Network Security. Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ. July 2010. Network Security 08



Similar documents
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

What would you like to protect?

How To Protect Your Network From Attack From Outside From Inside And Outside

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Firewall Environments. Name

Network Security Topologies. Chapter 11

INTRUSION DETECTION SYSTEMS and Network Security

Firewall Security. Presented by: Daminda Perera

Internet infrastructure. Prof. dr. ir. André Mariën

Information Security Policy

CMPT 471 Networking II

Lesson 5: Network perimeter security

The Bomgar Appliance in the Network

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Figure 41-1 IP Filter Rules

Developing Network Security Strategies

Overview. Firewall Security. Perimeter Security Devices. Routers

Secure Network Design: Designing a DMZ & VPN

1B1 SECURITY RESPONSIBILITY

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Network Security Administrator

8. Firewall Design & Implementation

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

How To Protect Your Network From Attack

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Access control policy: Role-based access

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Avaya TM G700 Media Gateway Security. White Paper

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Avaya G700 Media Gateway Security - Issue 1.0

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

A Network Design Primer

Fundamentals of Network Security - Theory and Practice-

Architecture Overview

74% 96 Action Items. Compliance

ICANWK406A Install, configure and test network security

Information Security Network Connectivity Process

Achieving PCI-Compliance through Cyberoam

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Tutorial 3. June 8, 2015

Network Security Guidelines. e-governance

Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3

Information Technology Security Guideline. Network Security Zoning

This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Internet Security Firewalls

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Introduction to Cyber Security / Information Security

Chapter 15. Firewalls, IDS and IPS

Network Security Policy

Computer Networks. Secure Systems

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

H.I.P.A.A. Compliance Made Easy Products and Services

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Microsoft Windows 2000 Network Architecture Guide

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN

HEC Security & Compliance

SonicWALL PCI 1.1 Implementation Guide

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

CISA TIMETABLE (4 DAYS)

Innovative Defense Strategies for Securing SCADA & Control Systems

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

UCIT INFORMATION SECURITY STANDARDS

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Detailed Description about course module wise:

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders

12. Firewalls Content

Firewalls and Virtual Private Networks

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Exam 1 - CSIS 3755 Information Assurance

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Cisco Advanced Services for Network Security

The Information Security Problem

BUY ONLINE FROM:

NETWORK PENETRATION TESTING

Attachment D System Hardware & Software Overview & Recommendations For IRP System

Securing the Service Desk in the Cloud

CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard

How To Protect Your School From A Breach Of Security

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Microsoft Technologies

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

CISCO IOS NETWORK SECURITY (IINS)

Transcription:

Network Security (Principles i & Practices) Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ By: Arash Habibi Lashkari July 2010 1

Introduction to Network Security Model of Network Security Process Elements of Network Security Policy Elements of NetworkSecurity Design Case Study 2

3

Elements of a Network Security Policy 1. Computer technology purchasing guidelines security features 2. Privacy policy emails, user data 3. Access policy control of access to assets 4. Accountability policy roles/responsibilities, auditing, incident handling 5. Authentication policy (identity management) passwords, remote authentication, smart cards 6. Availability statement expected availability, QoS, hours 7. Maintenance policy for IT system & network esp. remote admin, outsourcing 8. Violations reporting policy types of violations, anonymous reporting? 9. Supporting information point(s) of contact, publicity, company policies, 4

Network Security Design Policies + Threats + Risk > Policies Policies i Policy Control measures (tools, procedures, etc.) + > Design 5

Elements of Network Security Design Device security features Adminpasswords passwords, Secure Shell Firewalls VPN IDS IPS Client server VPN, site to site VPN Access control Access Control Lists, Committed Access Rate And more 6

Case Study Draw a network diagram to show the network security design of your department in the university There are four criteria in security please define them: confidentiality integrity availability and non repudation 7

Defining Security Zones What are security zones? DMZ 8

Network Architecture The topological design of a network is one of the best defenses against network attacks. Using zones to segregate various areas of the network from each other. Different zones of the same network have different security needs. Better scalability 9

Zoning strategies 1. Greater security needs, more secure zones 2. Controlled access to zones 3. Publicly accessed servers are placed in separate zones from private servers. 4. To achieve highest security, each server is placed in a separate zone. Why? 5. The defense in depth principle Firewalls are used to separate the zones. 10

DMZ Different ways of creating demilitarized zones: 1. Using a 3 legged firewall 2. Placing the DMZ outside the firewall Bastion hosts are placed in the DMZ. a) Inthe path between a firewall and the Internet b) Dirty DMZ Rationale? 3. Placing the DMZ between stacked firewalls 11

DMZ Categories Simple DMZ single subnet between the internet and intranet and contains all the servers that have some public exposure Tiered DMZ Multi subnet between the internet and intranet. 12

Simple DMZ Internal network Router to external network 13

Simple DMZ 14

Two tier DMZ Internal network Router to external network 15

Two tier DMZ 16

Three tier DMZ 17

Perimeter Defense and Firewall DMZ Intranet Internet DNS Server Mail Server Web Server Intra2(win2003) Firewall Firewall SW Outer Firewall Router SW Inner Firewall Router SW IDS IDS Honeypot IDS Intra1 (XP) 18

Intrusion Prevent System (IPS) combining i Firewall with IDS DMZ Intranet Internet DNS Server Mail Server Web Server Intra2(win2003) Firewall Firewall SW IPS Outer Honeypot SW IDS IPS Inner SW Intra1 (XP) IDS 19

Sample Security Policies (1) The DMZ servers are typically not allowed make connections to the intranet. Systems in Internet not allowed to directly contact any systems in the intranet. Systems in Intranet not allowed to directly contact any systems in the Internet. (least privilege principle) Systems in DMZ serve as mediator (go between). Password/certificate/credential are presented for allowing mediating services. No dual interface from DMZ servers directly to systems Intranet except the inner firewall. 20

Sample Security Policy (2) Intranet system typically uses Private LAN addresses: 10.x.y.z/8; 172.a.x.z/16; 192.168.x.y/24. Complete Mediation Principle: inner firewall mediate every access involves with DMZ and Intranet. Separation of privileges; with different DMZ server running different network functions; firewall machines are dff different entities than the DMZ servers. It is also related to least common mechanism principle. The outer firewall allows HTTP/HTTPS and SMTP access to DMZ server. Need to detect virus, malicious logic. 21

Questions 22