SlideShare a Scribd company logo
1 of 91
Network Security
Defense-in-Depth
By
Dilum Bandara
2
Objective
 To provide an overview of security threats in
a networked environment , countermeasures
& relating technologies
3
Threats
 Viruses/Worms
 Buffer Overflow
 Denial of service (DoS)
 Spoofing & Sniffing
 Address/Port scanning
 Hacking
 Trojan horses
 Logic Bombs
 Trap Doors
Covered Today
4
Outline
 Security risk
 Defense-in-Depth
 Threats in more detail
 Counter measures
 Firewalls
 Server Protection
 Enterprise level antiviral solutions
 Security Vs Sri Lanka
 Demo
5
Risk
 Hackers are getting smarter
 They don’t need to be TCP/IP guru
 Enough tools are freely available
 More badly – they don’t have idea of what they are
doing
 The security chain is only as strong as its weakest
link - users
6
Who should be concerned?
 Any 1 who has access to Internet
 Regardless of their size
 Every 1 in 2 small business will be
hacked in end of 2003
 60% of companies won’t be aware
until serious damage happens
7
Defense-in-Depth
 No single product could deliver all
 It is advisable to combine
 Awareness and Commitment
 Firewall
 Network and System Monitoring
 Access Control & Authentication
 Anti-Virus
 Encryption
 VPN
 Server Integrity
 Auditing
8
Internet
OS
Firewalls
Intrusion Detection
Perimeter Anti-Viral
Perimeter
Internal Users and Dial-up Access
Users
OS Authentication
Trusted OS Access Control
Host-Based Anti-ViralOS Security
Server Security
OS
Files, Directories, Applications
and Configuration Settings
Secured Private Communications
illustrated…
9
Total access Vs no access
 User wants world to be at their fingertip
 Sys Admin want to stop as much as
 The best way to survive is to have no access
 We need a compromise
 Answer is :
Security Policy
10
Security Policy
 I need to protect things but how?
 Security policy is a compromise that
organization decides to adopt between
absolute security & absolute access
 Who can get in/out
 Where they can go
 When they can get in/out
 What they can bring in/carry out
 Physical access
 Protecting management station
Security should be from your door
step to the Internet gateway
If there is a open door
surely some one will probe in
12
Benefits of a policy
User is the key
 Users gain a sense that the organization is
looking out to protect their files and their
livelihood
 Users often find that they have access
freedoms they were not previously aware of
 Users gain an understanding that access
limitations are implemented to protect the
organization from disaster
13
Done?
 I published the policy
 I have all the necessary devices
 My virus guard gets updated automatically
Hahaha….I’m Secure!!!
No, wait
I’ll show you another magic
14
Why?
 Security is a dynamic process
 Its like a Cricket match
 When one hacker goes off another
hacker of a different style comes to bat
 Not a 1 step solution
 So you are never done
 It needs lot of vigilance & maintenance
15
The growing Vulnerability gap
Vulnerability
]
1995 1997 1999 2001 2003 2005
HOSTILE
ACCESS
DENIAL OF
SERVICE
APPLICATION
LAYER
EMAIL SERVER
ATTACKS
EMAIL
VIRUSES
BUSINESS THREATS
RESPONSE CAPABILITY
16
Vulnerability Window
 Is the time gap between 1st attack and until
you get ready to face it
 Indicate how vulnerable you are
 Higher the window size more vulnerable you
are
17
Illustration – Time in GMT
1st attack – 2:30 am
Security Partner
get noticed
5:30 am
Patch is available
11:45 am
Ready to
face the
challenge
3:50 pm
Vulnerability window
13:20
18
Narrowband Vs Broadband
 Narrowband
 Dial-up
 Dynamic IPs
 Broadband
 Always connect
 Static IPs
 Door is always open
19
But….
 Neither is secure
 Because
 Example:
FBI’s Carnivore machine
20
Terminology
 Hacker – people who get in but no harm (or
help for better security)
 Cracker – people who get in & do harm
 Hacking – unauthorized probing
 Cracking – applying patches to software for
illegal registration
21
DoS attacks
 Denial of Service
 Degrade performance or crash the
server
 Ping of Death
 SYN Flooding
 Ping Flood  Smurf Attacks
 Buffer Overflow
 Exploiting the CGI
22
Ping of Death
 Exploits bugs on UNIX, Windows, MacOS
 Host crashes when large Ping packet
arrives (ICMP Echo > 64KB)
 Solution
 OS patch can correct the problem
 No longer an attack
