Architecture Overview
|
|
|
- Coleen Hodges
- 10 years ago
- Views:
Transcription
1 Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and thereby simplifies the management of network security. The design objectives that are covered in this paper are listed below: Security implementation throughout the network Secure management and reporting Intrusion detection for critical resources, subnets, and servers Support for emerging network applications The security architecture of the network must prevent attacks from affecting valuable network resources. Attacks that succeed in pentrating the first line of defense, or those that originate from within the network, must be quickly and accurately detected and contained to minimize their effect on the rest of the network. SAFE Axioms The following axioms apply to nearly all NIDS, host-based IPS, and logging deployments, and are thus included in the front of this paper to limit redundancy. The paper assumes conformity with the security axioms in the original SAFE white paper that is most appropriate to the size of the network under consideration. Monitoring Throughout the Network Because attacks originate from within the corporate network as well as from the Internet, placing security monitoring devices such as network IDS sensors, host-based IPS agents, and logging devices only at network entry points may not suffice. In addition, by placing monitoring devices throughout the network, security administrators can track the spread of attacks and can take corrective action such as modifying access control lists (ACLs) on routers and internal firewalls to prevent the attack or contagion from reaching critical resources. Suggested locations for placement follow: Behind firewalls that provide access to the module On demilitarized zone (DMZ) segments that house public servers (Web, FTP, Domain Name System [DNS]), data centers, or e-commerce servers Behind VPN concentrators, to monitor unencrypted VPN traffic On segments that house corporate servers or other intranet services that are considered sensitive according to the defined security policy On segments that house network and security management servers Page 7
2 On the corporate intranet where critical resources are located At corporate extranet junction points between the campus network and branch networks as well as between the enterprise and partner networks Switched Infrastructure Most corporate LANs have migrated from a hub to a switch infrastructure over the past five years. Hubs broadcast all traffic to all ports, allowing network IDS sensors to automatically view and capture traffic crossing the hub. Switches only broadcast traffic to the port on which the destination MAC address(es) has been learned. Therefore, network IDS sensors will not see all traffic crossing the switch under normal circumstances. In order to overcome this limitation, the monitoring interfaces of all sensors should be connected to a switch port that has traffic from all necessary ports or all necessary VLANs mirrored to it. The network designer should also use caution when selecting the switch to use when countermeasures are implemented. The switch should support the ability for the Switched Port Analyzer (SPAN) or mirroring port to both receive and transmit traffic, because any countermeasures employed come from the network IDS sensor itself. Furthermore, because the IDS sensor spoofs the MAC address of the device that it is protecting (for example, the Web server, mail server, etc.), the switch must be configurable such that MAC address learning is disabled for the SPAN port. Otherwise, the switch will direct all legitimate traffic destined for the server to the IDS sensor until the server sends another packet and causes the MAC address to be re-learned on the correct port. Countermeasures Many network-based IDSs provide countermeasure capabilities. These capabilities include the ability to introduce new ACL rules into an edge router to block traffic coming in from an offending IP address as well as the ability to terminate the communication channel between the attacker and the target host through the use of TCP Reset (RST) packets. TCP resets should not be sent to known, valid devices such as network infrastructure components. An additional network IDS countermeasure is the use of in-line communication termination. In this case, the NIDS no longer sits as a passive monitor but is instead a part of the router or firewall operating system. This in-line capability, which is quickly being included in traditional network IDS appliances, removes the need for the network designer to be concerned with the use of SPAN or a network tap. However, the NIDS appliance can cause a network bottleneck. In addition, failure of the NIDS will leave the network in a closed state because no traffic can pass through the failed appliance. Staffing Threat Validation and Response (TVR) systems can dramatically reduce the time that security personnel spend investigating IDS alarms. These systems provide automated analysis and alarm escalation or elimination. As a result, security personnel can be more confident that an alarm on the IDS console is valid and requires further investigation. Page 8
