Integrating Network Security into your Site



Similar documents
Network Security and Firewall 1

HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures

CMPT 471 Networking II

Network Security Guidelines. e-governance

Security Best Practice

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

SCP - Strategic Infrastructure Security

Information Technology Security Procedures

The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

CISCO IOS NETWORK SECURITY (IINS)

8 Steps for Network Security Protection

CONTENTS. PCI DSS Compliance Guide

8 Steps For Network Security Protection

SoftLayer Fundamentals. Security / Firewalls. August, 2014

Hervey Allen. Network Startup Resource Center. PacNOG 6: Nadi, Fiji. Security Overview

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

INFORMATION SECURITY TRAINING CATALOG (2015)

Best Practices for PCI DSS V3.0 Network Security Compliance

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

ELEN 689: Topics in Network Security: Firewalls. Ellen Mitchell Computing and Information Services 20 April 2006

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Critical Controls for Cyber Security.

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Network Defense Tools

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

ICANWK406A Install, configure and test network security

Introduction Open Source Security Tools for Information Technology Professionals

Retention & Destruction

Patch and Vulnerability Management Program

Description: Objective: Attending students will learn:

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink

Linux Network Security

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Cisco Certified Security Professional (CCSP)

Network Access Security. Lesson 10

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

SANS Top 20 Critical Controls for Effective Cyber Defense

Firewalls for the Home & Small Business. Gordon Giles DTEC Professor: Dr. Tijjani Mohammed

Small Business Server Part 2

Consensus Policy Resource Community. Lab Security Policy

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

1 Introduction 2. 2 Document Disclaimer 2

Medical Device Security Health Group Digital Output

SANS Security 528 CASP Practice Exam

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Topics in Network Security

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Information. Questions will be answered at the end. Please submit questions to Erick Mendoza using the chat function.

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Security Considerations White Paper for Cisco Smart Storage 1

Directory and File Transfer Services. Chapter 7

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Manage a Firewall Using your Plesk Control Panel Contents

How To Protect Your Data From Being Stolen

Cornerstones of Security

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

CTS2134 Introduction to Networking. Module Network Security

Anomaly Detection and Vulnerability Management. Rolf Strehle, ditis Systeme Heidenheim

Firewalls (IPTABLES)

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Experiences from Educating Practitioners in Vulnerability Analysis

Firewalls. Network Security. Firewalls Defined. Firewalls

Security. TestOut Modules

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

NETWORK SECURITY HACKS

Best Practices For Department Server and Enterprise System Checklist

NETWORK SECURITY GUIDELINES

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Vulnerability Assessment Using Nessus

Chapter 1 The Principles of Auditing 1

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

SITECATALYST SECURITY

Cyber Essentials. Test Specification

How users bypass your security!

Perimeter Firewalls. Brandon Napier Rick Archibald Pete Jamison HAL PC & HLUG 09/22/2007. brought to you by: in association with

TECHNICAL WHITE PAPER. Symantec pcanywhere Security Recommendations

Transcription:

Integrating Network Security into your Site Rich Pinder Los Angeles Cancer Surveillance Progra m rpinder@usc.edu N A ACCR Annual Meeting Informatics: Methodology June 12, 2002 Toronto

O bjectives Big Picture thoughts on Security Co m ponents of organization wide security Rich s Top 10

Big Picture thoughts on Security Security - it s TO O co m plicated!!!

Doing nothing no longer acceptable. Its HUGE. But why not take itpiece meal? So mething BETTER than nothing! Little money? Few hours of the techies? Couple days time?? Hire a techie??? YOU CAN DO IT!!!

Start s m all go to the inform ational websites (look for.org and.gov sites) and search for getting started. D ecide w hich steps you can handle Consultants sources Attend local user groups - _nix Los Angeles costs ~ 100/hr

O bjectives Big Picture thoughts on Security Co mponents of organization wide security Rich s Top 10

Co mponents User authentication and environ m ent Filtering Port & Process control Fire walls Encryption VPN & Tunneling

User authentication and environ m ent Password protect ALL machines! One point login using to multiple system s can be dangerous (breach on weak machines obtains sam e password used on hardened machines). Long. Co mplex. Changing (???). Use password policy progra m s Bio metrics pro mises both higher security and easier use.