23
SYN Flooding
 Make use of TCP 3 way handshaking
 Use unavailable IP address
 Solution
 No solution
 Minimize
 the no of uncompleted connections
 the validation timeout
24
Ping Flood & Smurf Attacks
 Send large number of Pings to the host same
time
 Send large number of pings as coming from
the host
 Solution
 Configure routers, NATing device or Firewall
25
Buffer Overflow
 Caused when more data is given to a
program than that it can handle
 Extra data contains malicious code
 If overwrite system memory area could
execute easily
 E.g. Nimda, Code Red II
 Solution
 Protect the stack buffer
26
Exploiting the CGI
 If program blindly accept request from
browser, could provide access to shell
 With privileges of CGI program
 E.g.
http://fake.name.com/cgi-
bin/name.cgi?fgdn=%Acat%20/etc/passwd
 Solution
 Filter unwanted commands
 Remove the shell
27
Address/Port probing
 Sequential search of IP address with
open ports
 Then exploit vulnerabilities of programs
 Make use of running Trojan horses
 Back Orifice
 Solution
 Stateful packet filtering
28
Port scanning how?
 TCP SYN scanning
 Send a packet with SYN to initiate a
connection
 If reply comes with SYN ACK port is open
 TCP FIN Scanning
 Send a FIN (finish) to host
 If reply with RST (reset) comes port is open
29
Use of IP Options
 Use of Optional header in IP header
 Used for testing purposes
 Source routing
 If any authentication is done according
to the path ???
 Solution
 Block all packet with optional header
30
Spoofing attacks
 Use of false identity to cheat the server,
router or firewall and gain access
 E.g. sending external packet with
internal source IP
 Solution
 Block at the router, NAT or firewall
 Both incoming & outgoing
31
Solutions
 ID (Intruder Detection)
 Firewalls
 NAT
 VPN
 URL filtering
 DMZ
 Server Protection
 Antiviral solutions
32
ID (Intruder Detection)
 Use all sorts of login to check for
vulnerabilities
 Cannot prevent attack but could detect
after or when immerging
 Too complicated, need lot of vigilance
 Passive security
33
IP (Intruder Prevention)
 Prevent before it happens
 Active security
 Need more processing power
 Methods
 Protocol anomaly detection
 Signature based detection
 Behavior based detection
 Prevention is better than detection
34
NAT (Network Address Translation)
 IP masquerading or port forwarding
 Take address from one network &
translate to a IP address of another
 Hides hosts of one network from others
 Dynamic NAT
 1-to-1 NAT
 Static NAT
35
VPN (Virtual Private Network)
 Gives you a private path (channel) in a public
path
 End to end encrypted
 Use IPSec, L2TP or PPTP
?
?
36
37
VPN Cont….
 Overhead of encryption is too much – need lot
of processing power
 Bandwidth of high speed connections would
drop dramatically
 If VPN server to be use it should be dedicated
Firebox® 4500
200 Mbps firewall/100Mbps VPN
Firebox® 2500
200 Mbps firewall/75Mbps VPN
Firebox® 1000
200 Mbps firewall/60Mbps VPN
Firebox® 700
150 Mbps firewall/5Mbps VPN
38
URL Filtering
 Filtering of web pages against a filtering
database
 Database is controlled by 3rd party
 You can add your own sites or
exceptions
 Filtering is based on user, user group,
time of the day, etc.
39
DMZ (Demilitarized Zone)
 Place where you keep your publicly available servers
 Separate from other local hosts and application
servers
 Provides better security
40
Firewalls
 Device which protects resources of private
network from outside intrusions
 Firewall examines each packet passes through
it against assigned set of rules
 Not a virus guard
 Stance
 Stance dictates what firewall does when
absence of a rule
 Stance is to block everything unless
specifically allowed
41
Where does it fits in
42
Interfaces
 External Interface
 connection to external interface (typically Internet)
 Trusted Interface
 connection to internal interface which needs
maximum protection
 Optional Interface
 connection to DMZ or free areas. Public Web, e-mail
FTP, DNS servers could be connected here
43
Firewall Security Policy
 Which
 hosts send/receive which kinds of traffic
 communication links require authentication and/or
encryption
 users are authorized to use various services
through the Firewall
 What
 communication protocols and content types are
allowed
