network security by quontra solutions uk

20
[email protected] ww.quontrasolutions.co.uk Call us : 20-3734-1498 QUONTRA SOLUTIONS http://www.quontrasolutions.co.uk Call us : 20-3734-1498/99 Network Security

Upload: quontra-solutions

Post on 24-May-2015

66 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Network security by quontra solutions uk

[email protected]

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

QUONTRA SOLUTIONS

http://www.quontrasolutions.co.uk

Call us : 20-3734-1498/99

Network Security

Page 2: Network security by quontra solutions uk

Network Security

Security DevicesFirewallsNetwork Access SecurityUser AuthenticationDevice SecurityCommon Security Threats

[email protected]

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 3: Network security by quontra solutions uk

Security DevicesExplain the function Of Hardware and

Software security devices.

Network Based Firewall Host Based FirewallIDS IPSVPN Concentrator

[email protected]

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 4: Network security by quontra solutions uk

Host Based FirewallSoftware Based Protection on a

deviceSees all the TrafficDifficult to manage

large groups

[email protected]

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 5: Network security by quontra solutions uk

Windows Firewall with Advanced [email protected]

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 6: Network security by quontra solutions uk

Network Based FirewallFilters Traffic By Port NumberCan Encrypt traffic in/out of the network.Can proxy trafficMost firewalls can be Layer 3 devices

(routers).

[email protected]

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 7: Network security by quontra solutions uk

Network Based FirewallAdvantages

Protects many devices at onceHigh-speed

DisadvantagesLimited Visibility into encrypted Information

[email protected]

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 8: Network security by quontra solutions uk

IDS/IPSIntrusion Detection SystemIntrusion Prevention System

IntrusionsExploits against Operating Systems , applications

etc.Bufferoverflows and other vulnerabilities

Detection Vs PreventionDetection – Alarm or AlertPrevention – Stop it before it gets into the network.

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 9: Network security by quontra solutions uk

IDS/IPSAdvantages

Watches all traffic through a network linkCan completely stop bad traffic

DisadvantagesLimited Visibility into encrypted DataYet Another device on the Network

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 10: Network security by quontra solutions uk

VPN concentrator

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 11: Network security by quontra solutions uk

Identify Common Security Threats and Mitigations

Security ThreatsDos ,viruses, worms ,attackers ,Man in

the middle attack ,Smurf ,Social engineering (phishing)

Mitigation TechniquesPolicies and Procedures ,user

training ,patch and updates

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 12: Network security by quontra solutions uk

Denial Of ServiceAnything that prevents a device from providing

normal services

DoS /DDoS Denial Of Service /Distributed Denial of service

Smurf AttacksPing sents to a broadcast address were

duplicated to all IP addresses on the subnets by the routers We fixed that in 1999

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 13: Network security by quontra solutions uk

Viruses and WormsViruses infect files and duplicate by

copying themselves with other documents

Worms don’t need any other files or programs in order to infect other devices

Malware is a catch-all term for viruses ,spywares , adwares ,worms and other bad stuff

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 14: Network security by quontra solutions uk

Man in the Middle AttackA form of electronic eavesdropping

Especially useful for encrypted communication

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 15: Network security by quontra solutions uk

Man in the Middle AttackA form of electronic eavesdropping

Especially useful for encrypted communication

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 16: Network security by quontra solutions uk

Social EngineeringMajor Threats

Electronically UndetectableSuspicious Telephone Call

Don’t give any information over the Telephone

Look out for unattended personsBadgesProcesses

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 17: Network security by quontra solutions uk

Phishing Electronic Version Of Social Engineering

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 18: Network security by quontra solutions uk

Mitigation Techniques

Policies and Procedures

User Training

Patches and Updates

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 19: Network security by quontra solutions uk

SummaryDoS (Denial Of Service) or DDoS

(Distributed DoS) prevent a device from providing normal services.

Man in the Middle Attack method can hackers use to intercept encrypted communication between stations

Phishing is the electronic method of social engineering to gather personal information.

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

Page 20: Network security by quontra solutions uk

[email protected]

www.quontrasolutions.co.uk Call us : 20-3734-1498/99

TO KNOW MORE IN-DEPTH KNOWLEDGE CONTACT US

Call : 20-3734-1498/99

 Email: [email protected]

http://www.quontrasolutions.co.uk

QUONTRA SOLUTIONS