User authentication and environ m ent (cont) Environment User Training & Awareness Part of your annual confidentiality briefings Ramifications of bad practices User Accountability Commitment to compliance

Filtering Port & Process control C o ntrol the doors to your com p uters Should be done for all syste m s. Should be done for all ALL A L L major syste ms! Software to do this exists for your system (IPSec on WinNT/2k IPChains/IPTables on Linux) Rules: Inco ming O utgoing Forward.. For ALL start with D E N Y

Filtering Port & Process control (cont) Limit what s running on your co mputer KILL Unecessary Services! (watch default installs) Port Scans reports tell which doors open Threat assess ment goes one better tells you what s open, and what to D O about it. Even so m e Auto mated Mitigation software to take action on the threat assess ment report Co mputer Virus considered uncontrolled processes

Fire walls There are really no flames involved! Firewall is Centralized Filtering typically hardware and software solution. (Same software as we discussed for Filtering) Two NIC s pass through design Not a panacea! As soon as they re in place, requests to bypass them come in! M odifications can induce error.

Encryption Why send info in plain text when you can send it Encrypted? Pgp public key type encryption we ve heard about for a long tim e (GPG better alternative?) public key algorith m necessary to share with others with out knowing the key. But it s slow for highly efficient applications, still use sy m m etric based keys

Virtual Private Network (V P N) & Tunneling Defines a secure interconnected conduit between geographically separated system s Based on encryption Includes Filtering concepts Allows multiple (and future) applications to operate securely similar in concept to using your server at work Often imple mented to allow secure e mail and network access for ho me users

O bjectives Big Picture thoughts on Security Co m ponents of organization wide security Rich s Top 10

Top 10 M ake a security co m mitm ent to do so mething when you get ho me! Start a Security Procedures manual docu ment what you do. Do User Training & Authentication Hardening access control Don t use Telnet & Ftp. Get SSL enabled apps to substitute. (SSH, SCP) Use (and keep CURRE N T) virus control software (Sy mantec or McAffee) Encrypt ALL confidential data that you send fro m your organization. O S diligence upgrade m achines to at least windo ws NT. Install current patches. Docu ment. Consider using alternatives to Brother Bill s operating syste ms.

Top 10 R un vulnerability scanners (ie Nessus). Compare reports to the SA N S /FBI top 20 vulnerabilities list and be SURE to mitigate the biggies Port filtering Cheap: Install / configure IPSec for windo ws servers & IPChains or IPTables for Linux servers. Expensive: Do Cheap AND install dedicated Firewall machine. Router: Have your network folks be sure the routers and switches are configured properly Wireless? Secure the access point! (they com e initially wide open). If not implemented yet,look at 802.11b spec with W E P 2 security. D SL connections. Ho me lines use personal firewall software, or VPN if possible.

Security Resources SANS GREAT site http://w w w.sans.org/ Syste m Ad ministration, Networking and Security - since 1989 SANS incident site: http://ww w.incidents.org/ Good starting place: http://ww w.sans.org/newlook/publications/road map.ht m Top 20 security issues: http://w w w.sans.org/top20.htm Technical Tutorials http://w w w.systemexperts.com /tutorial.html Hodgepodge tutorial..great for showing what OTHE R S are looking to do to get into your site. Good source of info: (not just for linux) http://w w w.linuxsecurity.co m /

Security Resources (cont) G overn ment / U niversity inform ation sources National Security Agency http://w w w.nsa.gov/isso/infosec Windows 2000 security guidelines, including actual.inf files that can be applied to deal with config / do main /ad min stuff CERT www.cert.org Carnegie melon Software Engineering Institute See the tech tips section sign up for mailing list National Infrastructure Protection Center http://w w w.nipc.gov/ Co mputer Security Institute (CSI) http://w w w.cisecurity.org Fee based - $250/yr (but som e good stuff for free)

Security Resources (cont) Filtering port and process control http://w w w.nessus.org/ Nessus port scaner and threat assess ment tool http://w w w.tinysoftware.co m relatively inexpensive - $39 for new version. Zonealar m has free version still but best versions around sa me price. Deerfield, Norton (Sy mantec), Black Ice, Zonealarm, Tiny Personal firewall all available http://w w w.citadel.co m Hercules a threat mitigation tool Locating user groups Linux user groups: ww w.ssc.co m/glue Unix user groups: http://dark.wustl.ecu/~newton/othr_uug.html http://w w w.netip.co m Keith Pal mgren page Check out Articles & Security links pages Virtual Private networks http://w w w.vpnlabs.org see their Primers section how stuff works site good one.