Developing Network Security Strategies



Similar documents
Particularities of security design for wireless networks in small and medium business (SMB)

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

Recommended Wireless Local Area Network Architecture

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE Computer Network Analysis and Design Slide 1

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Configuring Security Solutions

SonicWALL PCI 1.1 Implementation Guide

Security Awareness. Wireless Network Security

United States Trustee Program s Wireless LAN Security Checklist

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Best Practices for Outdoor Wireless Security

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007

Network Security Guidelines. e-governance

SCADA SYSTEMS AND SECURITY WHITEPAPER

Chapter 1 Network Security

CISCO IOS NETWORK SECURITY (IINS)

Network Security Administrator

Securing Cisco Network Devices (SND)

NETWORK SECURITY (W/LAB) Course Syllabus

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

How To Secure Wireless Networks

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Network Access Security. Lesson 10

CTS2134 Introduction to Networking. Module Network Security

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Computer Networks. Secure Systems

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

Catapult PCI Compliance

RuggedCom Solutions for

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

ICANWK406A Install, configure and test network security

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Lab Configuring LEAP/EAP using Local RADIUS Authentication

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

9 Simple steps to secure your Wi-Fi Network.

Industrial Communication. Securing Industrial Wireless

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Cisco Advanced Services for Network Security

Business ebanking Fraud Prevention Best Practices

Certified Wireless Security Professional (CWSP) Course Overview

Cisco Virtual Office Express

Top-Down Network Design

How To Protect Your Network From Attack From Outside From Inside And Outside

74% 96 Action Items. Compliance

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Network Attacks and Defenses

WIRELESS SETUP FOR WINDOWS 7

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

APPENDIX 3 LOT 3: WIRELESS NETWORK

Chapter 15: Computer and Network Security

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

Cisco RV 120W Wireless-N VPN Firewall

Lab Organizing CCENT Objectives by OSI Layer

Security Design.

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Cisco 526 Wireless Express Mobility Controller

Network Security Topologies. Chapter 11

Secure SCADA Network Technology and Methods

WIRELESS NETWORKING SECURITY

The next generation of knowledge and expertise Wireless Security Basics

Payment Card Industry Self-Assessment Questionnaire

Networking: EC Council Network Security Administrator NSA

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab

m-trilogix White Paper on Security in Wireless Networks

Evolving Network Security with the Alcatel-Lucent Access Guardian

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Perspective on secure network for control systems in SPring-8

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Cisco RV215W Wireless-N VPN Router

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Network Virtualization Network Admission Control Deployment Guide

Penn State Wireless 2.0 and Related Services for Network Administrators

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

How To Protect A Wireless Lan From A Rogue Access Point

Cisco RV110W Wireless-N VPN Firewall


Cisco RV110W Wireless-N VPN Firewall

Cisco RV220W Network Security Firewall

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Lab Configure Basic AP Security through IOS CLI

INTRUSION DETECTION SYSTEMS and Network Security

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Network and Security Controls

Transcription:

NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1

Network Security Design The 12 Step Program 1. Identify network assets 2. Analyze security risks 3. Analyze security requirements and tradeoffs 4. Develop a security plan 5. Define a security policy 6. Develop procedures for applying security policies 7. Develop a technical implementation strategy NETE4635 - Computer Network Analysis and Design Slide 2

Network Security Design The 12 Step Program (continued) 8. Achieve buy-in from users, managers, and technical staff 9. Train users, managers, and technical staff 10. Implement the technical strategy and security procedures 11. Test the security and update it if any problems are found 12. Maintain security NETE4635 - Computer Network Analysis and Design Slide 3

Network Assets Hardware Software Applications Data Intellectual property Trade secrets Company s reputation NETE4635 - Computer Network Analysis and Design Slide 4

Security Risks Hacked network devices Data can be intercepted, analyzed, altered, or deleted User passwords can be compromised Device configurations can be changed Reconnaissance attacks Denial-of-service attacks NETE4635 - Computer Network Analysis and Design Slide 5

Risk Assessment Includes Probability, Control, and Severity Risk index = (probability factor * severity factor) (control factor) NETE4635 - Computer Network Analysis and Design Slide 6

Risk Index Calculation NETE4635 - Computer Network Analysis and Design Slide 7

Security Tradeoffs Tradeoffs must be made between security goals and other goals: Affordability Usability Performance Availability Manageability NETE4635 - Computer Network Analysis and Design Slide 8

A Security Plan High-level document that proposes what an organization is going to do to meet security requirements Specifies time, people, and other resources that will be required to develop a security policy and achieve implementation of the policy NETE4635 - Computer Network Analysis and Design Slide 9

A Security Policy Per RFC 2196, The Site Security Handbook, a security policy is a Formal statement of the rules by which people who are given access to an organization s technology and information assets must abide. The policy should address Access, accountability, authentication, privacy, and computer technology purchasing guidelines NETE4635 - Computer Network Analysis and Design Slide 10

