Deployment Guide - Web Security, Email Security, Data Security
UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to...
-
Upload
angelica-myra-gilmore -
Category
Documents
-
view
215 -
download
0
Transcript of UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to...
![Page 1: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/1.jpg)
UNIT 6 SEMINAR
Unit 6Unit 6Chapter 6 in CompTIA Security Chapter 6 in CompTIA Security
++
Course Name – IT286-01 Introduction to Network SecurityInstructor – Jan McDanolds, MS, Security+Contact Information: AIM – JMcDanolds Email – [email protected] Hours: Tuesday, 7:00 PM ET or Wednesday, 8:00 PM ET
1
![Page 2: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/2.jpg)
CHAPTER 5 REVIEW
What did we cover last time?
Implementing and Maintaining a Secure NetworkOverview of Network Security ThreatsDefining Security BaselinesHardening the OS and NOSHardening Network DevicesHardening Applications
Now, on to a little light network checking…
2
![Page 3: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/3.jpg)
CHAPTER 5 REVIEW
Basic TCP/IP Utilities
Open Command Prompt (in Accessories in Windows)
ipconfig /allping (ip address)
Tracert (ip address) Do a quick ipconfig /all Find your DNS Servers – ip addressesWrite them down. Ping www.bing.com Next use tracert on Bing’s ip address Write down cities shown in the hops – ex: Cincinnati, San Francisco,
San JosePing (your DNS server ip address) - reply?
3
![Page 4: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/4.jpg)
CHAPTER 5 REVIEW
Nmap video
No sound, shows an internal scan.
Pause at 28 seconds
4
http://www.youtube.com/watch?v=uDbEfeVtIko&feature=related
![Page 5: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/5.jpg)
CHAPTER 5 REVIEW
Defcon - Nmap and Hping http://defcon.org/DEFCON 2010http://www.youtube.com/watch?v=jJDCxzKmROY&feature=relatedDEFCON 19: Nmap: Scanning the Internet – port scanning http://nmap.org/45 minute Fyodor talk about features of Nmap at DEF CON 2008http://www.youtube.com/watch?v=Hk-21p2m8YY&feature=relatedNmap project – Fyodor – developer of Nmap
Hping - Video - Using Security Tools - Hping3 - Linuxhttp://www.youtube.com/watch?v=fagjmQi-sBYhttp://www.hping.org/hping is a command-line oriented TCP/IP packet assembler/analyzer. Supports ICMP echo requests, TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, ability to send files between a covered channel, etc. Use it for penetration testing. 7 minutes
5
![Page 6: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/6.jpg)
CHAPTER 5 REVIEW
Review of Types of ToolsPaper by Boyd Aaron Sigmon – “Hacking Tools & Techniques and How to
Protect Your Network from Them” download in Doc Sharing
1. Port scanners2. Vulnerability scanners3. Packet sniffers (protocol analyzers)4. Root kits5. Password crackers6. Social engineering
6
![Page 7: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/7.jpg)
CHAPTER 6 OVERVIEW
Securing the Network and Environment
Understanding Physical and Network Security
Understanding Business Continuity Planning (BCP)
Developing Policies, Standards, and Guidelines
Working with Security Standards and ISO 17799
Classifying Information
7
![Page 8: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/8.jpg)
CHAPTER 6
Story – Physical SecurityMasked gunmen rob Fremont technology firmBy: The Associated Press 03/01/11 12:27 PM The Associated Press
Authorities are investigating an armed robbery at a Fremont technology firm by 15 masked gunmen who made off with computer parts. Fremont police say the robbers tied up, blindfolded and gagged several employees on the loading dock of Unigen Corp. on Sunday morning. They were wearing matching black clothing and armed with automatic rifles and handguns. Sgt. Chris Mazzone says the robbers spent a half-hour loading computer parts into a truck. One of the employees was able to get free and call police after the robbers left. Mazzone called the heist sophisticated and says the victims only were able to say that the robbers were all male. Unigen is still conducting an inventory to determine exactly what was stolen. Unigen manufactures memory chips among other products.
