is3220 information technology infrastructure security unit 2 network security basics

25
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 2 Network Security Basics

Upload: kovit

Post on 22-Feb-2016

336 views

Category:

Documents


0 download

DESCRIPTION

IS3220 Information Technology Infrastructure Security Unit 2 Network Security Basics. EXPLORE: CONCEPTS. Learning Objective. Explain the fundamental concepts of network security. Key Concepts. Confidentiality, integrity, and availability mandates for network resource security - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.

IS3220 Information Technology Infrastructure Security

Unit 2Network Security Basics

Page 2: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 2IS3220 Information Technology Infrastructure Security

EXPLORE: CONCEPTS

Page 3: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 3IS3220 Information Technology Infrastructure Security

Learning Objective

Explain the fundamental concepts of network security

Page 4: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 4IS3220 Information Technology Infrastructure Security

Key Concepts Confidentiality, integrity, and availability

mandates for network resource security

Network security and its value to the enterprise

Roles and responsibilities in network security

Impact of network infrastructure design on security

Features, uses, and benefits of network security countermeasures

Page 5: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 5IS3220 Information Technology Infrastructure Security

Primary Goals of Information Security

Confidentiality

Security

AvailabilityIntegrity

Page 6: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 6IS3220 Information Technology Infrastructure Security

Secondary Goals of Information Security

Authentication

Authorization

Non-Repudiation

PrivacyConfidentiality

IntegrityAvailability

Page 7: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 7IS3220 Information Technology Infrastructure Security

Seven Domains of a Typical IT Infrastructure

Page 8: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 8IS3220 Information Technology Infrastructure Security

The Need for Information Security

Risk

Threat

Vulnerability

Page 9: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 9IS3220 Information Technology Infrastructure Security

Information Assurance

Seven Domains of a Typical IT Infrastructure

Confid

entia

lityIntegrity

Availability

Non-repudiationAuthentication

Page 10: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 10IS3220 Information Technology Infrastructure Security

Security Policy Establish goals

Address risk

Provide roadmap for security

Set expectations

Link to business objectives

Map of laws and regulations

Supported by standards, procedures, and guidelines

Page 11: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 11IS3220 Information Technology Infrastructure Security

Examples of Network Infrastructures Workgroup

SOHO

Client/Server

Page 12: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 12IS3220 Information Technology Infrastructure Security

General Terms Confidentiality Integrity Availability Trust Privacy Authentication Authorization Non-repudiation

Page 13: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 13IS3220 Information Technology Infrastructure Security

Networking Terminology Network Firewall Router Virtual Private Network IPSec Demilitarized Zone Intrusion Detection System (IDS) Intrusion Prevention System (IPS)

Page 14: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 14IS3220 Information Technology Infrastructure Security

EXPLORE: PROCESS

Page 15: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 15IS3220 Information Technology Infrastructure Security

Policy, Awareness, and Training

Policy ~

− sets expectations

Awareness ~

− promotes security

Training ~

− defines roles and responsibilities

Page 16: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 16IS3220 Information Technology Infrastructure Security

Security CountermeasuresCommon

Countermeasures Uses Benefits Limitations

Firewalls Filter traffic Segmentation

Hardware Software First defense Keep noise out

Perimeter defense Not content oriented Limited to yes or no

Virtual Private Network (VPN)

Remote access Encrypted tunnel

Private tunnel Extends Cover

Man-in-the-middle Not traffic oriented

Intrusion Detection/Prevention System

Monitor traffic May block attacks Host or Network

Notification Prevention

Relies on signatures False positives

Page 17: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 17IS3220 Information Technology Infrastructure Security

Security Countermeasures (Continued)

Common Countermeasures

Uses Benefits Limitations

Data Loss Prevention Monitor data loss Block data loss

Sensitive Config Breach Notification

Signature reliant False positives Circumventable

Security Incident and Event Management

Aggregate sec logs Correlate sec logs

Monitor and review Generate alerts

False positives Data heavy Limit to log info

Page 18: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 18IS3220 Information Technology Infrastructure Security

Security Countermeasures (Continued)

Common Countermeasures

Uses Benefits Limitations

Continuous Control Monitoring

Checks config Standard compliant Real time monitor

Automate monitors Self correction

Emerging tech Policy dependent

Vulnerability Assessment

Tests systems Proactive address Centralize tracking

Limited to known Create noise

Page 19: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 19IS3220 Information Technology Infrastructure Security

EXPLORE: CONTEXT

Page 20: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 20IS3220 Information Technology Infrastructure Security

Consider Business Requirements Availability of the network and its components

• Redundancy• High availability• Single point of failure• Denial of service

Sensitivity of the data• Encryption• Access control

Page 21: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 21IS3220 Information Technology Infrastructure Security

Internet Exposure Remote access

• Will a VPN work?• Is direct internet access required?

Page 22: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 22IS3220 Information Technology Infrastructure Security

Wired Networks Lack of external connectivity creates

physical isolation• Can rely on physical controls to protect network• External threats must breach physical barrier

If external connectivity is required• No control is the same as physical isolation but

security must enable the business• Consider segmentation• Rigorous front door screening

Page 23: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 23IS3220 Information Technology Infrastructure Security

Benefits of Wireless Networking Can be inexpensive to deploy

• No need to run wires• Quick connectivity for multiple users

Convenience

Mobility

Ubiquity• All laptops now come equipped with wireless

Page 24: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 24IS3220 Information Technology Infrastructure Security

Wireless Concerns Introduces new attack surface

• Require additional design considerations to mitigate attack

Data is transmitted over the air and accessible• Use of encryption technology • Consider implementing segmented wireless networks• Require VPN authentication for wireless access

Network can be directly accessed from a distance• Shielding

Page 25: IS3220 Information Technology Infrastructure  Security Unit 2 Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 25IS3220 Information Technology Infrastructure Security

Mobile Networking Allows user to be completely mobile

Requires considerations for central management

Potential for device to be lost