusted Path: are the required end to end credentials enforced? Broken Tunnels (Encrypted data appears as plain text). Least privilege enforcement Can someone upload to the internet if he has access to sensitive SQL server? Back doors through handheld devices (Bluetooth attacks).
27 CONFIGCHECKER RISK ANALYTICS Access control are defined based on Risk and Impact values Networks servers are assigned subjectively Risk and Impact, where Risk = f (potential vulnerability, Exposure) Potential vulnerability: CVSS score form NVD Exposure: how much this host is reachable directly and indirectly For example, high Risk = CVSS > 50 and high exposure Examples: High risk host should not contact High Impact Medium risk can only contact High Impact iff the traffic is encrypted Low risk hosts can access medium impact hosts iff traffic is deeply inspected Risk Analysis: Is there any violation to Risk based access control policies defined based vulnerabilities, exposure and impact Is any user in high risk environment can not access classified data? Is each traffic inspected before arriving servers of high impact? Is every data passing through a high risk domain encrypted?
28 Reachability Requirements Language CanReach(Src, SrcProfile, Dest, DestProfile) Unique ID. IP, Mask/Port. Running services (server) Any (_) Running Applications (client). Connectivity Capabilities (Wire, Wireless, Bluetooth, GPS, Cellular). Assets, Vulnerability, OS, etc.
29 Reachability Requirements Language Linking different rules with logical operators AND OR NOT IF THEN (Implies). R1: CanReach(H 1, _, SQLServer, _) R2: CanReach(H 1, _, _, Internal_DNS_Profile) R3: CanReach(H 1, _, _, Internal_Kerberos) R4 : IF R1 THEN (R2 AND R3)
30 Security Requirements Language CanReach( Src, SrcProfile, Dest, DestProfile, Credentials, Credentials Info, Temporal Constraint, Temporal Condition) Encrypted Inspected Always MD5 vs Until SHA128 Unless Key length AES, DES, 3DES
31 Security Requirements Language Logical Operators AND OR NOT IF THEN (Implies). Temporal Operators Always Until Unless The traffic going to the SQL server should be inspected unless it is encrypted. CanReach( Host, _, SQLServer, _, Inspected, _, Unless, Encrypted)
32 FireBlanket: On Synthesizing Distributed Filtering Configuration Considering Risk, Usability and Cost Constraints TOP DOWN Security Analysis IEEE Conference on Network and Service Management (CNMS 2011)
33 CONFIGSLIDER: The Science of Objective Security Configuration Synthesis ConfigSlider: Multi-factor network design tool what is the most cost-effective investment for maximizing security design space exploration Requirements Spuriousness Risk Usability Cost Network topology ILP Solver Design Architecture Alternatives Configuration Synthesis Counter-measure Deployment
34 Research/Project Overview Tool Theory Domain Goal Publication FirewallPolicyAdvisor Set theory Firewalls Consistency Checker INFOCOM 04, IM03, JSAC05 ScuritylPolicyAdvisor BDD Firewall & IPSec Consistency Checker ICNP05 INSPEC BDD Firewall Automated Testing for Cisco JSAC09 FWPolicyVis BDD Firewall Visualization Usinex07 ConfigChecker Global Enterprise Automated Verification, ICNP09 BDD-Model Checker ConfigLEGO BDD & SAT Global Enterprise & Clouds FireBlanket ILP Distributed Firewall diagnosis, and repair Imperative verification, diagnosis, and repair Automatic synthesis and DMZ creation ConfigSlider SMT Global Automatic synthesis of global security architecture & config CloudChecker BDD/SMT Cloud Verification, compliance checking and Planning SensorChecker BDD-model WSN Reachability and coverage Checker verification SensorPlanner SMT CPS Coverage and mission satisfaction ConfigSeal SAT-Model Checker Enterprise Logs and config Verification and forensic to trackback SecureComm 11, On progress INFOCOM10 & CNSM11 On progress On progress On progress On progress On progress
35 SmartAnalyzer: A Noninvasive Security Threat Analyzer for AMI Smart Grid IEEE INFOCOM 12, March 26-30, Orlando, FL
36 Advanced Metering Infrastructure (AMI)
37 Contributions Salable modeling of AMI configuration using SAT/SMT. Defining logic-based operational constraints for AMI security and safety invariants for smart grid. Examples: Data overwrite protection Device scheduling and cyber bandwidth constraint Assured data delivery and data freshness Developing an automated AMI analytical tool based on SMT that allows to objectively (with proofs) assess and investigate AMI security configuration for identifying and mitigating potential security threats proactively. Provide proof-based threat and diagnosis reports of security violations or potential threats.
