n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Similar documents
Computer Network Vulnerabilities

CSC Network Security

Computer Security and Privacy

Chapter 9. Firewalls

Simple and Powerful Security for PCI DSS

Network Security Terms. Based on slides from gursimrandhillon.files.wordpress.com

CyberP3i Course Module Series

Securing CS-MARS C H A P T E R

Network Security: Firewall, VPN, IDS/IPS, SIEM

CSE 565 Computer Security Fall 2018

Indicate whether the statement is true or false.

Hands-On Ethical Hacking and Network Defense 3 rd Edition

COMPUTER NETWORK SECURITY

Security Assessment Checklist

Intrusion Detection Systems and Network Security

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

CompTIA Security+ Certification

Security+ SY0-501 Study Guide Table of Contents

ASA/PIX Security Appliance

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Network Security. Course notes. Version

CompTIA Security+(2008 Edition) Exam

CompTIA Security+ (Exam SY0-401)

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

CSE 565 Computer Security Fall 2018

Software Development & Education Center Security+ Certification

Chapter 8 roadmap. Network Security

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

Agenda of today s lecture. Firewalls in General Hardware Firewalls Software Firewalls Building a Firewall

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation)

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Best Practices With IP Security.

CompTIA Security+ (2008 Edition) Exam

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Evolution Of The Need For IAM. Securing connections between people, applications, and networks

Why Firewalls? Firewall Characteristics

Training UNIFIED SECURITY. Signature based packet analysis

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Computer Security: Principles and Practice

Cyber security tips and self-assessment for business

2. Firewall Management Tools used to monitor and control the Firewall Environment.

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

E-Commerce Security Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al.

Network Security. Thierry Sans

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

4.1.3 Filtering. NAT: basic principle. Dynamic NAT Network Address Translation (NAT) Public IP addresses are rare

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

Ethical Hacking and Prevention

Network Security and Cryptography. December Sample Exam Marking Scheme

PRACTICAL NETWORK DEFENSE VERSION 1

Advanced Security and Mobile Networks

Firewalls 1. Firewalls. Alexander Khodenko

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ]

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Network Security and Cryptography. 2 September Marking Scheme

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

system to cover their tracks, the HIDS can provide an independent audit trail of the attack.

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

n Explain penetration testing concepts n Explain vulnerability scanning concepts n Reconnaissance is the first step of performing a pen test

Activating Intrusion Prevention Service

CompTIA Security+ CompTIA SY0-401 Dumps Available Here at:

Exam: : VPN/Security. Ver :

CompTIA E2C Security+ (2008 Edition) Exam Exam.

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

Define information security Define security as process, not point product.

Networks and Communications MS216 - Course Outline -

Venusense UTM Introduction

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders:

Future-ready security for small and mid-size enterprises

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

Internet Security Firewalls

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title.

Sample excerpt. HP ProCurve Threat Management Services zl Module NPI Technical Training. NPI Technical Training Version: 1.

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

CIH

Strategic Infrastructure Security

BraindumpsVCE. Best vce braindumps-exam vce pdf free download

CSC 4900 Computer Networks: Security Protocols (2)

A Review Paper on Network Security Attacks and Defences

Managing SonicWall Gateway Anti Virus Service

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Raj Jain. Washington University in St. Louis

2. INTRUDER DETECTION SYSTEMS

Spring 2010 CS419. Computer Security. Vinod Ganapathy Lecture 14. Chapters 6 and 9 Intrusion Detection and Prevention

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Fundamentals of Network Security v1.1 Scope and Sequence

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Exam: Title : VPN/Security. Ver :

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals

Easy-to-Use PCI Kit to Enable PCI Compliance Audits

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

CS 356 Operating System Security. Fall 2013

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

Transcription:

Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology and the basic approaches associated with computer and information security Implement security configuration parameters on network devices Implement security configuration parameters on other technologies This graphic is taken from The Abdus Salam International Centre for Theoretical Physics. 3 4 1

Security+ Exam Changes in Requirements CompTIA Domain % of Examination in 301 % of Examination in 401 Site Apply credits Job MCSx (MCSA, MCSE etc.) 1.0 21% 20% 2.0 Compliance and Operational Security 18% 18% 3.0 Threats and Vulnerabilities 21% 20% 4.0 Application, Data and Host Security 16% 15% 5.0 Access Control and Identity Management 13% 15% 6.0 Cryptography 11% 12% Total 100% 100% 5 6 The CIA of Security Protection Confidentiality to ensure that only those individuals who have the authority to In the operational model Protection = view a piece of information may do so Integrity Only authorized individuals should ever be able to change (or delete) information Availability to ensure that the data, or the system itself, is available for use when the authorized user wants it 7 8 2

Security Principles Issues emphasis is placed on controlling access to internal computers network environments - number of computers, applications, users, configurations, servers architecture Ch. 3 Physical security Controlling access to internal computers from external entities Routers, authentication hardware and software, encryption Firewalls, intrusion detection systems (IDSs) 9 10 s in Networks Least Privilege File Authentication Directory Print Applicable to many physical environments as well as Mail E-Commerce RealTime Communication Application s network and host security User, application, or process should have only the necessary rights and privileges to perform its task Management Proxy Streaming Media Mobile Communication Operating systems and applications have different ways of implementing rights, permissions, and privileges Content Management Active Directory FTP Web Plan should be devised and standardized methods developed 11 12 3