3 Some host-based IPS implementations, such as the Cisco Security Agent, block malicious activity at the operating system level. Additionally, countermeasures on network IDS sensors provide some level of automated prevention once a signature is detected. To successfully implement network intrusion detection and syslog monitoring, a company must have the resources available to monitor and respond to incidents. Twenty-four-hour staffing requires approximately five employees (in three shifts of 8 hours each, 7 days per week, plus additional coverage for weekends, vacation, illness, etc.). These employees may not need to spend 100 percent of their time monitoring IDS alerts and syslog messages. Time spent depends on the number of network sensors and host-based IPS agents deployed, the number of alerts and syslog messages received, and the level of responsiveness desired. If the company is not prepared to expend the necessary resources, then the security monitoring function can be outsourced. Implementing only periodic monitoring of IDS and syslog reports also decreases staffing requirements. The network staff will not be in a position to respond immediately to a security incident, of course: staff will only be able to see that a security incident has occurred. The staffing decision should ultimately be based upon the value of the resources being protected, the expected loss the company would incur if the resources were compromised, and the security policy of the company. Network IDS Tuning Methodology Tuning sensors is critical to a successful network IDS implementation. Without tuning, IDS sensors generate alerts in response to all traffic matching an established criteria. The number of false alarms can easily overwhelm security personnel and reduce the value of the information the IDS provides. IDS sensors that are not tuned may also raise an alarm on an attack that does not impact the network resource being protected. Given enough false alarms, the security personnel will tend to ignore the IDS sensor increasing the odds that a real attack will be successful or will disable it, which leaves the network segment unprotected. The following are guidelines for tuning network IDS sensors. Step 1: Identify Potential Locations for Sensors To properly tune IDS sensors, the first step is to identify network locations where the sensors can be placed for maximum efficiency. In the public Internet segment, placing an IDS sensor in a location without traffic filtering can overwhelm the sensor s capabilities. Place IDS sensors behind a traffic filtering device such as a firewall, or in the case of a DMZ, a router with ACLs. If traffic is filtered upstream of the IDS, only traffic destined for the network resources being protected will reach the IDS, which reduces the sensor s workload. Step 2: Apply an Initial Configuration The objective of step 2 is to take a first pass at configuring the network IDS sensors. First, sensors are classified and grouped according to active signatures and are then configured by group with a common signature profile; the sensors in a group are managed collectively, which simplifies the management of large groups of sensors. A decision must be made to either deploy signature profiles using the default values or to tune specific signatures. Refer to Appendix A, Intrusion Detection Primer, for a discussion of signature types and how they are implemented on different sensors throughout the Page 9
4 network. A general guideline, if this is the initial deployment of network IDS, is to use the default settings at this step and then to tune them in one of the later steps. The destination for sensor alarms should also be determined during this step Step 3: Monitor the Sensor While Tuning The objective of steps 3 and 4 is to monitor IDS sensor alarms and tune out any alarms caused by normal background traffic rather than malicious activity. As steps 3 and 4 are executed, there should be a decrease in the number of false alarms. The monitoring period can last from several days to a week or more. If this is an initial network IDS implementation with a large number of sensors, the number of alarms may be quite large. Step 4: Analyze Alarms, Tune Out False Positives, and Implement Signature Tuning (If needed) During the initial tuning period, you will need to determine the cause of every alarm in order to identify false positives. This could be a tedious task, but it is necessary in order for your network IDS deployment to be of any use in detecting malicious activity. How do you determine if an alarm is a false positive? A few suggestions follow: 1) Consult the IDS Network Security Database (NSDB) to determine whether the alarm in question is typically due to malicious activity or normal network background activity. 2) If the alarm appears to be the result of normal network background activity, determine the source of the alarm. 3) If the source of the alarm is a server, work with the appropriate applications and operating system support groups to determine if they think that this is normal behavior, malicious activity, or perhaps an unknown process or application running on the server. If possible, duplicate the server in a known secure lab with a known, uncompromised server. The server may have to be built from scratch to guarantee this. It is critical that a list of all systems, their operating systems, and the applications running within the monitored environment be available in order to refine the IDS tuning as well as to determine the applicability of any patches released by vendors. 4) If the source is a network device (router, switch, etc.), follow step 3 procedures but consult the appropriate network operations staff. 5) Deploy a threat analysis system in order to help validate IDS alarms as well as evaluate their significance, impact, and possible responses. Once a false positive is identified, determine first if the source of the alarm s configuration can be modified so that the signature is not generated. For instance, if NetBIOS is running on a server and is unnecessary on that server, disable NetBIOS before tuning the network IDS sensors to ignore alerts caused by the traffic. If the service or application generating the alarm is required, however, or cannot be disabled, an alternative is to configure the network IDS sensors to ignore the alarm. The following configurations are possible: Do not generate an alarm if this particular signature is seen for all sources Do not generate an alarm if this particular signature is seen from this particular address Page 10