 times of day organization members are able to
browse the Web
 types of Web sites organization members can visit
44
Technology – Packet filtering
 Based on the header information
 Incoming & outgoing packets are treated
separately
 Filter packets bases on
 IP address, Port, Protocol, Type of service
 Works on Network & Transport layers
 Very effective but can not detect (stateless)
attacks like DoS
45
Technology – Circuit Relay
 Use none header information
 User, time of day
 Dynamic packet filtering
 Keep track of states
 Really effective when both packet
filtering & circuit relay are combined
together
46
Application
Presentation
Session
Transport
Network
Data Link
Physical
Transport
Internet
Host to network
Application
Security Proxy
Circuit Relay
Packet Filter
OSI TCP/IP
Layer Comparison
47
Security Proxy
 Proxy is a program which intercepts packets,
examine content, take some action to
safeguard the server
 Firewall goes beyond packet filtering & circuit
relay
 Detect forbidden contents
 Each packet is stripped of its wrapping,
analyzed, processed, re-wrapped & forwarded
 Add some delay as well
48
49
Proxies - Advantages
 make networks harder to hack by
 blocking entire categories of commonly used attacks
 concealing details about internal network servers from the public
Internet
 help to use network bandwidth more effectively by
 preventing unwanted or inappropriate traffic entering to the
network
 Proxies reduce corporate liability by
 preventing a hacker from using networks as a launch point for
further attacks
 Simplify the management of networks by
 providing administrator with tools and defaults that can be
applied broadly, rather than desktop by desktop
50
Drop-in & Routed Networks
51
Secondary Network
52
Software Vs Hardware
 Server based –
dedicated
 Insecure OS
 Not a real-time OS
 Pay for things that are
not necessary
 3 vendors
 Frequent patches
 Licensed based
 Although initial cost is
low TCO is high
 Dedicated box
 Hardened OS
 Single vender
 Product based
 Hard to apply firmware
updates
 No hard disk (not in all
firewalls)
 Initial cost is bit high but
TCO is significantly
lower
53
ASIC (Application Specific IC)
 Hardware beats software because of ASIC
 Software is hard coded to chip
CPU
Packet
Classification
Firewall rule
enforcement
IPSec (AH, ESP)
3DES
NAT
SNMP
Management
Interface (GUI, CLI)
Statistics
Logs
Alarms
QoS
PKI
Load
Balancing
NICNIC
Data Path
L2TP PPTP
System Bus
DES
MD5/SHA
54
ASIC…
System Bus becomes the bottleneck
NICNIC
CPU
Packet
Classification
Firewall rule
enforcement
IPSec (AH, ESP)
3DES
NAT
SNMP
Management
Interface (GUI, CLI)
Statistics
Logs
Alarms
QoS
PKI
Load
Balancing
System Bus
Data Path
Encryption
Accelerator
DES
MD5/SHA
55
Intelligent ASIC
SYSTEM BUS
Logs
Alarms
PKI
Statistics
SNMP
Interface (GUI, CLI)
Management
CPU
Qos
NAT
Load
Balancing
Firewall Rule
Inforcement
IPSec
DES 3DES
MD5, SHA1
Packet
Classification
Custom
Security
ASIC
DATA PATH
3) Following packets of flow
are cut through, bypassing
CPU
1) First Packet of flow forwarded to
CPU for classifications and security
policy lookup
Logs
NAT
QoS
Packet Classification
Firewall rule
Enforcement
Load Balancing
DES
3DES
SHA
MD5
IPSec
L2TP PPTP
2) Policy for flow
forwarded to
custom security ASIC
cache memory
56
WatchGuard®
57
Features
 QoS
 Active Active
 Active Passive
 Server load balancing
 Centralized management
 Value added service
 No hard disk
 Hardened Linux
 (Proprietary Vs Open)
Demo
Server Protection
60
Server Protection
61
Why?
 Risk comes from out side so why do I bother
about internal servers?
 In reality risk comes from inside than outside
 Either planned or unplanned
 None of the commercial OSs are secure
 It is a separate layer not a integrated part of the
system
62
A legitimate user
 Any one who get access as the power
user can do anything
 Change the content of a web page to divert
credit card information to a different location
 Create a user account as a backdoor
 Delete all the log entries that could indicate
a system hack
 System reconfiguration
63
ServerLock
 An immerging concept
 Operating under the belief that protecting
your data from unauthorized change is
more effective than detecting attacks
 Locks
 It self
 Critical OS files & configurations
 Registry
