How To Defend Your Network Security



Similar documents
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Design Principles for Protection Mechanisms. Security Principles. Economy of Mechanism. Least Privilege. Complete Mediation. Economy of Mechanism (2)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Second-generation (GenII) honeypots

Presented by Evan Sylvester, CISSP

TELE 301 Network Management. Lecture 18: Network Security

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Cisco Secure PIX Firewall with Two Routers Configuration Example

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

Network Security Knowledge is Everything! Network Operations

Cryptography. Digital security domain. Digital signature. Problems in digital signatures. Firewall. An open network

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Firewalls & Intrusion Detection


Information Security

Cryptography and Network Security Chapter 1

THE ROLE OF IDS & ADS IN NETWORK SECURITY

A solution for comprehensive network security

Intrusion Detection System (IDS)

Security Basics: A Whitepaper

Network Incident Report

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Firewalls, Tunnels, and Network Intrusion Detection

SECURITY ADVISORY FROM PATTON ELECTRONICS

Taxonomy of Intrusion Detection System

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Three attacks in SSL protocol and their solutions

Banking Security using Honeypot

IPv6 Transport Support and Market Segmentations

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

The Need for Intelligent Network Security: Adapting IPS for today s Threats

What to Look for When Evaluating Next-Generation Firewalls

Rational AppScan & Ounce Products

Networking for Caribbean Development

How To Protect Your Network From Attack

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

PROFESSIONAL SECURITY SYSTEMS

Defending Against Data Beaches: Internal Controls for Cybersecurity

Secure networks are crucial for IT systems and their

Network Security Monitoring: Looking Beyond the Network

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Secure Software Programming and Vulnerability Analysis

How To Secure An Rsa Authentication Agent

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

8. Firewall Design & Implementation

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

CMS Operational Policy for Firewall Administration

Norton Personal Firewall for Macintosh

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08

Firewalls for small business

IT Security Procedure

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

Information System Security

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Compter Networks Chapter 9: Network Security

Security within a development lifecycle. Enhancing product security through development process improvement

Using WinReporter to perform security audits on Windows TM networks

Cloud Security:Threats & Mitgations

How To Protect Your Network From Attack From A Hacker On A University Server

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Applied Security Lab 2: Personal Firewall

Critical Security Controls

Topics in Network Security

Best Practices to Improve Breach Readiness

ICTN Enterprise Database Security Issues and Solutions

Cyber Security: Beginners Guide to Firewalls

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

Transcription:

Network Security Philosophy & Introduction Dr. Enis Karaarslan Muğla University Computer Engineering Department Netseclab.mu.edu.tr Dr. Enis Karaarslan 1

2

SECURITY PHILOSPHY 3

Computer & Network Security has similarities with the security in normal life. 4

There is no such thing as %100 Security 5

Security at the gates only, is not enough 6

A chain is only as strong as its weakest link 7

As there is no %100 security So give up? A possible solution: Use more than one chain 8

MULTI LAYER SECURITY 9

10

Security x Usability 11

Value of Assets and Expenditures What is the VALUE of your asset (data, prestige )? Keep in mind that Security expenditures should not be greater than the value of the assets 12

Risk Analysis Risk analysis is essential If the risk is too low, that/some precaution(s) can be cancelled 13

False Sense of Security A false sense of security is worse than a true sense of insecurity. Solution: Never think your system is secure. 14

No Template Which Suits All There is no templates which suits all. There is a different solution for different organizations l Different needs l Different assets 15

To win a war, one must know the way Sun Tzu The Art of War 16

Security is a process, not a product. Bruce Schneier 17

MONITOR The system should be monitored for intrusions And immediate action should be taken at attacks 18

Warn The Attacker 19

Try to Buy time for Make attacking difficult for l Discovery of the attack l Take measures Make decryption difficult so that l The data is not valid or valuable any more. 20

Network Awareness Know your enemy (?) Know yourself, l know your assets l know what to protect Know your systems more than the attacker 21

FUNDAMENTALS 22

Information System and Security ATTACK SECURITY MEASURES ATTACKER VULNERABILITY INFORMATION SYSTEM USERS

Vulnerable Systems The systems are vulnerable l Mainly because of bad coding l Must be patched (but can not be done rapidly as they should) l False sense of security 24

A vulnerability timeline

The Attacker/Intruder The attacker can be called as: Lamer, intruder, attacker (wrongly used as hacker also) Also secret organizations? Also companies (serious antivirus/defence economy) 26

Hacker /Lamer /Attacker Hacker is used as attacker/lamer, in the meaning: The intruder, who gets in your system and intends to use for his/her own aims. 27

The Attacker The attackers strength is Dedication l Will not stop until he/she gets in l Can use the computer for days long sleepless l Knows the vulnerabilities of systems 28

29

Network Security Assets Network Security Overall l Network Awareness l Firewall, Intrusion Detection Systems etc l More Host (Computer/Server/NW Device) Security l Physical Security l OS and Application Security l User Management Encryption 30

Firewall 31

Firewall Basics Rule based access control between networks. Software/hardware based Architecture l Static Packet Filtering l Dynamic Packet Filtering (Statefull inspection) l Application Level Protection Logging and alert capabilities 32

Encryption Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. (Encryption x Decryption) 33

Encryption Two different methods (according to key use) l Conventional Two keys are the same l Asymetric (Public Key Encryption) Key pair (public, private) 34

Encryption To decyrpt an encrypted data l How much time? l How much Processing (Computing power)? The science which deals with encryption is Cryptology 35

END OF THE SESSION Dr. Enis Karaaslan enis.karaarslan@mu.edu.tr 36