ensuring network security

33
Ensuring Network Security

Upload: hamlet

Post on 20-Jan-2016

46 views

Category:

Documents


0 download

DESCRIPTION

Ensuring Network Security. Planning for Security. 4 major threats Unauthorized access Electronic tampering Theft –data and hardware Intentional/unintentional damage. 10. Managing Security. Threat identification What am I trying to protect? What do I need to protect data from? - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Ensuring Network Security

Ensuring Network Security

Page 2: Ensuring Network Security

Planning for Security 4 major threats

Unauthorized access Electronic tampering Theft –data and hardware Intentional/unintentional damage

Page 3: Ensuring Network Security

Managing Security

10

Threat identificationWhat am I trying to protect?

What do I need to protect data from?

How likely is the threat?

What is the cost of breached security?

How can I protect data cost effectively?

Page 4: Ensuring Network Security

Helpful sites

CERT (Computer Emergency Response Team) http://www.cert.org

BugTraq Subscription service

Rootshell ( all systems large numbers of reports)

http://slashdot.org/articles/98/10/28/228210.shtml Security focus ( all systems)

http://www.securityfocus.com) http://cve.mitre.org/

Page 5: Ensuring Network Security

3 security traps

Security through obscurity works in the reverse

Social engineering, fishing for information does work, educate the users

Physical security, stops accidents and theft of data and parts

Page 6: Ensuring Network Security

Level of Security Setting Policies

Establish rules,regulations and policies Set the tone and guide the users

Train the users on the policies Prevention

Take a proactive approach Authentication

Keep the data safe from unauthorized access Network authentication is the first line

of defense

Page 7: Ensuring Network Security

Secure the Equipment Isolate and lockup servers

Protect from accidental and deliberate tampering

Secure the cables Keep intruders away from cable

Limit physical access to network Benefit of isolated cable is a reduction in

RFI

Page 8: Ensuring Network Security

•Security Models Password Protected Shares

Share level security Security information attached to resource Applies to every user of resource Windows 95 model

Access Permissions User level security Access to the resource is checked against a

user-access database on the server Users have passwords but resources have

permissions Assigning permissions is done through groups

Page 9: Ensuring Network Security

•Security Enhancements Firewalls

Combination of hardware and software Protection from external threat

Prevent direct communication with systems outside the network

Communication is routed through a proxy server Proxy filters and discards requests or data not considered

appropriate

Network activity is audited Tracks

Logon attempts- failed and successful Connection and disconnection from resources and systems Disables accounts Creation,deletion,opening and closing files Events and modifications, including password changes

Page 10: Ensuring Network Security

•Enhancements…. Diskless computers

Boot ROM on NIC No disk to store data or copy to and from

Data Encryption Best encryption is hardware based Translation standard is Data Encryption Standard

(DES) Specifies key to decryption Have to transfer key

Commercial COMSEC Endorsement Program (CCEP) Newer standard may replace DES Approved vendors can incorporate classified algorithms

in communication systems

Page 11: Ensuring Network Security

•Computer Viruses Boot sector virus

First sector of floppy or disk Executes on boot Copies to other media

File infector Activates when a file is used

Companion virus– uses name of real program with different extension

Macro virus- written as a macro for application Attaches to files accessed by the application

Polymorphic Virus- changes appearance on replication Stealth virus- hides from detection

Intercepts the probe and returns false information

Page 12: Ensuring Network Security

•Virus Propagation Internet has opened new pathways

for spread of viruses E-mail is major source

Sends itself to addresses in address books

Trojan horse temps victims Any means of information

exchange provides potential path

Page 13: Ensuring Network Security

•Consequences of Viruses System won’t boot Data is corrupted Erratic operation Lost partitions on disk Reformatted drive More than one misbehaving

workstations Denial of service attacks

Page 14: Ensuring Network Security

•Virus prevention Good antivirus software

Warn Stop activation Remove Repair Check spread

Prevention No unauthorized access Well planned access and privilege assignments User profiles Software load policy Virus protection rules and training

