Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Security-focused operating system wikipedia , lookup
Deep packet inspection wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Network tap wikipedia , lookup
Computer security wikipedia , lookup
Mobile security wikipedia , lookup
Wireless security wikipedia , lookup
Distributed firewall wikipedia , lookup
Unix security wikipedia , lookup
NETWORK SECURITY Presented by: Brent Vignola MATERIAL OVERVIEW… Basic security components that exist in all networks Authentication Firewall Intrusion prevention system Antivirus program Honeypots General locations where networks exist, the security required in each, and how to manage each Homes Small businesses Large businesses Schools Government BASIC SECURITY COMPONENTS: AUTHENTICATION Establish as genuine Authorize Validate Usually in the form of an ID and password Example: Ecom user name and password to log on to university computers BASIC SECURITY COMPONENTS: FIREWALL Prevents unauthorized access to and from a network Considered to be the first line of defense in protecting information on the network Different methods of a firewall: Packet-filter: examines every packet that enters and leaves the network Application gateway: security directly to an application such as FTP Circuit-level gateway: used while a connection is being established Proxy server: improves network performance by filtering requests; all requests go through proxy before reaching the real network BASIC SECURITY COMPONENTS: INTRUSION PREVENTION SYSTEM Detection of malware that has entered the network and of suspicious activity on the network Network-based IPS: Designed to examine, identify, and report For example: the IPS… Examines the network Identifies a worm on the network Reports the finding to the user Three types of the network-based IPS: Content-based: examines each packet entering the network for any unique areas (called signatures) Protocol analysis: decodes the protocol to find anything out of the norm Rate-based: prevents Denial of Service attacks DoS: malicious attack that is designed to bog-down the traffic BASIC SECURITY COMPONENTS: ANTIVIRUS PROGRAM Scans the files on the computer for viruses and malware Two ways to scan: Virus dictionary approach: keeps a database of known viruses Suspicious behavior approach: monitors the performance of all programs Once scan is complete there are 3 options to fix files: Repair the file: removes the virus portion of the file Remove the file: removing the file completely if repairing cannot be done Quarantine the file: “cover” the file so the virus cannot spread to other files and so the file cannot be accessed by other programs BASIC SECURITY COMPONENTS: HONEYPOT Decoy on the network Used to distract attackers from the actual network May look like the actual network May “appear” to have valuable information Most of the time it is a computer But may be: An unused IP address Files Data records Two types: Production: help alleviate the risk to a business Research: learn how and why attackers enter the network NETWORK LOCATIONS: HOMES Simplest network Lowest level of security Basic firewall Basic Antivirus program Strong password for wireless connection Wireless connection should be set to at least WPA or WPA2 NETWORK LOCATIONS: SMALL BUSINESSES More complex than home networks Higher level of security than home networks Stronger firewall and Antivirus program than home networks Similarity with home network: Strong password for wireless connection Strong authentication method: ID and password for employees Password should be updated on a monthly basis Packet analyzer should be implemented: Examines each packet that enters the network and analyzes its content Increase employee awareness of physical security: Log-off computers; shut-down computers; lock office doors NETWORK LOCATIONS: LARGE BUSINESSES Similarities with small business networks: Strong firewall and Antivirus program Strong password for authentication and wireless devices Implementation of packet analyzer Increase employee awareness of physical security Additional security: Proxy server: implemented to improve performance by filtering requests Authentication: passwords should be updated biweekly Physical security: install cameras around premises Place fire extinguishers are sensitive material Hire security guards NETWORK LOCATIONS: SCHOOLS Network is unique because students need to be able to access it both on-campus and offcampus Strong, but flexible firewall and proxy Schools’ faculty should have responsibility of supervising the access of indecent websites Children’s Internet Protection Act (CIPA) signed into law in December 2000: protect students from viewing inappropriate content on the internet such as pornography Filtering software on the internet browser One similarity with other networks: strong Antivirus program NETWORK LOCATIONS: GOVERNMENT Highest security and most complex Strongest: Firewall; Proxy; Antivirus program Strong encryption: usually 256 bit key Hides the information with a key Example: used by military for covert operations Wireless connection: Only selected people can access the network (President) Area should be limited to the government property (White House) Network should be invisible to the outside THE END Any Questions?