 User defined resources
64
Protection
65
Policy
 Denies write or delete access based on
 The resource
 Not on the user
 Even Sys Admin cannot do anything
 If need to change any protected
resource first unlock the resource
66
Location
 Resides between user space & kernel space
 As a device driver in Windows
 As a loadable kernel module in Solaris
 Intercept all the system calls
67
Logic
68
Internal Security
PKI + 239 bit ECC
69
Protecting it self
 Protects itself from being altered, disabled, or
removed by unauthorized individuals, by
securing:
 Hardware profiles
 File System
 Registry
70
71
Can guard against
 Changes to existing files or registry keys
 Creation of new files or registry keys
 Other resources
 IIS Metabase
 User Accounts
 Date & Time
 Stack Buffer
 Custom rules can be added to protect
other resources
72
ServerLock Vs AppLock/Web
 Server Lock protects the entire server
while AppLock protects only specific
application
 Applock/Web is designed to protect web
servers (IIS only)
AppLock/Web
$595 per server
ServerLock
$1295-1695 per server
ServerLock Manager
$5,000 – 15,000
73
Demo
Service
Incoming Outgoing
Properties
From To From To
HTTP Any Web server Any Any Port 80
FTP HQ only 170 & Dinky Any Any Port 21
SMTP Any Mail server Any Any Port 25
DNS Any 170 Any Any
Multi protocol on ports
using client ports
Telnet HQ only 170 & Dinky Any Any Port 23
Ping Dinky Any Any Any Do
Lotus Notes HQ only 170 Any Any TCP on port 1352
WatchGuard None None Trusted Any Multi protocol on port 4103
Virus Scan None None Any 64.75.31.197 TCP on port 80
Authority Admin PC Firewall Any Any TCP on port 113
Enterprise Level Anti-virus
Solutions
75
359,000
SERVERS
INFECTED
IN
14 HOURS
$2.6 BILLION
IN
DOWNTIME
AND
CLEANUP
800,000+
SERVERS
INFECTED
WORLDWIDE
Code Red
76
Viruses & Worms
 Is the most destructive in terms of data
losses, time to recover & money
 New destructive threat immerge in every
11 hours
 Safeguard requires frequently updating of
virus patterns & applying patches
77
Defense-in-Depth
78
Definitios
 VirusWall
 Resides just after the firewall (internet
gateway)
 All traffic (SMTP, HTTP, FTP) must pass
through the Viruswall
 Stops viruses, worms, spam at the entry
point
 Files are download to the VirusWall Server
before sending to clients
79
Server Protection
 Server based virus guards are different than a
PC based ones
80
Server Protection Cont…
 Everything depends on the type of server
 Mail servers must use specialized mail scanning
software
 Centralized management of all servers allow
one station to update virus definitions & deploy
to others
 Preserves bandwidth
81
Desktop Protection
 Standalone solutions or centralized
solution?
 All PCs having same policy
 Ease of management & policy enforcement
 Preserve bandwidth
 Extensive login
 User state
 Corporate image
82
83
What makes a good Network
Security System
 Simplicity
 If it is complex in design & configuration, hard to
manage would course more security holes
 Simple designs are more likely to be used
consistently & correctly
 Scalability
 When you (business) grow it should grow with you
84
Good Security System Cont…
 High uptime & quick recovery
 High meantime between failure
 Failover recovery
 Distributed architecture
 Different tasks on different locations (or PCs)
 Dynamically secured
 Cannot be static & one time product
85
Good Security System Cont…
 Economy of IP addresses
 Hiding internal IPs
 Reducing the number of public IPs
 Secure connection
 VPN, management station, subcomponents
 Authentication
86
Good Security System Cont…
 Login & notification
 Keep you informed
 Summarized & reports of NW activity
 Physically secured
87
Security Vs Sri Lanka
 Not aware of the threat
 Every one is searching for low cost anti-virus solution
that could protect everything
 I am not having anything to loose so why do I?
 Should I invest more on security?
If you spend more on Coffee (Tea) than security you are
deserved to be hacked!
By advice for defense for US president
88
Conclusion
 Security is a dynamic process which you
have a role to play (loose or winner)
 Third world countries should not be a
playground for hackers
 Awareness is the best way of protection
89
References
 www.watchguard.com
 Or
Questions????
Thank you

