lecture - 3 - layered approach to it security

15
Layered approach to Security © Intelligent Quotient System Pvt. Ltd.

Upload: -

Post on 02-Dec-2015

12 views

Category:

Documents


3 download

DESCRIPTION

IT

TRANSCRIPT

Page 1: Lecture - 3 - Layered Approach to IT Security

Layered approach to Security

© Intelligent Quotient System Pvt. Ltd.

Page 2: Lecture - 3 - Layered Approach to IT Security

Traditional approach to security

© Intelligent Quotient System Pvt. Ltd.

Page 3: Lecture - 3 - Layered Approach to IT Security

If you spend more on coffee than on IT security, then you will be hacked.What's more, you deserve to be hacked.

Richard Clarke, Special Adviser on cybersecurity to the US President.

© Intelligent Quotient System Pvt. Ltd.

Page 4: Lecture - 3 - Layered Approach to IT Security

Threat is everywhere

© Intelligent Quotient System Pvt. Ltd.

Page 5: Lecture - 3 - Layered Approach to IT Security

IT IS ABOUT MAINTAINING APPROPRIATE SECURITY

MEASURES AND PROCEDURES AT FIVE DIFFERENT

LEVELS WITHIN YOUR IT ENVIRONMENT

ALSO KNOWN AS “DEFENCE IN DEPTH”

Layered security approach

© Intelligent Quotient System Pvt. Ltd.

Page 6: Lecture - 3 - Layered Approach to IT Security

Perimeter Level

Perimeter is the first line of defense from

outside, un-trusted networks

First and last point of contact for security

defences protecting the network

It is the area where your network ends and the

Internet begins

E.g. Makemytrip.com server hack – revenue loss

© Intelligent Quotient System Pvt. Ltd.

Page 7: Lecture - 3 - Layered Approach to IT Security

Perimeter Level

Firewall

Network-based anti-virus

VPN encryption

© Intelligent Quotient System Pvt. Ltd.

Page 8: Lecture - 3 - Layered Approach to IT Security

Network Level

Internal LAN and WAN

May include desktops and servers

Once you break perimeter you are inside and

once inside, you can travel across the

network unimpeded

© Intelligent Quotient System Pvt. Ltd.

Page 9: Lecture - 3 - Layered Approach to IT Security

Network Level

Intrusion detection /prevention system

(IDS/IPS)

Vulnerability management system

Network Access Control

Access control /user authentication

© Intelligent Quotient System Pvt. Ltd.

Page 10: Lecture - 3 - Layered Approach to IT Security

Host Level

Individual devices on the network, such as servers, desktops,

switches, routers, etc.

Configuration parameters if set inappropriately, can create

exploitable security holes

Includes - registry settings, services (applications) operating on

the device or patches to the operating system or important

applications

Configured to meet the specific operational characteristics of a

single device

© Intelligent Quotient System Pvt. Ltd.

Page 11: Lecture - 3 - Layered Approach to IT Security

Host Level

Hardware Component

OS Security

Host IDS

Host vulnerability assessment (VA)

Network access control

Anti-virus

Access control/user authentication

© Intelligent Quotient System Pvt. Ltd.

Page 12: Lecture - 3 - Layered Approach to IT Security

Application Level

Poorly protected applications can provide easy access to confidential data and records

Hard truth - most programmers don’t code with security in mind

© Intelligent Quotient System Pvt. Ltd.

Page 13: Lecture - 3 - Layered Approach to IT Security

Application Level

Application shield

Access control/user authentication

Input validation

© Intelligent Quotient System Pvt. Ltd.

Page 14: Lecture - 3 - Layered Approach to IT Security

Data Level

Blend of policy and encryption

Access control/user authentication

© Intelligent Quotient System Pvt. Ltd.

Page 15: Lecture - 3 - Layered Approach to IT Security

© Intelligent Quotient System Pvt. Ltd.