securing the infrastructure using ids

10
4/17/20142014/4/17 Network Security By RUBAN D System Team

Upload: ruban-deventhiran

Post on 17-Feb-2017

220 views

Category:

Engineering


4 download

TRANSCRIPT

Page 1: Securing the infrastructure using IDS

4/17/20142014/4/17

Network Security

By

RUBAN D

System Team

Page 2: Securing the infrastructure using IDS

4/17/20142014/4/17

Security Overview!

What is Security Major threat to Security Importance of having IDS inside security Tools used in IDS Security Onion - an Overview Practical Scenarios with Security Onion Conclusion

Page 3: Securing the infrastructure using IDS

4/17/20142014/4/17

Network Security Monitoring

Page 4: Securing the infrastructure using IDS

4/17/20142014/4/17

THREATS

Viruses

Virus back doors

Password Attacks

Sniffers

Worms

Penetrations

DOS

Malicious Websites

Page 5: Securing the infrastructure using IDS

4/17/20142014/4/17

Need For IDS

Antivirus vs Firewall vs IDS

Page 6: Securing the infrastructure using IDS

4/17/20142014/4/17

Tools Used in IDS

• Snort now Snorby • Squil • Sqert • ElSA • Wireshark • BRO • OSSEC • Last but not least - "Nmap"

Page 7: Securing the infrastructure using IDS

4/17/20142014/4/17

Security Onion

Security Onion is a FREE Linux distro for Network Security Monitoring (NSM) Security Onion is primarily for:

intrusion detection network security monitoring log management

Security onion How it helps analyst: • Was an EXE downloaded? • Was it executed? • Was the computer compromised?

Page 8: Securing the infrastructure using IDS

4/17/20142014/4/17

Page 9: Securing the infrastructure using IDS

4/17/20142014/4/17

Page 10: Securing the infrastructure using IDS

4/17/20142014/4/17

Thank you Thank you