SlideShare una empresa de Scribd logo
1 de 8
Network Security


ABSTRACT
       The biggest threat to network security is underestimating the threat to network
security. And as IP networks become the defector standard, ignoring this reality can extract a
heavy price down the road.
       The truth of the matter is that current security technologies pose an unacceptable risk
in protecting an organization’s data and intellectual property. Today’s firewall-based security
technologies do not fully protect data resources. Only data protection throughout the network
can safeguard critical and confidential data, regardless of the success or failure of other
security technologies and policies. Therefore, data protection must be the primary layer of
defense.
       As hacking and security threats grow in complexity and organizations face stringent
requirements to document access to private data on the network, organizations require a new
level of network visibility and surveillance.

       The world of network security has become an “arms race”. As organizations tighten
their external defenses and install improved security tools, threats and attacks emerge to
circumvent these security measures. Increasingly, this arms race is taking place in a regulated
environment, where government rules such as HIPAA, Sarbanes-Oxley, and the EU Data
Protection Directive require organizations to control access to private data and document
security breaches.

       This includes the following.
               •Identify the need for a network security camera to capture and save all
                 network transactions and activities
               •Illustrate how network security forensic appliances provide new visibility and
                 evidence for security and compliance investigations
               •Highlight real-world examples from clients demonstrating the role network
                security forensics plays in identifying security and compliance violations
               •Providethekeycomponentstolookforinanynetworksecurityforensicssolution
Network security helps investigation.
            Network policy violation.
            Compliance violation
 Access violation
              Security violation
Where network security is needed:
       •Monitoring internal threats
       •Documenting evidence for investigations
       •Solving the “Who done it” mystery
       •Complying with government regulations such as HIPAA, SOX, and the EU
         data Protection Directive
       •Complying with corporate HR and network- use policies
Data in motion: what’s the worst that could happen?
       Networks today are not the isolated, self-contained islands they once were. With
internet gateways giving network access to remote employees, customers, contractors and
partners, the network has opened up, increasing productivity and security risks.
       Network security has relied primarily on keeping the bad guys out. Hackers, thieves
and other ne’er-do-wells seeking to do harm are prevented from getting in, most of the time.
However, the nature of networks today is dynamic. While data may spend some time on any
number of devices – servers, desktops, disk arrays – some of it is in motion, travelling across
the network, all the time. That data zipping around the network is the same data that is
thoroughly protected while static. And it is more often than not completely unprotected while
in motion.
       Data residing on desktops, laptops and servers is usually protected with at least a
password, if not more complex security. While always a good idea, it should not be enough to
ensure a good night’s sleep for IT security.
       So much for perimeter defence and ID management as a comprehensive network
security strategy.
       There are any numbers of reasons your information may be an attractive target:
• Intellectual property – your organization’s “special sauce” that gives you critical market
 differentiation and a leg up on the competition.
• Customer information – personal, financial and/or health information can be very valuable.
 In fact, protecting that information has spawned a growing number of federal and state
regulations, including Gramm-Leach-Bliley, Sarbanes-Oxley and California Senate Bill 1386
• Employee information – personal information such as Social Security
 numbers, bank account numbers and health information
• Other secret information – including governmental information regarding
 homeland or national security, Department of Defense activities or
 communications, and personal, private data used by any number of agencies
• Business-enabling information – customer and prospect opportunities, plans
 and interactions
All networks are untrusted
          Most enterprises and organizations with far-flung offices, remote back-up data centers
and multiple buildings in a campus setting have a complex network to meet all of their
communication and business needs. more than a single network, it is usually a network of
networks that must communicate and share data with one another. This creates a situation
where data is physically leaving a protected facility and moving to another. Whether it’s
going over the Internet, a service provider backbone or a wireless link between buildings, that
data, which has been protected while at rest on servers, has moved out to where it is available
to anyone with the motivation and means to get it.
          If we take a look at a layered approach to network security, data protection, along
with ID management and perimeter technologies, provide the three anchors that protect all
aspects of the network: data and intellectual property, networking infrastructure and people.




Examples of common networks where data in transit is susceptible to unauthorized
access.
Broadband wireless link between buildings
          Many organizations have multiple networks in different facilities that must exchange
information. When fibre is impossible or too cost-prohibitive, high-speed wireless provides
an inexpensive and easy solution. However, all data transmitted over the air through the
wireless links is at risk to anyone wanting to access it.


