Overall Network Security. Daniel J. Nealis



Similar documents
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Innovative Defense Strategies for Securing SCADA & Control Systems

Basics of Internet Security

State of Texas. TEX-AN Next Generation. NNI Plan

Critical Controls for Cyber Security.

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures

CMPT 471 Networking II

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Deploying Firewalls Throughout Your Organization

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

GE Measurement & Control. Cyber Security for NEI 08-09

ADM:49 DPS POLICY MANUAL Page 1 of 5

PCI Security Scan Procedures. Version 1.0 December 2004

Chapter 9 Firewalls and Intrusion Prevention Systems

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Network Security Administrator

Information Technology Branch Access Control Technical Standard

Security Issues with Integrated Smart Buildings

COSC 472 Network Security

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Network Security. Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ. July Network Security 08

Certified Information Systems Auditor (CISA)

Principles of Information Assurance Syllabus

Recommended IP Telephony Architecture

F G F O A A N N U A L C O N F E R E N C E

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

What would you like to protect?

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Symphony Plus Cyber security for the power and water industries

Network System Design Lesson Objectives

INTRUSION DETECTION SYSTEMS and Network Security

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Fundamentals of Network Security - Theory and Practice-


Designing a security policy to protect your automation solution

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

IT Security Standard: Network Device Configuration and Management

By David G. Holmberg, Ph.D., Member ASHRAE

Firewalls CSCI 454/554

Information Security Policy

Information Technology Cyber Security Policy

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Network Security Policy

Introduction to Cyber Security / Information Security

Managing IT Security with Penetration Testing

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

IT Networking and Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

How-To Guide: Cyber Security. Content Provided by

White Paper. Information Security -- Network Assessment

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Achieving PCI-Compliance through Cyberoam

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Fundamentals of Network Security Graphic Symbols

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Hitachi Virtual Storage Platform Family: Security Overview. By Hitachi Data Systems

E-Business, E-Commerce

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Injazat s Managed Services Portfolio

External Supplier Control Requirements

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

The Information Security Problem

OPC & Security Agenda

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

SCADA SYSTEMS AND SECURITY WHITEPAPER

Local Area Networks (LANs) Blueprint (May 2012 Release)

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

The Security Organization p. 1 Anecdote p. 2. Introduction

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Industrial Security for Process Automation

A Systems Approach to HVAC Contractor Security

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management

Cloud Security Introduction and Overview

Remote Access Security

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Information Security Basic Concepts

Transcription:

Overall Network Security Daniel J. Nealis

Overall Network Security? What does Network mean?? Bridges/routers/hubs Firewalls Ethernet/Token Ring/Frame Relay/Switched Networks Public vs. Private Networks Internet/Extranet/Intra net Or Broader concept of End -to- End Security Customer to institution and beyond

Overall Network Security Needs to focus on Administrative Operational Technical End to end perspective

Administrative Tone at the Top Culture of the Organization Security co-equal with revenue Viewed from an enterprise perspective Impact on Brand (Reputational risk) Responsibility clearly defined Corporate Line of Business Users

Operational Control Cycle Authorization Authentication Monitoring Ongoing Maintenance -recertifying entitlements Enabling Entitlements -completeness/accuracy

Development Control Cycle Innovation/Needs/ Risks Impact Analysis Development Design Project Mgt. Methodology Log Review Operational Effectiveness Monitor Testing Backoff process Implement

Certification Process Technical Perspective Risk Analysis Prevent Propagation of Exposures Address baseline requirements G O A L Network Diagrams System Parameter List Security Audit Reports 3 Step Process Identify points of vulnerability Institute appropriate controls

Managing Risk - Challenges and Opportunities Client LAN Server Host Server U S E R I N T E R F A C E Operating System Application Database Mgmt. L O C A L A R E A N E T W O R K N O D E Communications Operating System Local Area Network Database Mgmt. T E L E C O M Operating System Application Database Mgmt. S e c u r i t y Windows

End to End Security Considerations CUSTOMER Are Chase s Policies applicable? What layers of security are acceptable? - Certificate authority - ID/Password - Tokens - Biometric TRANSPORT Encryption Non-repudiation/authentication/ confidentiality/integrity NETWORK Internet/Extranet/Intranet Components - Router/hubs/switch/gateways Remote Access Private vs. Public Connectivity HOSTS/SERVER APPLICATION DATABASES Operating System Program Products Customized Code Security Parameters Virus Design Functionality Application level security Interconnectivity Interoperability Virus Access Online Support processors (administration) DESKTOP/LAPTOP Operating System Virus Application Software Connectivity Locally stored data Laptop physical vulnerability REDPLOYMENT OF ASSETS Data storage Data disposal ARCHIVED DATA Physical access Administration Environmental control Disposal

End-to-End Security REACTION DETECTION PROTECTION Customer to institution and beyond Monitoring of Logs Focus on External Exposure Consistent Control Practices Baseline Control Paramenter Setting End-to-End Security Mapping

Approach to Risk Management Risk Management requires a comprehensive knowledge of the components of risk:? Where is it?? What is it?? Who is responsible/accountable?? How is it controlled?? When was it last revised/assessed? Security is a component of Technology Risk Management.

