system defense

18
System Defense Defending Home Networks

Upload: martha-horn

Post on 30-Dec-2015

24 views

Category:

Documents


1 download

DESCRIPTION

System Defense. Defending Home Networks. Introduction. Computer Security What it’s not Person, Place or Thing What it is Independent Of Network OS Of Host OS Of Application Process Achievable. Why Computer Security?. Data Integrity Confidentiality Availability Non Repudiation - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: System Defense

System Defense

Defending Home Networks

Page 2: System Defense

Introduction

• Computer Security• What it’s not

• Person, Place or Thing

• What it is• Independent

– Of Network OS– Of Host OS– Of Application

• Process• Achievable

Page 3: System Defense

Why Computer Security?

Data IntegrityConfidentialityAvailabilityNon RepudiationIdentificationAuthentication

Page 4: System Defense

Identify Risk

• Physical Access• Humans

• Application Runtime• Browser

• Email

• IM

• Network Access

Page 5: System Defense

Risk Vectors

Browser

Consol

PhysicalHost

RemovableMedia

Application

FTP SMTP snmpICQIM

Network

email

Page 6: System Defense

Defend Yourself

• Know your system• What it is

• What’s on it

• What Changes on it

• Who is using it

• Who can use it

• Patch vulnerabilities

Page 7: System Defense

The Onion of SecurityHARDWARE

File System

HOSTOS Config

App Config

LAN

WAN

Page 8: System Defense

HARDWARE

File System

File SystemPhysical Protection

BIOS Password

File Integrity

Anti Virus Scanner

File System Encryption

Page 9: System Defense

Host DefensesHARDWARE

File System

HOSTOS Config

Host based Firewall

Host based IDS

Configuration Management

Patch Maintenance

Auditing

IP Restrictions

Backup

Page 10: System Defense

Application DefensesHARDWARE

File System

HOSTOS Config

App Config

Configuration

Patch

Encrypt

Auditing

Access Control

Page 11: System Defense

LAN Defenses

HARDWARE

File System

HOSTOS Config

App Config

LAN

LAN Based IDS

Ensure Hosts Authenticate

Router Based ACL

Page 12: System Defense

WAN Defenses

HARDWARE

File System

HOSTOS Config

App Config

LAN

WAN

Router Based ACLFilter Both Directions

Implement NAT

Firewall

Page 13: System Defense

Resources

• Firewalls• Linux

• Back it up with an IDS

• Tiny Firewall – www.tinysoftware.com

• Zonelabs – www.zonelabs.com

• Netscreen - www.netscreen.com

Page 14: System Defense

Resources

• IDS• Port Sentry - www.psionic.com

• Snort – www.snort.org

• AracNIDS - http://www.whitehat.org

Page 15: System Defense

Resources

• Configuration advice• Microsoft –

www.microsoft.com/technet/treeview/default.asp?url=/technet/security/tools/tools.asp

• Linux –www.cert.org/security-improvement/index.html

• Benchmark – www.cisecurity.org

Page 16: System Defense

Resources

• Vulnerability Awareness.• www.securityfocus.com - Bugtrak.• www.nessus.org – Nessus Scanner.• www.sans.org/top20.htm - SANS/FBI Top 20 Vulnerabilities.• www.cert.org - Carnegie Mellon CERT.• www.nipc.gov/warnings/computertips.htm - The National Infrastructure Protection Center.

• Best Newsletter - http://www.neohapsis.com/.

• http://www.cio.com/research/security.

Page 17: System Defense

Resources• Encryption

• OpenPGP – www.openpgp.org

• File integrity• MD5• Tripwire - www.tripwire.com/products/linux/

• www.tripwire.org• Port Scanner - NMAP – www.nmap.org• AV Software - McAfee• Pest Patrol

Page 18: System Defense

Q&A