Broadband wireless link between buildings




Storage IP Networking

       It is becoming increasingly common for organizations to store and archive their data
in a remote facility. Once again, however, this data must travel over entrusted networks to
reach its destination, meaning it could be accessed without anyone knowing it.




MPLS
       MPLS (multi-protocol label switching) networks are becoming more and more
popular as service providers look for ways to enable multiple customers to have VPNs on the
same network. However, the VPNs on the MPLS network simply separate user groups, they
don’t protect the data.
Data protection – the primary layer of defense
       Your data is running around the network in packets that contain addresses, protocol
ids, and the actual data. If you protect the packet from its source to its destination you have
created an excellent foundation for a secure network.
       There are three main aspects of data protection on the network:
               • Confidentiality – Keep your data private
               • Authentication – Trust your sources
               • Integrity—Trust your data
       IP Security (IPSec), defined by the Internet Engineering Task Force (IETF), is the
accepted standard for protecting data in transit over an untrusted network and provides the
three levels of security. IPSec is a suite of security protocols that protects IP packets.

       IPSec works on Layer 3, the network layer of the Open Systems interconnection 7-
layer networking model. By running on Layer 3, IPSec is able to function transparently to
higher layer applications; the applications do not require any knowledge of IPSec in order to
use it. By enabling IPSec everywhere on the network that sensitive data travels, the
vulnerability of data traveling in the clear is eliminated.
IPSec modes of protection
       IPSec protects IP packets by defining which traffic is to be protected, IPSec uses a
protocol called Encapsulating Security Payload (ESP) that provides proof of data integrity,
data source authentication and anti-replay by inserting a new IP address and ESP header in
front of the packet to be protected. This protects the entire IP packet including the originating
IP address. Using ESP controls both the encryption and authentication used to protect the IP
payload.
Tunnel mode




ESP (encapsulating security payload)
_ Data integrity + authentication
_ Anti-replay service
_ Confidentiality




IPSec encryption
       IPSec encryption enables confidentiality of data as it travels on the network.




       • Uses symmetric keys (same keys are used for encryption and decryption)
       • Uses Diffie-Hellman algorithms and IKE/ISAKMP protocols to derive keys
       • Encryption algorithms such as AES(Advanced Encryption Standard)


Cipher Optics enables IPSec everywhere
       There are several ways to enable IPSec on the network. The Cipher Optics approach
is to use purpose-built appliances designed for Fast Ethernet and Gigabit Ethernet IP
networks. With its proprietary TILEA™ architecture, Cipher Optics appliances are paving
the way for IPSec everywhere.
To show how Cipher Optics IPSec appliances provide data protection is shown in
figure below,




Internet Key Exchange (IKE)
       IKE is used to ensure security for virtual private network negotiation and remote host
or network access. IKE defines an automatic means of negotiation and authentication for
IPSec security associations (SA). Security associations are security policies defined for
communication between two or more entities¾the relationship between the entities is
represented by a key. The IKE protocol ensures security for SA communication without the
pre-configuration that would otherwise be required.
Conclusion
New security tools will continue to emerge to combat constantly evolving security threats.
There will never be a single “set it and forget it” security solution for stopping breaches on
the network. To effectively address and prevent security breaches requires constant
monitoring and adjusting of infrastructure and policy. If a successful attack is perpetrated
against an organization, the monitoring solution becomes even more critical to ensure the
attack is accurately identified and appropriate steps are taken to prevent future attacks.
Network security forensic devices are uniquely positioned to provide a full view of all
activities before, during, and after the event. These tools also have the ability to isolate the
breach, identify software, scripts and exploits used; and locate potentially compromised
infrastructure.
        The ability to capture all packet-level data is also critical to compliance enforcement
and the documentation of potential violations. The ability to accurately diagnose the breach
or policy violation through reports and reconstructing communications or web sessions
provides evidence necessary for proving compliance.

Más contenido relacionado

La actualidad más candente

Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Mukesh Chinta
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture designEnterpriseGRC Solutions, Inc.
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And PrivacyManan Gadhiya
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineeringPeter Wood
 
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Mukesh Chinta
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Practice case legal for data professional
Practice case legal for data professionalPractice case legal for data professional
Practice case legal for data professionalNovita Sari
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data securitySaranSwathi1
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 

La actualidad más candente (20)

Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Data security
Data securityData security
Data security
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Data security
Data securityData security
Data security
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Introduction to the concept of it security
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it security
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Practice case legal for data professional
Practice case legal for data professionalPractice case legal for data professional
Practice case legal for data professional
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 

