is3220 information technology infrastructure security unit 2 network security basics

Post on 22-Feb-2016

336 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

IS3220 Information Technology Infrastructure Security Unit 2 Network Security Basics. EXPLORE: CONCEPTS. Learning Objective. Explain the fundamental concepts of network security. Key Concepts. Confidentiality, integrity, and availability mandates for network resource security - PowerPoint PPT Presentation

TRANSCRIPT

© ITT Educational Services, Inc. All rights reserved.

IS3220 Information Technology Infrastructure Security

Unit 2Network Security Basics

© ITT Educational Services, Inc. All rights reserved.Page 2IS3220 Information Technology Infrastructure Security

EXPLORE: CONCEPTS

© ITT Educational Services, Inc. All rights reserved.Page 3IS3220 Information Technology Infrastructure Security

Learning Objective

Explain the fundamental concepts of network security

© ITT Educational Services, Inc. All rights reserved.Page 4IS3220 Information Technology Infrastructure Security

Key Concepts Confidentiality, integrity, and availability

mandates for network resource security

Network security and its value to the enterprise

Roles and responsibilities in network security

Impact of network infrastructure design on security

Features, uses, and benefits of network security countermeasures

© ITT Educational Services, Inc. All rights reserved.Page 5IS3220 Information Technology Infrastructure Security

Primary Goals of Information Security

Confidentiality

Security

AvailabilityIntegrity

© ITT Educational Services, Inc. All rights reserved.Page 6IS3220 Information Technology Infrastructure Security

Secondary Goals of Information Security

Authentication

Authorization

Non-Repudiation

PrivacyConfidentiality

IntegrityAvailability

© ITT Educational Services, Inc. All rights reserved.Page 7IS3220 Information Technology Infrastructure Security

Seven Domains of a Typical IT Infrastructure

© ITT Educational Services, Inc. All rights reserved.Page 8IS3220 Information Technology Infrastructure Security

The Need for Information Security

Risk

Threat

Vulnerability

© ITT Educational Services, Inc. All rights reserved.Page 9IS3220 Information Technology Infrastructure Security

Information Assurance

Seven Domains of a Typical IT Infrastructure

Confid

entia

lityIntegrity

Availability

Non-repudiationAuthentication

© ITT Educational Services, Inc. All rights reserved.Page 10IS3220 Information Technology Infrastructure Security

Security Policy Establish goals

Address risk

Provide roadmap for security

Set expectations

Link to business objectives

Map of laws and regulations

Supported by standards, procedures, and guidelines

© ITT Educational Services, Inc. All rights reserved.Page 11IS3220 Information Technology Infrastructure Security

Examples of Network Infrastructures Workgroup

SOHO

Client/Server

© ITT Educational Services, Inc. All rights reserved.Page 12IS3220 Information Technology Infrastructure Security

General Terms Confidentiality Integrity Availability Trust Privacy Authentication Authorization Non-repudiation

© ITT Educational Services, Inc. All rights reserved.Page 13IS3220 Information Technology Infrastructure Security

Networking Terminology Network Firewall Router Virtual Private Network IPSec Demilitarized Zone Intrusion Detection System (IDS) Intrusion Prevention System (IPS)

© ITT Educational Services, Inc. All rights reserved.Page 14IS3220 Information Technology Infrastructure Security

EXPLORE: PROCESS

© ITT Educational Services, Inc. All rights reserved.Page 15IS3220 Information Technology Infrastructure Security

Policy, Awareness, and Training

Policy ~

− sets expectations

Awareness ~

− promotes security

Training ~

− defines roles and responsibilities

© ITT Educational Services, Inc. All rights reserved.Page 16IS3220 Information Technology Infrastructure Security

Security CountermeasuresCommon

Countermeasures Uses Benefits Limitations

Firewalls Filter traffic Segmentation

Hardware Software First defense Keep noise out

Perimeter defense Not content oriented Limited to yes or no

Virtual Private Network (VPN)

Remote access Encrypted tunnel

Private tunnel Extends Cover

Man-in-the-middle Not traffic oriented

Intrusion Detection/Prevention System

Monitor traffic May block attacks Host or Network

Notification Prevention

Relies on signatures False positives

© ITT Educational Services, Inc. All rights reserved.Page 17IS3220 Information Technology Infrastructure Security

Security Countermeasures (Continued)

Common Countermeasures

Uses Benefits Limitations

Data Loss Prevention Monitor data loss Block data loss

Sensitive Config Breach Notification

Signature reliant False positives Circumventable

Security Incident and Event Management

Aggregate sec logs Correlate sec logs

Monitor and review Generate alerts

False positives Data heavy Limit to log info

© ITT Educational Services, Inc. All rights reserved.Page 18IS3220 Information Technology Infrastructure Security

Security Countermeasures (Continued)

Common Countermeasures

Uses Benefits Limitations

Continuous Control Monitoring

Checks config Standard compliant Real time monitor

Automate monitors Self correction

Emerging tech Policy dependent

Vulnerability Assessment

Tests systems Proactive address Centralize tracking

Limited to known Create noise

© ITT Educational Services, Inc. All rights reserved.Page 19IS3220 Information Technology Infrastructure Security

EXPLORE: CONTEXT

© ITT Educational Services, Inc. All rights reserved.Page 20IS3220 Information Technology Infrastructure Security

Consider Business Requirements Availability of the network and its components

• Redundancy• High availability• Single point of failure• Denial of service

Sensitivity of the data• Encryption• Access control

© ITT Educational Services, Inc. All rights reserved.Page 21IS3220 Information Technology Infrastructure Security

Internet Exposure Remote access

• Will a VPN work?• Is direct internet access required?

© ITT Educational Services, Inc. All rights reserved.Page 22IS3220 Information Technology Infrastructure Security

Wired Networks Lack of external connectivity creates

physical isolation• Can rely on physical controls to protect network• External threats must breach physical barrier

If external connectivity is required• No control is the same as physical isolation but

security must enable the business• Consider segmentation• Rigorous front door screening

© ITT Educational Services, Inc. All rights reserved.Page 23IS3220 Information Technology Infrastructure Security

Benefits of Wireless Networking Can be inexpensive to deploy

• No need to run wires• Quick connectivity for multiple users

Convenience

Mobility

Ubiquity• All laptops now come equipped with wireless

© ITT Educational Services, Inc. All rights reserved.Page 24IS3220 Information Technology Infrastructure Security

Wireless Concerns Introduces new attack surface

• Require additional design considerations to mitigate attack

Data is transmitted over the air and accessible• Use of encryption technology • Consider implementing segmented wireless networks• Require VPN authentication for wireless access

Network can be directly accessed from a distance• Shielding

© ITT Educational Services, Inc. All rights reserved.Page 25IS3220 Information Technology Infrastructure Security

Mobile Networking Allows user to be completely mobile

Requires considerations for central management

Potential for device to be lost

top related