Security Components To be effective, a security program needs to contain: that enable/ support the people to execute the processes Tools People Processes that have the appropriate background and skill set to effect their responsibilities that are clearly defined and consistently employed

Recent Articles Related to Security Threats CIA Plans Center to Counter Cyberwar Threat N.Y. Times, June 26, 1996 Feeling Insecure, Are We? Hackers Are Out to Get You, So Paranoia is O.K. N.Y. Times, March 17, 1997 Information-Warfare Defense is Urged Pentagon Panel Warns of Electronic Pearl Harbor Wall Street Journal, April 23, 1997 Hacker Hits Internet Page of Malaysian Telecom Reuter Information Service, February 21, 1997

Excerpts from the Articles Reuters Hong Hong, November 19, 1996 A Reuters computer maintenance engineer deleted critical files and crashed the system at the Standard Chartered Bank, Jardine Fleming and Natwest, all before his lunch break.

Excerpts from the Articles Business Week, April 21, 1997 Russia s Military leaders are shaping a strategy that one day could pose a threat to the West; focusing its limited resources on R&D for information warfare. Western analysts say that Russia is anteing up for new generations of smart sensors and precision weapons. And it is working on viruses and other high-tech wreckers that can attack an adversary s civilian computers running everything from the financial system to telephones to utility grids.

Excerpts from the Articles New York Times, March 17, 1996 We re really on the cusp of this becoming a major problem. said James Kallstrom, head of the FBI office in New York. As more and more of the economy goes digital, there are huge incentives for criminal attacks on American corporations. Today there are an estimated 440 hacker bulletin boards, 1900 Web sites purveying hacking tips and tools, and 30 hacker publications like Phrack and 2600: The Hacker Quarterly. These are readily available software programs for hacking tactics like war dialing, and sniffing --all used to exploit security weaknesses in computer systems.

Distribution of Sources of Risk Disgruntled Employee or Contract Workers Organized Crime Cyber Criminal Competitors Graffiti Artists Nation State

Concerns Technology/Automation wave moving faster than control tools and user awareness. Legal/law enforcement infrastructure poorly suited for virtual world.

Challenges of Leadership Large financial institutions have good reason to be a leader in managing its security risks: Market visibility Financial volume Component of national infrastructure Global reach Vendor dependencies Customer data Constant change

Network Security Concerns Security/Confidentiality Integrity Operability/Availability Recoverability Administrative Issues Integrity/audit trail of usage Segregation of Duties Software Implementation Table Maintenance Protocol Management Security Open vs. Closed

Risks Interconnectivity of Networks Internal / External Customers (trusted environments) Intra /Extra / Inter Net Outside Service Providers Maintenance of Network Components Routers/Switches/Hubs/Firewalls

Network Security Architectural Approaches Front-End Prevents access to network Back-End Burden on each individual host processor Centralized Common authentication Server Centralized Session Control Divides resources by groups according to security requirements Firewalling Processor accepts risk User locked in cannot use processor to gain access path to another processor

3 Tier Hierarchical Network Architecture Global Core Network TCP/IP only other protocols allowed across underlying bandwidth multiple bandwidth mgmt technologies e.g. SONET, IPL, FR, satellite Network Services e.g. DNS Router Satellite Fiber optic e.g.customer Access Network Access Network Hub Router Distribution Network Router e.g. building or metro backbone Router Distribution Network E t h e externally visible host Access via Internet or Dial up or Virtual Internet r n e firewall t IBM Compatible End Devices Access Network 95 Wall Laptop computer e.g. Trading floor or branch LAN Switching Hub Mainframe Router Router Hub Access services e.g. email,dhcp multiple protocols allowed in access layer Workstation

The Internetwork Three Tier Hierarchial Design Access networks to which all end systems and external connections are attached, and where user-related servers are located Distribution networks Core network which interconnect access networks and the core, and where only directory and enterprise-wide services reside a tightly controlled, global, homogeneous, reliable, highperformance backbone using only IP routing

The Network Security Model External Network Perimeter Protect the Network from unauthorized external access All External Connections must pass through a limited number of carefully managed perimeter Firewalls All Dial-up Access must be made through a Secure Gateway All External Access will be controlled by strong authentication procedures

The Network Security Model Internal Network Perimeter Protect sensitive information assets Three tier hierarchy facilitates internal access control Network Security implementation is based on the risk level of the business application Complementary Network and Application Level Security mechanisms must be employed

The Network Security Model Protect sensitive information assets All Levels of encryption should be supported Link Network Application File Level Ensure Privacy Risk Assessment to determine need for encryption

Network Security Goals Apply access controls appropriate to the risk exposure Provide appropriate level of confidentiality and integrity of data transmission Prevent unauthorized activity from interfering with the integrity and availability of the network Physical access - To hardware and line connection points Implementation and use of logical access controls for network devices Controlled implementation of modifications to network software and table maintenance Vital Records Management for network devices Disaster Recovery Program for network services

Control Feature INTEGRITY CONTROLS Network APPLICATION CONTROLS DDA LOANS GENERAL LEDGER PAYROLL User Program

INTERNET POLICIES! E-MAIL NETWORK Firewall Firewall FIREWALL DMZ Virus Firewall www. Applic. SERVER APPLIC. WEB ACCESS User

The Risks The Enterprise is exposed to the World. Some old challenges Operating System Security Network Security Data Integrity Social Engineering Viruses

The Risks (Cont d( Cont d) Some new challenges Denial of Service Attacks TCP/IP Spoofing Session Hijacking Confidentiality Operational Risk

Meeting the Challenge Perform a network security review. Carefully select and implement a firewall system. MONITOR! MONITOR! MONITOR! Form a tiger team to test your defenses. Be prepared for the WORST!

Going Forward Focus on end-to-end security. Connecting existing applications to the Net is not a simple change. Partner with the business units during the development process. Risk management is a value added service.

The Future Technology is getting better Firewalls Encryption and key management Authentication and non-repudiation Monitoring

Conclusion Active Risk Management Program Dedicated Resources Defined Metrics Management Commitment Risks are growing