Destacado

280 слайдов
280 слайдов280 слайдов
280 слайдовlubov17
 
Au Psy 492 Baroness Thompson Doc M7 A2
Au Psy 492 Baroness Thompson Doc M7 A2Au Psy 492 Baroness Thompson Doc M7 A2
Au Psy 492 Baroness Thompson Doc M7 A2Baroness Thompson
 
Terna 2010 consolidated results
Terna 2010 consolidated resultsTerna 2010 consolidated results
Terna 2010 consolidated resultsTerna SpA
 
Gwig update 29 april 2013
Gwig update 29 april 2013Gwig update 29 april 2013
Gwig update 29 april 2013Sudirman Sultan
 
Optimizing Client-Side Performance
Optimizing Client-Side PerformanceOptimizing Client-Side Performance
Optimizing Client-Side Performanceandrew4web
 
SAHNI SPORTS Uttar Pradesh India
SAHNI SPORTS Uttar Pradesh India SAHNI SPORTS Uttar Pradesh India
SAHNI SPORTS Uttar Pradesh India SAHNI SPORTS
 
The Colours of Pollution
The Colours of PollutionThe Colours of Pollution
The Colours of PollutionAlessio Cuccu
 
Il tempo dei se e dei ma è finito
Il tempo dei se e dei ma è finitoIl tempo dei se e dei ma è finito
Il tempo dei se e dei ma è finitoDaniel Cerami
 
Au psy492 m6 a2 thompson b doc
Au psy492 m6 a2 thompson b docAu psy492 m6 a2 thompson b doc
Au psy492 m6 a2 thompson b docBaroness Thompson
 
Wishing you all a happy and lucky 2015
Wishing you all a happy and lucky 2015Wishing you all a happy and lucky 2015
Wishing you all a happy and lucky 2015In-depth Consulting
 
Origi nof numbers_0_9_
Origi nof numbers_0_9_Origi nof numbers_0_9_
Origi nof numbers_0_9_Thea Long
 
Insert latest articles on blogger
Insert latest articles on bloggerInsert latest articles on blogger
Insert latest articles on bloggerStefano Vinci
 
PR Newswire Emerging Media Presentation
PR Newswire Emerging Media PresentationPR Newswire Emerging Media Presentation
PR Newswire Emerging Media PresentationLeif Clarke
 
Successful testing continuous delivery (Testnet 2013)
Successful testing continuous delivery (Testnet 2013)Successful testing continuous delivery (Testnet 2013)
Successful testing continuous delivery (Testnet 2013)Pascal Dufour
 

Destacado (20)

280 слайдов
280 слайдов280 слайдов
280 слайдов
 
Grand Chase
Grand  ChaseGrand  Chase
Grand Chase
 
Au Psy 492 Baroness Thompson Doc M7 A2
Au Psy 492 Baroness Thompson Doc M7 A2Au Psy 492 Baroness Thompson Doc M7 A2
Au Psy 492 Baroness Thompson Doc M7 A2
 
Terna 2010 consolidated results
Terna 2010 consolidated resultsTerna 2010 consolidated results
Terna 2010 consolidated results
 
Garbage white
Garbage whiteGarbage white
Garbage white
 
GT Study Day Mesagne
GT Study Day MesagneGT Study Day Mesagne
GT Study Day Mesagne
 
Gwig update 29 april 2013
Gwig update 29 april 2013Gwig update 29 april 2013
Gwig update 29 april 2013
 
Optimizing Client-Side Performance
Optimizing Client-Side PerformanceOptimizing Client-Side Performance
Optimizing Client-Side Performance
 
SAHNI SPORTS Uttar Pradesh India
SAHNI SPORTS Uttar Pradesh India SAHNI SPORTS Uttar Pradesh India
SAHNI SPORTS Uttar Pradesh India
 
Inquiry
InquiryInquiry
Inquiry
 
The Colours of Pollution
The Colours of PollutionThe Colours of Pollution
The Colours of Pollution
 
Clase 3
Clase 3Clase 3
Clase 3
 
Il tempo dei se e dei ma è finito
Il tempo dei se e dei ma è finitoIl tempo dei se e dei ma è finito
Il tempo dei se e dei ma è finito
 
Au psy492 m6 a2 thompson b doc
Au psy492 m6 a2 thompson b docAu psy492 m6 a2 thompson b doc
Au psy492 m6 a2 thompson b doc
 
Wishing you all a happy and lucky 2015
Wishing you all a happy and lucky 2015Wishing you all a happy and lucky 2015
Wishing you all a happy and lucky 2015
 
