network security by quontra solutions uk

Post on 24-May-2015

66 Views

Category:

Documents

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

info@quontrasolutions.co.uk

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

QUONTRA SOLUTIONS

http://www.quontrasolutions.co.uk

Call us : 20-3734-1498/99

Network Security

Network Security

Security DevicesFirewallsNetwork Access SecurityUser AuthenticationDevice SecurityCommon Security Threats

info@quontrasolutions.co.uk

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Security DevicesExplain the function Of Hardware and

Software security devices.

Network Based Firewall Host Based FirewallIDS IPSVPN Concentrator

info@quontrasolutions.co.uk

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Host Based FirewallSoftware Based Protection on a

deviceSees all the TrafficDifficult to manage

large groups

info@quontrasolutions.co.uk

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Windows Firewall with Advanced Securityinfo@quontrasolutions.co.uk

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Network Based FirewallFilters Traffic By Port NumberCan Encrypt traffic in/out of the network.Can proxy trafficMost firewalls can be Layer 3 devices

(routers).

info@quontrasolutions.co.uk

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Network Based FirewallAdvantages

Protects many devices at onceHigh-speed

DisadvantagesLimited Visibility into encrypted Information

info@quontrasolutions.co.uk

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

IDS/IPSIntrusion Detection SystemIntrusion Prevention System

IntrusionsExploits against Operating Systems , applications

etc.Bufferoverflows and other vulnerabilities

Detection Vs PreventionDetection – Alarm or AlertPrevention – Stop it before it gets into the network.

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

IDS/IPSAdvantages

Watches all traffic through a network linkCan completely stop bad traffic

DisadvantagesLimited Visibility into encrypted DataYet Another device on the Network

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

VPN concentrator

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Identify Common Security Threats and Mitigations

Security ThreatsDos ,viruses, worms ,attackers ,Man in

the middle attack ,Smurf ,Social engineering (phishing)

Mitigation TechniquesPolicies and Procedures ,user

training ,patch and updates

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Denial Of ServiceAnything that prevents a device from providing

normal services

DoS /DDoS Denial Of Service /Distributed Denial of service

Smurf AttacksPing sents to a broadcast address were

duplicated to all IP addresses on the subnets by the routers We fixed that in 1999

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Viruses and WormsViruses infect files and duplicate by

copying themselves with other documents

Worms don’t need any other files or programs in order to infect other devices

Malware is a catch-all term for viruses ,spywares , adwares ,worms and other bad stuff

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Man in the Middle AttackA form of electronic eavesdropping

Especially useful for encrypted communication

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Man in the Middle AttackA form of electronic eavesdropping

Especially useful for encrypted communication

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Social EngineeringMajor Threats

Electronically UndetectableSuspicious Telephone Call

Don’t give any information over the Telephone

Look out for unattended personsBadgesProcesses

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Phishing Electronic Version Of Social Engineering

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Mitigation Techniques

Policies and Procedures

User Training

Patches and Updates

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

SummaryDoS (Denial Of Service) or DDoS

(Distributed DoS) prevent a device from providing normal services.

Man in the Middle Attack method can hackers use to intercept encrypted communication between stations

Phishing is the electronic method of social engineering to gather personal information.

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

info@quontrasolutions.co.uk

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

TO KNOW MORE IN-DEPTH KNOWLEDGE CONTACT US

Call : 20-3734-1498/99

 Email: info@quontrasolutions.co.uk

http://www.quontrasolutions.co.uk

QUONTRA SOLUTIONS

top related