More Related Content

What's hot

System hacking
System hackingSystem hacking
System hackingCAS
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Web application attacks
Web application attacksWeb application attacks
Web application attackshruth
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing RomSoft SRL
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to SecurityDr. Ahmed Al Zaidy
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port ScanningSam Bowne
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 

What's hot (20)

System hacking
System hackingSystem hacking
System hacking
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to Security
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Firewall
FirewallFirewall
Firewall
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Security policy
Security policySecurity policy
Security policy
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 

Viewers also liked

Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsPeter Rawsthorne
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsBob Rhubart
 
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy BeyondTrust
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01RoutecoMarketing
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthIceQUICK
 
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoFortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoNetwork Performance Channel GmbH
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudBob Rhubart
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewallsphanleson
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 
defense_in_depth_version_12
defense_in_depth_version_12defense_in_depth_version_12
defense_in_depth_version_12Alen Schulze
 
Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Ayed Al Qartah
 
Collaborative defence strategies for network security
Collaborative defence strategies for network securityCollaborative defence strategies for network security
Collaborative defence strategies for network securitysonukumar142
 
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...CODE BLUE
 

Viewers also liked (20)

Defense in Depth – Your Security Castle
Defense in Depth – Your Security CastleDefense in Depth – Your Security Castle
Defense in Depth – Your Security Castle
 
OSI Layer Security
OSI Layer SecurityOSI Layer Security
OSI Layer Security
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural Decisions
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoFortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewalls
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
defense_in_depth_version_12
defense_in_depth_version_12defense_in_depth_version_12
defense_in_depth_version_12
 
Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0
 
Capas modelo osi
Capas modelo osiCapas modelo osi
Capas modelo osi
 
Collaborative defence strategies for network security
Collaborative defence strategies for network securityCollaborative defence strategies for network security
Collaborative defence strategies for network security
 
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
 

Similar to Network security - Defense in Depth

Similar to Network security - Defense in Depth (20)

Net Defender
Net DefenderNet Defender
Net Defender
 
Network seurity
Network seurityNetwork seurity
Network seurity
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
Network Security
Network SecurityNetwork Security
Network Security
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Netdefender
NetdefenderNetdefender
Netdefender
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Firewalls (6)
Firewalls (6)Firewalls (6)
Firewalls (6)
 
Day4
Day4Day4
Day4
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Network security
Network securityNetwork security
Network security
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 

More from Dilum Bandara

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningDilum Bandara
 
Time Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeTime Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeDilum Bandara
 
Introduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCAIntroduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCADilum Bandara
 
Introduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsIntroduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsDilum Bandara
 
Introduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresIntroduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresDilum Bandara
 
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixHard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixDilum Bandara
 
Introduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopIntroduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopDilum Bandara
 
Embarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsEmbarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsDilum Bandara
 
Introduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersIntroduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersDilum Bandara
 
Introduction to Thread Level Parallelism
Introduction to Thread Level ParallelismIntroduction to Thread Level Parallelism
Introduction to Thread Level ParallelismDilum Bandara
 
CPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesCPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesDilum Bandara
 
Data-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsData-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsDilum Bandara
 
Instruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesInstruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesDilum Bandara
 
Instruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesInstruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesDilum Bandara
 
CPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionCPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionDilum Bandara
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPDilum Bandara
 
Introduction to Content Delivery Networks
Introduction to Content Delivery NetworksIntroduction to Content Delivery Networks
Introduction to Content Delivery NetworksDilum Bandara
 
Peer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingPeer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingDilum Bandara
 

More from Dilum Bandara (20)

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Time Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeTime Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in Practice
 
Introduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCAIntroduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCA
 
Introduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsIntroduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive Analytics
 
Introduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresIntroduction to Concurrent Data Structures
Introduction to Concurrent Data Structures
 
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixHard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
 
Introduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopIntroduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with Hadoop
 
Embarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsEmbarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel Problems
 
Introduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersIntroduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale Computers
 
Introduction to Thread Level Parallelism
Introduction to Thread Level ParallelismIntroduction to Thread Level Parallelism
Introduction to Thread Level Parallelism
 
CPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesCPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching Techniques
 
Data-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsData-Level Parallelism in Microprocessors
Data-Level Parallelism in Microprocessors
 
Instruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesInstruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware Techniques
 
Instruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesInstruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler Techniques
 
CPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionCPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An Introduction
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
Introduction to Content Delivery Networks
Introduction to Content Delivery NetworksIntroduction to Content Delivery Networks
Introduction to Content Delivery Networks
 
Peer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingPeer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and Streaming
 
Mobile Services
Mobile ServicesMobile Services
Mobile Services
 

Recently uploaded

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 

Recently uploaded (20)

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 

Network security - Defense in Depth

  • 2. 2 Objective  To provide an overview of security threats in a networked environment , countermeasures & relating technologies
  • 3. 3 Threats  Viruses/Worms  Buffer Overflow  Denial of service (DoS)  Spoofing & Sniffing  Address/Port scanning  Hacking  Trojan horses  Logic Bombs  Trap Doors Covered Today
  • 4. 4 Outline  Security risk  Defense-in-Depth  Threats in more detail  Counter measures  Firewalls  Server Protection  Enterprise level antiviral solutions  Security Vs Sri Lanka  Demo
  • 5. 5 Risk  Hackers are getting smarter  They don’t need to be TCP/IP guru  Enough tools are freely available  More badly – they don’t have idea of what they are doing  The security chain is only as strong as its weakest link - users
  • 6. 6 Who should be concerned?  Any 1 who has access to Internet  Regardless of their size  Every 1 in 2 small business will be hacked in end of 2003  60% of companies won’t be aware until serious damage happens
  • 7. 7 Defense-in-Depth  No single product could deliver all  It is advisable to combine  Awareness and Commitment  Firewall  Network and System Monitoring  Access Control & Authentication  Anti-Virus  Encryption  VPN  Server Integrity  Auditing
  • 8. 8 Internet OS Firewalls Intrusion Detection Perimeter Anti-Viral Perimeter Internal Users and Dial-up Access Users OS Authentication Trusted OS Access Control Host-Based Anti-ViralOS Security Server Security OS Files, Directories, Applications and Configuration Settings Secured Private Communications illustrated…
  • 9. 9 Total access Vs no access  User wants world to be at their fingertip  Sys Admin want to stop as much as  The best way to survive is to have no access  We need a compromise  Answer is : Security Policy
  • 10. 10 Security Policy  I need to protect things but how?  Security policy is a compromise that organization decides to adopt between absolute security & absolute access  Who can get in/out  Where they can go  When they can get in/out  What they can bring in/carry out  Physical access  Protecting management station
  • 11. Security should be from your door step to the Internet gateway If there is a open door surely some one will probe in
  • 12. 12 Benefits of a policy User is the key  Users gain a sense that the organization is looking out to protect their files and their livelihood  Users often find that they have access freedoms they were not previously aware of  Users gain an understanding that access limitations are implemented to protect the organization from disaster
  • 13. 13 Done?  I published the policy  I have all the necessary devices  My virus guard gets updated automatically Hahaha….I’m Secure!!! No, wait I’ll show you another magic
  • 14. 14 Why?  Security is a dynamic process  Its like a Cricket match  When one hacker goes off another hacker of a different style comes to bat  Not a 1 step solution  So you are never done  It needs lot of vigilance & maintenance
  • 15. 15 The growing Vulnerability gap Vulnerability ] 1995 1997 1999 2001 2003 2005 HOSTILE ACCESS DENIAL OF SERVICE APPLICATION LAYER EMAIL SERVER ATTACKS EMAIL VIRUSES BUSINESS THREATS RESPONSE CAPABILITY
  • 16. 16 Vulnerability Window  Is the time gap between 1st attack and until you get ready to face it  Indicate how vulnerable you are  Higher the window size more vulnerable you are
  • 17. 17 Illustration – Time in GMT 1st attack – 2:30 am Security Partner get noticed 5:30 am Patch is available 11:45 am Ready to face the challenge 3:50 pm Vulnerability window 13:20
  • 18. 18 Narrowband Vs Broadband  Narrowband  Dial-up  Dynamic IPs  Broadband  Always connect  Static IPs  Door is always open
  • 19. 19 But….  Neither is secure  Because  Example: FBI’s Carnivore machine
  • 20. 20 Terminology  Hacker – people who get in but no harm (or help for better security)  Cracker – people who get in & do harm  Hacking – unauthorized probing  Cracking – applying patches to software for illegal registration