Network Security in System Life Cycle NETE4635 - Computer Network Analysis and Design Slide 11

Network Security Policy Documents NETE4635 - Computer Network Analysis and Design Slide 12

Security Mechanisms Physical security Authentication Authorization Accounting (Auditing) Data encryption Packet filters Firewalls Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS) NETE4635 - Computer Network Analysis and Design Slide 13

Encryption for Confidentiality and Integrity Public/Private Key System for Ensuring Data Confidentiality Public/Private Key System for Sending a Digital Signature NETE4635 - Computer Network Analysis and Design Slide 14

Modularizing Security Design Security defense in depth Network security should be multilayered with many different techniques used to protect the network Belt-and-suspenders approach Don t get caught with your pants down NETE4635 - Computer Network Analysis and Design Slide 15

Modularizing Security Design Secure all components of a modular design: Internet connections Public servers and e-commerce servers Remote access networks and VPNs Network services and network management Server farms User services Wireless networks NETE4635 - Computer Network Analysis and Design Slide 16

Cisco SAFE Cisco SAFE Security Reference Model addresses security in every module of a modular network architecture. NETE4635 - Computer Network Analysis and Design Slide 17

Securing Internet Connections Physical security Firewalls and packet filters Audit logs, authentication, authorization Well-defined exit and entry points Routing protocols that support authentication NETE4635 - Computer Network Analysis and Design Slide 18

Securing Public Servers Place servers in a DMZ that is protected via firewalls Run a firewall on the server itself Enable DoS protection Limit the number of connections per timeframe Use reliable operating systems with the latest security patches Maintain modularity Front-end Web server doesn t also run other services NETE4635 - Computer Network Analysis and Design Slide 19

Security Topologies Enterprise Network DMZ Internet Web, File, DNS, Mail Servers NETE4635 - Computer Network Analysis and Design Slide 20

Security Topologies Internet Firewall DMZ Enterprise Network Web, File, DNS, Mail Servers NETE4635 - Computer Network Analysis and Design Slide 21

Securing Remote-Access and Virtual Private Networks Physical security Firewalls Authentication, authorization, and auditing Encryption One-time passwords Security protocols CHAP RADIUS IPSec NETE4635 - Computer Network Analysis and Design Slide 22

One Firewalls Configurations NETE4635 - Computer Network Analysis and Design Slide 23

Two Firewalls Configurations NETE4635 - Computer Network Analysis and Design Slide 24

Integrated Router NETE4635 - Computer Network Analysis and Design Slide 25

Securing Network Services Treat each network device (routers, switches, and so on) as a high-value host and harden it against possible intrusions Require login IDs and passwords for accessing devices Require extra authorization for risky configuration commands Use SSH rather than Telnet Change the welcome banner to be less welcoming NETE4635 - Computer Network Analysis and Design Slide 26

Securing Server Farms Deploy network and host IDSs to monitor server subnets and individual servers Configure filters that limit connectivity from the server in case the server is compromised Fix known security bugs in server operating systems Require authentication and authorization for server access and management Limit root password to a few people Avoid guest accounts NETE4635 - Computer Network Analysis and Design Slide 27

Securing User Services Specify which applications are allowed to run on networked PCs in the security policy Require personal firewalls and antivirus software on networked PCs Implement written procedures that specify how the software is installed and kept current Encourage users to log out when leaving their desks Consider using 802.1X port-based security on switches NETE4635 - Computer Network Analysis and Design Slide 28

Securing Wireless Networks Place wireless LANs (WLANs) in their own subnet or VLAN Simplifies addressing and makes it easier to configure packet filters Require all wireless (and wired) laptops to run personal firewall and antivirus software Disable beacons that broadcast the SSID, and require MAC address authentication Except in cases where the WLAN is used by visitors NETE4635 - Computer Network Analysis and Design Slide 29

WLAN Security Options Wired Equivalent Privacy (WEP) IEEE 802.11i Wi-Fi Protected Access (WPA) IEEE 802.1X Extensible Authentication Protocol (EAP) Lightweight EAP or LEAP (Cisco) Protected EAP (PEAP) Virtual Private Networks (VPNs) Any other acronyms we can think of? :-) NETE4635 - Computer Network Analysis and Design Slide 30

Access/Distribution/Core Architectural Model as a Starting Point for Security NETE4635 - Computer Network Analysis and Design Slide 31

Security Zones Embedded within Each Other NETE4635 - Computer Network Analysis and Design Slide 32

Access/Distribution/Core Architectural Model as a Starting Point for Security NETE4635 - Computer Network Analysis and Design Slide 33

Security Mechanisms May Restrict or Preclude Performance within Each Zone NETE4635 - Computer Network Analysis and Design Slide 34

NETE4635 - Computer Network Analysis and Design Slide 35

NETE4635 - Computer Network Analysis and Design Slide 36