Page 15: Ensuring Network Security

Implementing SecuritySetup the security systemMake it as fool proof as possibleTrain network users about:

Why security existsHow to use securityConsequences of noncompliance

10

Page 16: Ensuring Network Security

Maintaining SecurityMonitor security to assure that:

It is accomplishing its goalsIt is working as intended

Modify as neededThe best laid plans……

10

Page 17: Ensuring Network Security

•Healthy Environment Recognize the effect of the

environment Climatic- cold, humidity, office

Degradation is usually over time not sudden

Page 18: Ensuring Network Security

•Create the Right Environment Temperature

Avoid cycles of hot and cold Humidity

High -Promotes corrosion and thus friction temperature

Low– promotes static discharge 50-70 percent is good

Dust and smoke Acts as insulator and conductor

Human factors Industrial Factors

Noise, EMI, vibration

Page 19: Ensuring Network Security

•Site Disaster Anything that causes you to lose data Recovery is hardware and DATA

replacement

Page 20: Ensuring Network Security

Avoiding Data LossTape backupUninterruptible power supply (UPS)Fault-tolerant systemsDisk mirroringDisk striping with parity

10

Page 21: Ensuring Network Security

Tape BackupFirst line of defense against data

lossRegular scheduled backupsSchedule, assign personnel, signoff logVerify success of backupUse a safe tape storage locationTest the restore ability of the tapes

10

Page 22: Ensuring Network Security

•Implementing Backup System If you can’t get along without it …

back it up Tape drive should have capacity to backup the

largest server Backup methods

Full-marks as backed up Copy- does not mark Incremental- backs up and marks files changed since

last backup Daily copy – modified that day, no mark Differential- changed since last backup no mark

Maintain a backup log

Page 23: Ensuring Network Security

UPSUninterruptible power supplyBattery to keep server running when power failsBuilt in conditioning & surge protectionNot for laser printers-high current draw

10

Page 24: Ensuring Network Security

UPS as Backup Power Source

19

Page 25: Ensuring Network Security

Fault Tolerant SystemsRaid technology

LevelsLevel 0 Striping

64k blocks divided equally across disk– no redundancy2-32 drivesLarge logical disk

Level 1 Disk mirroringTwo drives, single controller

Disk duplexingTwo drives, two controllersDisadvantage is disk space required

Level 2 Striping with ECCBlock is distributed across stripes

10

Page 26: Ensuring Network Security

Disk Striping Combines Areas on Multiple Drives

20

Page 27: Ensuring Network Security

Disk Mirroring Duplicates a Partition on Another Physical Disk

21

Page 28: Ensuring Network Security

•Raid continued Level 3 ECC as Parity

Requires parity disk Level 4 Disk striping with large blocks

Full block to each disk and parity disk Level 5 striping with parity

3-32 drives Parity written across all disks for each stripe

Level 10 Mirrored drive arrays Mirrored stripe set

Sector sparing Hot fix of bad sectors Utility to notify administrator

Page 29: Ensuring Network Security

Sector Sparing or Hot-Fixing Steps

22

Page 30: Ensuring Network Security

Fault Tolerant Systems

10

Page 31: Ensuring Network Security

Clustering Group of systems work as one using

shared devices. Control can be passed to another system if one system fails.

Clustering is an enhancement to fault tolerant systems not a replacement.

Page 32: Ensuring Network Security

Optical Drives and Disks Permanent backups

CD-Rom Most common form of optical ISO 9660 specification defines format standard 650 MB

DVD 5 formats

DVD-R- 3.95 GB single sided and 7.9 double WORM

MO- magneto-optical PCR- phase change rewritable

Page 33: Ensuring Network Security

Disaster Recovery Focus on factors you can control

Determine best prevention Enforce preventative measures Revise prevention measures Perform PM on hardware and software Train

Preparation Inventory- insurance and replacement Backup

Store offsite To recover from disaster:

Make a disaster-recovery plan Implement the plan TEST the plan!