8
![Page 9: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/9.jpg)
CHAPTER 6
Physical and Network Security
Implementing Access ControlPhysical Barriers - three-layer securityBiometrics – biological trait
Understanding Social Engineering – Kevin Mitnick, The Art of Deception
Scanning the Environment – wireless cells, physical location (HVAC and power)
Shielding – EMI and RFIFire Suppression – fire extinguishers and fixed systems
9
![Page 10: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/10.jpg)
CHAPTER 6
Social Engineering
The Art of Deception by Kevin MitnickChapter 10 – Entering the PremisesSecurity Guard – Leroy GreeneJoe Harper – What did he do prior to the incident?
You can also see a video of Kevin Mitnick on CNN discussing hacking sites. http://www.cnn.com/video/#/video/tech/2011/01/26/nr.internet.security.hacker.cnn?iref=allsearch
You can download a copy of the Art of Deception ebook available at:http://www.taintedthoughts.com/user/perfect_flaw/Kevin%20Mitnick%20-%20The%20Art%20Of%20Deception.pdf
10
![Page 11: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/11.jpg)
CHAPTER 6
Business Continuity Planning (BCP)
Business Impact Analysis (BIA)Critical Function IdentificationPrioritization of CBF (Critical Business Functions)Timeframe of Critical Systems LossEstimate Tangible and Intangible Impact on the Organization(download Business Continuity Sample plan in Doc Sharing)
Assessing RiskRisks to Which the Organization Is ExposedRisks That Need AddressingCoordination with BIA
SLE (single loss expectancy)ALE (annual loss expectancy)ARO (annualized rate of occurrence)
11
![Page 12: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/12.jpg)
CHAPTER 6
Policies, Standards and Guidelines
Implementing PoliciesScope StatementPolicy Overview StatementPolicy StatementsAccountability StatementException Statement
12
![Page 13: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/13.jpg)
CHAPTER 6
Policies, Standards and Guidelines (cont.)
Incorporating StandardsScope and PurposeRole and ResponsibilitiesReference DocumentsPerformance CriteriaMaintenance and Administrative Requirements
Following GuidelinesScope and PurposeRoles and ResponsibilitiesGuideline StatementsOperational Considerations
13
![Page 14: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/14.jpg)
CHAPTER 6
Security Standards and ISO 17799
Communications and Ops MgtAccess ControlInfo Systems Acquisition, Development and MaintenanceInfo Security Incident MgtBusiness Continuity Mgt (BCM)Compliance
14
Code of Practice for Information Security ManagementThe ISO 27002 (formerly 17799) security standards represent one approach to security policy construction.
11 Areas of Focus:Security PolicySecurity OrganizationAsset ManagementHuman Resources/Personnel SecurityPhysical and Environmental Security
![Page 15: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/15.jpg)
CHAPTER 6
Classifying Information
Public InformationLimited Distribution - Full Distribution
Private InformationInternal Information - Restricted Information
Government and Military Classifications
Roles in the Security ProcessOwnerCustodianUserSecurity professionalAuditor
15
![Page 16: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/16.jpg)
CHAPTER 6
Classifying Information
Classification of information in a secure network: Public, Internal and Restricted
Information Access Controls: Bell La-Padula ModelBiba ModelClark-Wilson ModelInformation Flow ModelNoninterference Model
16
![Page 17: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/17.jpg)
CHAPTER 6
Unit 6 Project AssignmentUnit Six Project: Formulate a logical solution to a company’s problems.
The company is Web Site 101
You are an IT security professional for Web Site 101. It has 300 employees, one large corporate office with 3 floors. Security problems have caused the CISO (chief information security officer) to ask you to write a security recommendation.
17
![Page 18: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+](https://reader036.fdocuments.in/reader036/viewer/2022062422/56649e6c5503460f94b6bda1/html5/thumbnails/18.jpg)
CHAPTER 6
Unit 6 Project AssignmentProblems: 1 There has been data loss due to employee negligence 2 Physical break ins 3 Employees complain they don’t understand what is expected of them from a security standpoint 4 The network administrators complain the company allows free access to anything on the network for anyone who asks 5 Web Site 101 home web page was recently hacked.
18
Develop a recommendation to cover access control methods, physical access controls, risk assessment and environmental controls and other items you feel important to ensure future information security at Web Site 101.