38 Security Threat Analyzer for AMI Smart Grid
39 Challenges & Suggested Projects Cloud compliance checking (from both user and provider prospective) Characterization of Attack/Failures Root Cause on Mideast ISP Lack of protection Misconfiguration Recoverable Vulnerabilities 0-day attacks Global Consistency (firewall configuration consistency ==> ISP/University anonymous firewall configuration formal analytics of network/system logs for security compliance ==> ISP/University logs misconfiguration identification using traffic analysis ==> requires ISP traffic Data = Black Gold
40 Food for Thoughts NSF SafeConfig Workshop Report, Security Automation Research: Challenges and Future Directions, DoD Information Assurance Newsletter, Information Assurance Technology Analysis Center, Volume: 14, Number: 4, Pages: 14-18, December 2011
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Automated Firewall Analytics
Automated Firewall Analytics Ehab Al-Shaer Automated Firewall Analytics Design, Configuration and Optimization 123 Ehab Al-Shaer University of North Carolina Charlotte Charlotte, NC, USA ISBN 978-3-319-10370-9
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance
REDSEAL NETWORKS SOLUTION BRIEF Proactive Network Intelligence Solutions For PCI DSS Compliance Overview PCI DSS has become a global requirement for all entities handling cardholder data. A company processing,
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Automate PCI Compliance Monitoring, Investigation & Reporting
Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
How To Protect Your Network From Attack
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: [email protected]
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010
Cryptography and Network Security Chapter 22 Fifth Edition by William Stallings Chapter 20 Firewalls The function of a strong position is to make the forces holding it practically unassailable On O War,
Virtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Current and Future Research into Network Security Prof. Madjid Merabti
Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
The Risks that Pen Tests don t Find. OWASP 13 April 2012. The OWASP Foundation http://www.owasp.org
The Risks that Pen Tests don t Find 13 April 2012 Gary Gaskell Infosec Services [email protected] 0438 603 307 Copyright The Foundation Permission is granted to copy, distribute and/or modify
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls. 1 Information systems in corporations,government agencies,and other organizations
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE AGENDA PCI DSS Basics Case Studies of PCI DSS Failure! Common Problems with PCI DSS Compliance
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Hypothesis Testing for Network Security
Hypothesis Testing for Network Security Philip Godfrey, Matthew Caesar, David Nicol, William H. Sanders, Dong Jin INFORMATION TRUST INSTITUTE University of Illinois at Urbana-Champaign We need a science
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs
Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary
In-Band Security Solution // Solutions Overview
Introduction The strategy and architecture to establish and maintain infrastructure and network security is in a rapid state of change new tools, greater intelligence and managed services are being used
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Altus UC Security Overview
Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
SEC-370. 2001, Cisco Systems, Inc. All rights reserved.
SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
Wired Network Security: Hospital Best Practices. Jody Barnes. East Carolina University
Wired Network Security 1 Running Head: Wired Network Security: Hospital Best Practices Wired Network Security: Hospital Best Practices Jody Barnes East Carolina University Wired Network Security 2 Abstract
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
Solution Brief. Secure and Assured Networking for Financial Services
Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to
Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls
CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh Written Exam in Network Security ANSWERS May 28, 2009. Allowed aid: Writing material. Name (in block letters)
Securing OS Legacy Systems Alexander Rau
Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems
Enterprise Buyer Guide
Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
Design and Implementation of Firewall Policy Advisor Tools
Design and Implementation of Firewall Policy Advisor Tools Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information Systems
BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table
BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance
Network Security. Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ. July 2010. Network Security 08
Network Security (Principles i & Practices) Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ By: Arash Habibi Lashkari July 2010 1 Introduction to Network Security Model of Network
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Building Robust Security Solutions Using Layering And Independence
Building Robust Security Solutions Using Layering And Independence Fred Roeper Neal Ziring Information Assurance Directorate National Security Agency Session ID: STAR-401 Session Classification: Intermediate
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
