Download System Defense

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
System Defense
Defending Home Networks
Introduction
• Computer Security
• What it’s not
• Person, Place or Thing
• What it is
• Independent
– Of Network OS
– Of Host OS
– Of Application
• Process
• Achievable
Why Computer Security?
Data Integrity
Confidentiality
Availability
Non Repudiation
Identification
Authentication
Identify Risk
• Physical Access
• Humans
• Application Runtime
• Browser
• Email
• IM
• Network Access
Risk Vectors
Consol
Physical
Host
Removable
Media
Application
Browser
ICQ
IM
email
Network
FTP
SMTP
snmp
Defend Yourself
• Know your system
•
•
•
•
•
•
What it is
What’s on it
What Changes on it
Who is using it
Who can use it
Patch vulnerabilities
The Onion of Security
HARDWARE
File System
HOST
OS Config
App Config
LAN
WAN
Physical Protection
HARDWARE
File System
BIOS Password
File System
File Integrity
Anti Virus Scanner
File System
Encryption
HARDWARE
File System
Host Defenses
Host based Firewall
Host based IDS
HOST
OS Config
Configuration
Management
Auditing
Patch Maintenance
IP Restrictions
Backup
HARDWARE
Application Defenses
Configuration
File System
Patch
HOST
OS Config
App Config
Encrypt
Auditing
Access Control
HARDWARE
LAN Defenses
LAN Based IDS
File System
HOST
OS Config
Ensure Hosts
Authenticate
App Config
LAN
Router Based ACL
HARDWARE
WAN Defenses
File System
HOST
OS Config
App Config
LAN
Firewall
WAN
Filter Both Directions
Implement NAT
Router Based ACL
Resources
• Firewalls
• Linux
• Back it up with an IDS
• Tiny Firewall – www.tinysoftware.com
• Zonelabs – www.zonelabs.com
• Netscreen - www.netscreen.com
Resources
• IDS
• Port Sentry - www.psionic.com
• Snort – www.snort.org
• AracNIDS - http://www.whitehat.org
Resources
• Configuration advice
• Microsoft –
www.microsoft.com/technet/treeview/default.as
p?url=/technet/security/tools/tools.asp
• Linux –www.cert.org/securityimprovement/index.html
• Benchmark – www.cisecurity.org
Resources
• Vulnerability Awareness.
• www.securityfocus.com - Bugtrak.
• www.nessus.org – Nessus Scanner.
• www.sans.org/top20.htm - SANS/FBI Top 20
Vulnerabilities.
• www.cert.org - Carnegie Mellon CERT.
• www.nipc.gov/warnings/computertips.htm The National Infrastructure Protection
Center.
• Best Newsletter http://www.neohapsis.com/.
• http://www.cio.com/research/security.
Resources
• Encryption
• OpenPGP – www.openpgp.org
• File integrity
• MD5
• Tripwire www.tripwire.com/products/linux/
•
www.tripwire.org
• Port Scanner - NMAP – www.nmap.org
• AV Software - McAfee
• Pest Patrol
Q&A
Related documents