Origi nof numbers_0_9_
Origi nof numbers_0_9_Origi nof numbers_0_9_
Origi nof numbers_0_9_
 
Insert latest articles on blogger
Insert latest articles on bloggerInsert latest articles on blogger
Insert latest articles on blogger
 
PR Newswire Emerging Media Presentation
PR Newswire Emerging Media PresentationPR Newswire Emerging Media Presentation
PR Newswire Emerging Media Presentation
 
Open source พื้นฐานที่ควรมี
Open source พื้นฐานที่ควรมีOpen source พื้นฐานที่ควรมี
Open source พื้นฐานที่ควรมี
 
Successful testing continuous delivery (Testnet 2013)
Successful testing continuous delivery (Testnet 2013)Successful testing continuous delivery (Testnet 2013)
Successful testing continuous delivery (Testnet 2013)
 

Similar a Network security

network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxMijanurSepai1
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case StudyEvelyn Donaldson
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docxwillcoxjanay
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxKellyIsaac3
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............AkilSayyad2
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldIdentive
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppttahirnaquash2
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 

Similar a Network security (20)

network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Network security
Network security Network security
Network security
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 

Último

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 

Último (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Network security

  • 1. Network Security ABSTRACT The biggest threat to network security is underestimating the threat to network security. And as IP networks become the defector standard, ignoring this reality can extract a heavy price down the road. The truth of the matter is that current security technologies pose an unacceptable risk in protecting an organization’s data and intellectual property. Today’s firewall-based security technologies do not fully protect data resources. Only data protection throughout the network can safeguard critical and confidential data, regardless of the success or failure of other security technologies and policies. Therefore, data protection must be the primary layer of defense. As hacking and security threats grow in complexity and organizations face stringent requirements to document access to private data on the network, organizations require a new level of network visibility and surveillance. The world of network security has become an “arms race”. As organizations tighten their external defenses and install improved security tools, threats and attacks emerge to circumvent these security measures. Increasingly, this arms race is taking place in a regulated environment, where government rules such as HIPAA, Sarbanes-Oxley, and the EU Data Protection Directive require organizations to control access to private data and document security breaches. This includes the following. •Identify the need for a network security camera to capture and save all network transactions and activities •Illustrate how network security forensic appliances provide new visibility and evidence for security and compliance investigations •Highlight real-world examples from clients demonstrating the role network security forensics plays in identifying security and compliance violations •Providethekeycomponentstolookforinanynetworksecurityforensicssolution Network security helps investigation.  Network policy violation.  Compliance violation
  • 2.  Access violation  Security violation Where network security is needed: •Monitoring internal threats •Documenting evidence for investigations •Solving the “Who done it” mystery •Complying with government regulations such as HIPAA, SOX, and the EU data Protection Directive •Complying with corporate HR and network- use policies Data in motion: what’s the worst that could happen? Networks today are not the isolated, self-contained islands they once were. With internet gateways giving network access to remote employees, customers, contractors and partners, the network has opened up, increasing productivity and security risks. Network security has relied primarily on keeping the bad guys out. Hackers, thieves and other ne’er-do-wells seeking to do harm are prevented from getting in, most of the time. However, the nature of networks today is dynamic. While data may spend some time on any number of devices – servers, desktops, disk arrays – some of it is in motion, travelling across the network, all the time. That data zipping around the network is the same data that is thoroughly protected while static. And it is more often than not completely unprotected while in motion. Data residing on desktops, laptops and servers is usually protected with at least a password, if not more complex security. While always a good idea, it should not be enough to ensure a good night’s sleep for IT security. So much for perimeter defence and ID management as a comprehensive network security strategy. There are any numbers of reasons your information may be an attractive target: • Intellectual property – your organization’s “special sauce” that gives you critical market differentiation and a leg up on the competition. • Customer information – personal, financial and/or health information can be very valuable. In fact, protecting that information has spawned a growing number of federal and state regulations, including Gramm-Leach-Bliley, Sarbanes-Oxley and California Senate Bill 1386 • Employee information – personal information such as Social Security numbers, bank account numbers and health information
