Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends...

Post on 15-Jan-2016

218 views 0 download

Transcript of Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends...

Cou

rse

ILT

Security overview

Unit objectives Discuss network security Discuss security threat trends and

their ramifications Determine the factors involved in

creating a secure network strategy Control access to a Windows 2000

server

Cou

rse

ILT

Topic A

Topic A: Introduction to network security

Topic B: Understanding security threats

Topic C: Creating a secure network strategy

Topic D: Windows 2000 server access control

Cou

rse

ILT

Network security defined

Network security:– Process by which digital information

assets are protected

Goals of network security are to:– Protect confidentiality– Maintain integrity– Assure availability

Assessing risk– Identify threats– Reduce vulnerabilities

Cou

rse

ILT

Information Security

Tasks of guarding digital information, which is typically processed by a computer, stored on a magnetic or optical storage device (such as a hard drive or DVD), and transmitted over a network.

Cou

rse

ILT

An isolated computer

What security threat do we have?

Cou

rse

ILT

Connected to the Internet

What security threat do we have?

The InternetThe Internet

Cou

rse

ILT

Information vs. Network

Most of the threat are from the network, that is why we chose the name “Network Security” instead of “Information Security”.

But the intention is to secure the information.

Information is an asset that must be protected.

Cou

rse

ILT

Financial Loss

Without adequate protection or network security, a company is highly susceptible to a financial loss.

The fear of security breach can cause financial loss as an actual breach.

Cou

rse

ILT

Each attack costs $213,000

After an attack on information security, clean-up efforts divert resources, such as time and money away from normal activities

A Corporate IT Forum survey of major corporations showed:– Each attack costs a company an average

of $213,000 in lost man-hours and related costs

– One-third of corporations reported an average of more than 3,000 man-hours lost

Cou

rse

ILT

Information Security

Cou

rse

ILT

Threat vs. Vulnerability

A threat is defined as any activity that poses a danger to our information.

A vulnerability is a weakness in a system, such as misconfigured hardware or software, poor design, or end-user carelessness.

Threats exploit vulnerabilities in order to gain unauthorized access to a network.

Cou

rse

ILT

Effect of Evolving technologies

Mainframes LANs Firewalls Extranets Security systems

– Intrusion detection– Authentication– Authorization– Vulnerability assessment

Cou

rse

ILT

Security build Trust

Security is critical for all types of Internet business.

By protecting systems from intrusion and corruption, security technologies help companies build trust

A trust that information is protected and transactions are reliable

Cou

rse

ILT

Securing means Managing risk

Users can perform only authorized tasks

Users can obtain only authorized information

Users cannot damage data, applications, or operating environment

Cou

rse

ILT

Errors and Equipment Failures

Though “security” means protection against malicious attacks by outsiders.

Security also involves controlling the effects of errors and equipment failures.

Cou

rse

ILT

Goals of network security - CIA

The goal of implementing network security is to maintain an acceptable level of confidentiality, integrity and availability of information.

Confidentiality– Protection of data from unauthorized disclosure

to a third party

Integrity– Assurance that data is not altered or destroyed

in an unauthorized manner

Availability– Continuous operation of computing systems

Cou

rse

ILT

Topic B

Topic A: Introduction to network security

Topic B: Understanding security threats

Topic C: Creating a secure network strategy

Topic D: Windows 2000 server access control

Cou

rse

ILT

Price of Intrusion

Corporate espionage, – FBI estimates up to $100 billion loss

Identity theft – up to 700,000 Americans

Computer Viruses– up to $13.2 billion in 2001

– Lost revenues– Lost prestige– Lost productivity

Cou

rse

ILT

CERT Computer Emergency Response Team (CERT)

security organization compiles statistics regarding number of reported attacks, including:– Speed of attacks– Sophistication of attacks– Faster detection of weaknesses– Distributed attacks– Difficulties of patching

http://www.cert.org/ Established in 1988, the CERT® Coordination

Center (CERT/CC) is a center of Internet security expertise, located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.

Cou

rse

ILT

Sources of threats

Compromising of each of these three security goals can cost organization either – directly or – indirectly

There are four causes for compromised security:– Technology weaknesses– Configuration weaknesses– Policy weaknesses– Human error or malice

Cou

rse

ILT

Technology weaknesses

TCP/IP Operating systems Network equipment

Cou

rse

ILT

TECHNOLOGY WEAKNESSESare a part of each technology

TCP/IP

A communication protocoldesigned as an open standard.

Application

Presentation

Session

Transport

Network

Data Link

Physical

Cou

rse

ILT

TECHNOLOGY WEAKNESSESare a part of each technology

Operating Systems

Windows, Linux, Unix,

Each operating system has issues.

Cou

rse

ILT

TECHNOLOGY WEAKNESSESare a part of each system

Networking equipment

All networking equipment must be protected!

Passwords Firewalls

Protocols Authentication

Cou

rse

ILT

Configuration weaknesses

Unsecured accounts System accounts with easily guessed

passwords Misconfigured Internet services Unsecured default settings Misconfigured network equipment Trojan horse programs Vandals Viruses

Cou

rse

ILT

Policy weaknesses

Lack of a written security policy Politics High turnover Concise access controls not applied Software and hardware installation

and changes do not follow policy Proper security Nonexistent disaster recovery plan

Cou

rse

ILT

Human error and malice

Accident Ignorance Workload Dishonesty Impersonation Disgruntled employees Snoops Denial-of-service attacks

Cou

rse

ILT

Topic C

Topic A: Introduction to network security

Topic B: Understanding security threats

Topic C: Creating a secure network strategy

Topic D: Windows 2000 server access control

Cou

rse

ILT

Network security strategies

Achieve the state where any action that is not expressly permitted is prohibited

Address both internal and external threats

Define policies and procedures Reduce risk across perimeter security,

the Internet, intranets, and LANs

(continued)

Cou

rse

ILT

Network security strategies, continued

Human factors Knowing your weaknesses Limiting access Achieving security through persistence Physical security Perimeter security

(continued)

Cou

rse

ILT

Secure network strategy, cont’d

Firewalls Web and file servers Access control Change management Encryption Intrusion detection systems (IDS)

Cou

rse

ILT

Topic D

Topic A: Introduction to network security

Topic B: Understanding security threats

Topic C: Creating a secure network strategy

Topic D: Windows 2000 server access control

Cou

rse

ILT

Access control

Restricts access to a resource Security levels

– Identify– Authenticate– Authorize

Cou

rse

ILT

MAC, DAC and RBAC

Mandatory access control (MAC)– Non-discretionary control used in high-

security locations

Discretionary access control– Allows the owner of a file to dictate who

can access the file and to what extent

Role-based access control – Access is based on the role a user plays

in the organization

Cou

rse

ILT

Unit summary

Discussed network security Discussed the security threat trends

and their ramifications Discussed the goals of network

security and determined the factors involved in a secure network strategy

Discussed methods of access control and their implementation on a Windows 2000 server