* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Network Security
Security-focused operating system wikipedia , lookup
Deep packet inspection wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Network tap wikipedia , lookup
Computer security wikipedia , lookup
Mobile security wikipedia , lookup
Wireless security wikipedia , lookup
Distributed firewall wikipedia , lookup
Unix security wikipedia , lookup
NETWORK SECURITY Presented by: Brent Vignola MATERIAL OVERVIEW…  Basic security components that exist in all networks       Authentication Firewall Intrusion prevention system Antivirus program Honeypots General locations where networks exist, the security required in each, and how to manage each      Homes Small businesses Large businesses Schools Government BASIC SECURITY COMPONENTS: AUTHENTICATION Establish as genuine  Authorize  Validate  Usually in the form of an ID and password  Example:   Ecom user name and password to log on to university computers BASIC SECURITY COMPONENTS: FIREWALL Prevents unauthorized access to and from a network  Considered to be the first line of defense in protecting information on the network  Different methods of a firewall:      Packet-filter: examines every packet that enters and leaves the network Application gateway: security directly to an application such as FTP Circuit-level gateway: used while a connection is being established Proxy server: improves network performance by filtering requests; all requests go through proxy before reaching the real network BASIC SECURITY COMPONENTS: INTRUSION PREVENTION SYSTEM   Detection of malware that has entered the network and of suspicious activity on the network Network-based IPS:  Designed to examine, identify, and report  For example: the IPS…  Examines the network  Identifies a worm on the network  Reports the finding to the user  Three types of the network-based IPS:  Content-based: examines each packet entering the network for any unique areas (called signatures)  Protocol analysis: decodes the protocol to find anything out of the norm  Rate-based: prevents Denial of Service attacks  DoS: malicious attack that is designed to bog-down the traffic BASIC SECURITY COMPONENTS: ANTIVIRUS PROGRAM    Scans the files on the computer for viruses and malware Two ways to scan:  Virus dictionary approach: keeps a database of known viruses  Suspicious behavior approach: monitors the performance of all programs Once scan is complete there are 3 options to fix files:  Repair the file: removes the virus portion of the file  Remove the file: removing the file completely if repairing cannot be done  Quarantine the file: “cover” the file so the virus cannot spread to other files and so the file cannot be accessed by other programs BASIC SECURITY COMPONENTS: HONEYPOT Decoy on the network  Used to distract attackers from the actual network  May look like the actual network  May “appear” to have valuable information  Most of the time it is a computer   But may be: An unused IP address  Files  Data records   Two types: Production: help alleviate the risk to a business  Research: learn how and why attackers enter the network  NETWORK LOCATIONS: HOMES  Simplest network  Lowest level of security  Basic firewall  Basic Antivirus program  Strong password for wireless connection  Wireless connection should be set to at least WPA or WPA2 NETWORK LOCATIONS: SMALL BUSINESSES     More complex than home networks Higher level of security than home networks Stronger firewall and Antivirus program than home networks Similarity with home network:   Strong password for wireless connection Strong authentication method: ID and password for employees  Password should be updated on a monthly basis   Packet analyzer should be implemented:   Examines each packet that enters the network and analyzes its content Increase employee awareness of physical security:  Log-off computers; shut-down computers; lock office doors NETWORK LOCATIONS: LARGE BUSINESSES  Similarities with small business networks:      Strong firewall and Antivirus program Strong password for authentication and wireless devices Implementation of packet analyzer Increase employee awareness of physical security Additional security: Proxy server: implemented to improve performance by filtering requests  Authentication: passwords should be updated biweekly  Physical security:  install cameras around premises  Place fire extinguishers are sensitive material  Hire security guards  NETWORK LOCATIONS: SCHOOLS Network is unique because students need to be able to access it both on-campus and offcampus  Strong, but flexible firewall and proxy  Schools’ faculty should have responsibility of supervising the access of indecent websites  Children’s Internet Protection Act (CIPA) signed into law in December 2000:  protect students from viewing inappropriate content on the internet such as pornography  Filtering software on the internet browser   One similarity with other networks:  strong Antivirus program NETWORK LOCATIONS: GOVERNMENT Highest security and most complex  Strongest: Firewall; Proxy; Antivirus program  Strong encryption:  usually 256 bit key  Hides the information with a key  Example: used by military for covert operations   Wireless connection: Only selected people can access the network (President)  Area should be limited to the government property (White House)   Network should be invisible to the outside THE END Any Questions?