  • 3. • Other secret information – including governmental information regarding homeland or national security, Department of Defense activities or communications, and personal, private data used by any number of agencies • Business-enabling information – customer and prospect opportunities, plans and interactions All networks are untrusted Most enterprises and organizations with far-flung offices, remote back-up data centers and multiple buildings in a campus setting have a complex network to meet all of their communication and business needs. more than a single network, it is usually a network of networks that must communicate and share data with one another. This creates a situation where data is physically leaving a protected facility and moving to another. Whether it’s going over the Internet, a service provider backbone or a wireless link between buildings, that data, which has been protected while at rest on servers, has moved out to where it is available to anyone with the motivation and means to get it. If we take a look at a layered approach to network security, data protection, along with ID management and perimeter technologies, provide the three anchors that protect all aspects of the network: data and intellectual property, networking infrastructure and people. Examples of common networks where data in transit is susceptible to unauthorized access. Broadband wireless link between buildings Many organizations have multiple networks in different facilities that must exchange information. When fibre is impossible or too cost-prohibitive, high-speed wireless provides
  • 4. an inexpensive and easy solution. However, all data transmitted over the air through the wireless links is at risk to anyone wanting to access it. Broadband wireless link between buildings Storage IP Networking It is becoming increasingly common for organizations to store and archive their data in a remote facility. Once again, however, this data must travel over entrusted networks to reach its destination, meaning it could be accessed without anyone knowing it. MPLS MPLS (multi-protocol label switching) networks are becoming more and more popular as service providers look for ways to enable multiple customers to have VPNs on the same network. However, the VPNs on the MPLS network simply separate user groups, they don’t protect the data.
  • 5. Data protection – the primary layer of defense Your data is running around the network in packets that contain addresses, protocol ids, and the actual data. If you protect the packet from its source to its destination you have created an excellent foundation for a secure network. There are three main aspects of data protection on the network: • Confidentiality – Keep your data private • Authentication – Trust your sources • Integrity—Trust your data IP Security (IPSec), defined by the Internet Engineering Task Force (IETF), is the accepted standard for protecting data in transit over an untrusted network and provides the three levels of security. IPSec is a suite of security protocols that protects IP packets. IPSec works on Layer 3, the network layer of the Open Systems interconnection 7- layer networking model. By running on Layer 3, IPSec is able to function transparently to higher layer applications; the applications do not require any knowledge of IPSec in order to use it. By enabling IPSec everywhere on the network that sensitive data travels, the vulnerability of data traveling in the clear is eliminated. IPSec modes of protection IPSec protects IP packets by defining which traffic is to be protected, IPSec uses a protocol called Encapsulating Security Payload (ESP) that provides proof of data integrity, data source authentication and anti-replay by inserting a new IP address and ESP header in
  • 6. front of the packet to be protected. This protects the entire IP packet including the originating IP address. Using ESP controls both the encryption and authentication used to protect the IP payload. Tunnel mode ESP (encapsulating security payload) _ Data integrity + authentication _ Anti-replay service _ Confidentiality IPSec encryption IPSec encryption enables confidentiality of data as it travels on the network. • Uses symmetric keys (same keys are used for encryption and decryption) • Uses Diffie-Hellman algorithms and IKE/ISAKMP protocols to derive keys • Encryption algorithms such as AES(Advanced Encryption Standard) Cipher Optics enables IPSec everywhere There are several ways to enable IPSec on the network. The Cipher Optics approach is to use purpose-built appliances designed for Fast Ethernet and Gigabit Ethernet IP networks. With its proprietary TILEA™ architecture, Cipher Optics appliances are paving the way for IPSec everywhere.
  • 7. To show how Cipher Optics IPSec appliances provide data protection is shown in figure below, Internet Key Exchange (IKE) IKE is used to ensure security for virtual private network negotiation and remote host or network access. IKE defines an automatic means of negotiation and authentication for IPSec security associations (SA). Security associations are security policies defined for communication between two or more entities¾the relationship between the entities is represented by a key. The IKE protocol ensures security for SA communication without the pre-configuration that would otherwise be required.
  • 8. Conclusion New security tools will continue to emerge to combat constantly evolving security threats. There will never be a single “set it and forget it” security solution for stopping breaches on the network. To effectively address and prevent security breaches requires constant monitoring and adjusting of infrastructure and policy. If a successful attack is perpetrated against an organization, the monitoring solution becomes even more critical to ensure the attack is accurately identified and appropriate steps are taken to prevent future attacks. Network security forensic devices are uniquely positioned to provide a full view of all activities before, during, and after the event. These tools also have the ability to isolate the breach, identify software, scripts and exploits used; and locate potentially compromised infrastructure. The ability to capture all packet-level data is also critical to compliance enforcement and the documentation of potential violations. The ability to accurately diagnose the breach or policy violation through reports and reconstructing communications or web sessions provides evidence necessary for proving compliance.