5 It is always better to be specific when implementing security. Therefore, it is recommended that the network IDS sensor be tuned such that it does not generate an alarm for the specific signature from the specific address. However, if additional servers that also require the application or service are later implemented on the same network segment, it may be necessary to go back and tune these sources out as well. The administrative overhead is reduced if the server IP addresses can be grouped together into a single profile. As mentioned in step 2, IDS sensors can be grouped and collectively managed according to their alarm profiles, This tuning feature reduces the administrative impact when sensors are added to the network. Similarly, IDS signatures can be grouped into four broad categories: Exploit signatures These signatures indicate attempts to compromise network systems through buffer overflows, Structured Query Language (SQL) injection, brute force password attacks, and other well-known exploits. Connection signatures These signatures indicate reconnaissance activity: an attacker is enumerating systems and services on the network. String-match signatures These signatures indicate corporate policy violations detected by sensors searching for custom text strings in the network traffic; for example, an IDS sensor could signal an alarm on any connection that transmits the phrase "Company Confidential" by or FTP. Denial of Service signatures These signatures indicate attempts by attack tools such as Trinoo, tribal flood network (TFN), Stacheldracht, and TCP SYN floods to consume bandwidth or computing resources in order to disrupt normal operations. These signatures are discussed in detail in Appendix A. If the default signature tuning templates were deployed in step 2, then specific tuning should now be attempted. Implement the specific tuning in stages, rather than all at once. If the sensors are grouped into four profiles, for example, tune each profile separately. Tune each category of signature separately as well. If a group of new false positives appears after pushing a new configuration to the sensors, this tuning method helps to identify the specific tuning responsible. The security operations administrator must balance the potential confusion created by tuning all of the sensors at once with the additional time it takes to tune the sensors in stages. Step 5: Selectively Implement Response Actions Once the false positives are tuned out and logging due to IDS tuning changes is sufficiently reduced, response actions such as TCP resets, shunning, and IP logging can be implemented. Please see the section titled Response Actions for usage guidelines. Again, deploy the response actions in stages, rather than all at once. Step 6: Update Sensors with New Signatures Automatic signature updates should be implemented for deployments with large numbers of sensors. See the subsection titled Configuration Management under Scaling Network IDS for a discussion of the benefits of implementing these updates. After a signature upgrade, security operations personnel should repeat steps 3 through 5 to tune each new signature appropriately. The time required to monitor the deployment for false positives should be reduced to just a day or Page 11
6 two, because the number of new signatures introduced with each signature pack is small. This is another reason for the security operations administrator to keep the signature levels on the sensors up to date: the greater the difference in signature pack levels, the larger the number of new signatures introduced and the greater the length of time required to monitor and tune out false positives. Host-Based IPS Tuning Host-based IPSs use system policies to differentiate between permitted actions and those that should be denied. Unlike the misuse-detection-based network IDS where each attack is represented by a signature, host-based IPSs focus on calls within the operating system to identify permissible actions. The software installs as shims in the operating system call stack that intercept and evaluate various system calls to the operating system kernel. The shims provide visibility into the process actions and represent locations within the operating system where an action can be controlled. Typically, hostbased IPS software installs with various default policies that can be used to protect a range of system types from desktop hosts to application servers. Host-based IPS tuning is similar to network IDS tuning: a monitoring period ensues after IPS installation that is governed by the number of alarms seen. As tuning proceeds, there should be a decrease in the number of alarms. This period can last for several days ( NIDS initial tuning period can extend to one or more weeks). Once the final tuning is in place, the policy can be locked in and switched over to a responsive mode that will automatically react to policy violations without human confirmation or other intervention. External Threat Verification and Response New Threat Verification and Response (TVR) technologies reduce the workload of security personnel and increase the accuracy and reliability of the IDS. By analyzing, verifying, and then validating or cancelling IDS alarms, these technologies greatly reduce the number of false alarms and thus the need to tune IDS sensors. The TVR system uses an external system to monitor alarms. When an alarm is generated, the TVR system identifies the target system, determines the host operating system, and initiates an in-depth check of the host. For Windows-based systems, the in-depth check can include registry key checking, file analysis, log analysis, and file capture. If the alarm is determined to be false, the TVR system downgrades or removes the alarm from the management console. However, if an attack is detected and verified, security personnel are alerted. Page 12