Least Privilege Least Privilege Implement a hierarchy of administrators backups of workstations and servers setting up new user accounts performing password management Manage switches, routers Trusting relationships between domains Security context of applications Admin Tools -> Local Security Settings -> SW Security policies defined for users Admin Tools -> Computer Management -> Local Users and Groups guest accounts general user applications lower level system tasks (backup, developer, helpdesk) top level system administrators (sysadmins, netadmins) Don t run everything under the administrator account! 13 14 Layered Security Layered Software Protection Every environment needs multiple layers of security routers firewalls network segments IDSs encryption authentication software physical security traffic control Firewalls A traditional scanner, such as antivirus, antimalware, and antispyware software A specialized Web-scanning layer A behavior-monitoring layer Newest version of your favorite browser Network-based restrictions and user management software Data encryption software Online backup system 15 16 4

Diversity of Defense Security Through Obscurity More firewalls demilitarized zone (DMZ) e.g. one firewall between Internet and the DMZ other firewall may be between the DMZ and the internal network Filtering for FTP, SNMP, Telnet, SMTP, SSH, HTTP, SSL etc. Environment and protection mechanisms are confusing or supposedly not generally known Protecting something by hiding it (e.g. change port) Does not provide actual protection Use products from different vendors (Microsoft, Cisco, etc.) Trade-offs 17 18 KISS Causes of Threats Keep it simple BUT! Causes of network security threats Technology weaknesses Configuration weaknesses Policy weaknesses Human error 19 20 5

Technology Weaknesses Configuration Weaknesses TCP/IP Operating systems Network equipment Unsecured accounts System accounts with easily guessed passwords Misconfigured Internet services Unsecured default settings Misconfigured network equipment Trojan horse programs Vandals Viruses 21 22 Policy Weaknesses Human Error Lack of a written security policy Politics High turnover Concise access controls not applied Software and hardware installation and changes do not follow policy Proper security Nonexistent disaster recovery plan Accident Ignorance Workload Dishonesty Impersonation Disgruntled employees Snoops Denial-of-service attacks 23 24 6

Network Devices Firewalls Firewalls Routers/Gateways Switches Load balancers Proxies Internet Internal Network Virtual private network (VPN) concentrators Firewall 25 26 Features On A Firewall Network Address Translation Direction Control Service Control User Control Network Address Translation Source 192.168.10.1 131.107.2.200 Destination 200.200.20.1 Behavior Control Internet 131.107.2.200 Internal Network Auditing Network Address Translation (NAT) Port Mapping Firewall 192.168.10.1 192.168.10.2 27 28 7

Port Mapping Routers Port Mapping Source Destination Port 131.107.2.200 200.200.20.1 192.168.10.3 80 80 Routers operate at the network layer Use the network address (typically an IP address), utilize routing protocols to determine optimal routing paths Inspect packets from every communication looking at the destination 200.200.20.1 Internal Network address Internet 192.168.10.3 Examine the header to determine the next hop Use algorithms and tables to determine where to send the packet It is also possible to examine the source address and determine whether 131.107.2.200 Firewall 192.168.10.1 192.168.10.2 or not to allow a packet to pass SNMP 29 30 Switches Other Devices Switches originally operated at the data-link layer, with routing occurring at the network layer New breeds of switches can now switch at the network layer For intranets, switches have become what routers are on the Internet the device of choice for connecting machines While moving the packets, it is possible to inspect the packet headers and enforce access control lists security function They are intelligent network devices and are therefore subject to hijacking by hackers SNMP Load balancer distribute the processing load over two or more systems Proxies filter out undesirable traffic Web Security Gateways security threats and pitfalls unique to web-based traffic VPN provide a secure communication channel between users across public networks 31 32 8

Intrusion Detection Systems Logical Setup A host-based IDS examines activity on an individual system, such as a mail server, web server, or individual PC (HIDS). It is concerned only with an individual system and usually has no visibility into the activity on the network or systems around it. A network-based IDS examines activity on the network itself (NIDS). It has visibility only into the traffic crossing the network link it is monitoring and typically has no idea of what is happening on individual systems. 33 34 Advantages of HIDSs Disadvantages of HIDSs They can be very operating system specific and have more detailed signatures They can reduce false positive rates They can examine data after it has been decrypted They can be very application specific They can determine whether or not an alarm may impact that specific system The IDS must have a process on every system you want to watch The IDS can have a high cost of ownership and maintenance The IDS uses local system resources The IDS has a very focused view and cannot relate to activity around it The IDS, if logged locally, could be compromised or disabled 35 Networ 36 Networ 9

Advantages of a NIDS Disadvantages of a NIDS It takes fewer systems to provide IDS coverage Deployment, maintenance, and upgrade costs are usually lower A network-based IDS has visibility into all network traffic It is ineffective when traffic is encrypted It can t see traffic that does not cross it It must be able to handle high volumes of traffic It doesn t know about activity on the hosts themselves and can correlate attacks among multiple systems 37 38 Host-Based IPSs Network-Based IPSs Active IDS (intrusion prevention systems) will contain all the same components and capabilities with one critical exception the active IDS can react to the activity it is analyzing Reactions running a script to turn a process on or off modifying file permissions terminating the offending processes logging off specific users reconfiguring local capabilities to prevent specific users from logging in Like in HIPSs Most common defensive capability for an active IDS is to send a TCP reset message RST tells both sides of the connection to drop the session and stop communicating immediately There is one serious drawback a reset message affects only the current session Networ 39 40 10

Network Analyzers/Protection Tools Protocol Analyzers capture and decode network traffic Spam Filter protection againts unsolicited or undesired bulk electronic messages UTM Security all-in-one solution: firewall, IDS/IPS, antivirus, but can also include VPN capabilities, anti-spam, malicious web traffic filtering, anti-spyware, content filtering, traffic shaping, and so on Web Application Firewall vs. Network Firewall Application-aware Devices content-level filtering and hence are capable of application-level monitoring 41 42 43 44 11

There is no 100 percent secure system, and there is nothing that is foolproof! Stay Alert! 12