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow
IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication
WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT
WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHAT S INSIDE: 1. GENERAL INFORMATION 1 2. EXECUTIVE SUMMARY 1 3. BACKGROUND 2 4. QUESTIONS FOR CONSIDERATION
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
Intrusion Detection and Prevention Systems (IDS/IPS) Good Practice Guide
Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-INFR-0068.01 Prog. Director Mark Ferrar Status Approved Owner James Wood Version 2.0 Author Jason Alexander
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
MANAGED SECURITY SERVICES
MANAGED SECURITY SERVICES Security first Safety first! Security is becoming increasingly important for companies, especially for the extension of networking to mission-critical environments, with new intranet
Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC
Intrusion Detection and Intrusion Prevention Ed Sale VP of Security Pivot Group, LLC Presentation Goals Describe IDS and IPS Why They Are Important Deployment and Use Major Players The IT Security Camera
Using Ranch Networks for Internal LAN Security
Using Ranch Networks for Internal LAN Security The Need for Internal LAN Security Many companies have secured the perimeter of their network with Firewall and VPN devices. However many studies have shown
Firewall Environments. Name
Complliiance Componentt DEEFFI INITION Description Rationale Firewall Environments Firewall Environment is a term used to describe the set of systems and components that are involved in providing or supporting
How To Understand And Understand Cisco Security Specialist 1.2.2 (For A Non-Profit)
Foreword p. xxvi Introduction p. xxvii Audience p. xxvii Organization p. xxvii Cisco Security Specialist 1 p. xxx Introduction to Network Security p. 3 Need for Network Security p. 5 Security Threats p.
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes
Implementing Cisco Intrusion Prevention System 7.0 (IPS)
Implementing Cisco Intrusion Prevention System 7.0 (IPS) Course Overview: The Implementing Cisco Intrusion Prevention System (IPS) v7.0 course is a five-day course aims at providing network security engineers
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy
For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)
ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1
Classic IOS Firewall using CBACs 2012 Cisco and/or its affiliates. All rights reserved. 1 Although CBAC serves as a good foundation for understanding the revolutionary path toward modern zone based firewalls,
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Technical Note. ForeScout CounterACT: Virtual Firewall
ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...
IntruPro TM IPS. Inline Intrusion Prevention. White Paper
IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert
Lab 5.2.5 Configure IOS Firewall IDS
Lab 5.2.5 Configure IOS Firewall IDS Objective Scenario Topology: Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, the student will learn how to perform
Firewall Security. Presented by: Daminda Perera
Firewall Security Presented by: Daminda Perera 1 Firewalls Improve network security Cannot completely eliminate threats and a=acks Responsible for screening traffic entering and/or leaving a computer network
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1
NETE-4635 Computer Network Analysis and Design Designing a Network Topology NETE4635 - Computer Network Analysis and Design Slide 1 Network Topology Design Themes Hierarchy Redundancy Modularity Well-defined
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
The Bomgar Appliance in the Network
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware.
Radware s Smart IDS Management FireProof and Intrusion Detection Systems Deployment and ROI North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs
Network Security Ola Lundh [email protected] Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Lesson 5: Network perimeter security
Lesson 5: Network perimeter security Alejandro Ramos Fraile [email protected] Tiger Team Manager (SIA company) Security Consulting (CISSP, CISA) Perimeter Security The architecture and elements that provide
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Cisco SAFE: A Security Blueprint for Enterprise Networks
WHITE PAPER Cisco SAFE: A Security Blueprint for Enterprise Networks TABLE OF CONTENTS Authors................................. 1 Abstract................................. 1 Audience................................
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
8. Firewall Design & Implementation
DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Training Course on Network Administration
Training Course on Network Administration 03-07, March 2014 National Centre for Physics 1 Network Security and Monitoring 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Crafting a Secure
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
Network Security Topologies. Chapter 11
Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan
An Open Source IPS IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan Introduction IPS or Intrusion Prevention System Uses a NIDS or Network Intrusion Detection System Includes
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