  • 21. 21 DoS attacks  Denial of Service  Degrade performance or crash the server  Ping of Death  SYN Flooding  Ping Flood  Smurf Attacks  Buffer Overflow  Exploiting the CGI
  • 22. 22 Ping of Death  Exploits bugs on UNIX, Windows, MacOS  Host crashes when large Ping packet arrives (ICMP Echo > 64KB)  Solution  OS patch can correct the problem  No longer an attack
  • 23. 23 SYN Flooding  Make use of TCP 3 way handshaking  Use unavailable IP address  Solution  No solution  Minimize  the no of uncompleted connections  the validation timeout
  • 24. 24 Ping Flood & Smurf Attacks  Send large number of Pings to the host same time  Send large number of pings as coming from the host  Solution  Configure routers, NATing device or Firewall
  • 25. 25 Buffer Overflow  Caused when more data is given to a program than that it can handle  Extra data contains malicious code  If overwrite system memory area could execute easily  E.g. Nimda, Code Red II  Solution  Protect the stack buffer
  • 26. 26 Exploiting the CGI  If program blindly accept request from browser, could provide access to shell  With privileges of CGI program  E.g. http://fake.name.com/cgi- bin/name.cgi?fgdn=%Acat%20/etc/passwd  Solution  Filter unwanted commands  Remove the shell
  • 27. 27 Address/Port probing  Sequential search of IP address with open ports  Then exploit vulnerabilities of programs  Make use of running Trojan horses  Back Orifice  Solution  Stateful packet filtering
  • 28. 28 Port scanning how?  TCP SYN scanning  Send a packet with SYN to initiate a connection  If reply comes with SYN ACK port is open  TCP FIN Scanning  Send a FIN (finish) to host  If reply with RST (reset) comes port is open
  • 29. 29 Use of IP Options  Use of Optional header in IP header  Used for testing purposes  Source routing  If any authentication is done according to the path ???  Solution  Block all packet with optional header
  • 30. 30 Spoofing attacks  Use of false identity to cheat the server, router or firewall and gain access  E.g. sending external packet with internal source IP  Solution  Block at the router, NAT or firewall  Both incoming & outgoing
  • 31. 31 Solutions  ID (Intruder Detection)  Firewalls  NAT  VPN  URL filtering  DMZ  Server Protection  Antiviral solutions
  • 32. 32 ID (Intruder Detection)  Use all sorts of login to check for vulnerabilities  Cannot prevent attack but could detect after or when immerging  Too complicated, need lot of vigilance  Passive security
  • 33. 33 IP (Intruder Prevention)  Prevent before it happens  Active security  Need more processing power  Methods  Protocol anomaly detection  Signature based detection  Behavior based detection  Prevention is better than detection
  • 34. 34 NAT (Network Address Translation)  IP masquerading or port forwarding  Take address from one network & translate to a IP address of another  Hides hosts of one network from others  Dynamic NAT  1-to-1 NAT  Static NAT
  • 35. 35 VPN (Virtual Private Network)  Gives you a private path (channel) in a public path  End to end encrypted  Use IPSec, L2TP or PPTP ? ?
  • 36. 36
  • 37. 37 VPN Cont….  Overhead of encryption is too much – need lot of processing power  Bandwidth of high speed connections would drop dramatically  If VPN server to be use it should be dedicated Firebox® 4500 200 Mbps firewall/100Mbps VPN Firebox® 2500 200 Mbps firewall/75Mbps VPN Firebox® 1000 200 Mbps firewall/60Mbps VPN Firebox® 700 150 Mbps firewall/5Mbps VPN
  • 38. 38 URL Filtering  Filtering of web pages against a filtering database  Database is controlled by 3rd party  You can add your own sites or exceptions  Filtering is based on user, user group, time of the day, etc.
  • 39. 39 DMZ (Demilitarized Zone)  Place where you keep your publicly available servers  Separate from other local hosts and application servers  Provides better security
  • 40. 40 Firewalls  Device which protects resources of private network from outside intrusions  Firewall examines each packet passes through it against assigned set of rules  Not a virus guard  Stance  Stance dictates what firewall does when absence of a rule  Stance is to block everything unless specifically allowed
  • 41. 41 Where does it fits in
  • 42. 42 Interfaces  External Interface  connection to external interface (typically Internet)  Trusted Interface  connection to internal interface which needs maximum protection  Optional Interface  connection to DMZ or free areas. Public Web, e-mail FTP, DNS servers could be connected here
  • 43. 43 Firewall Security Policy  Which  hosts send/receive which kinds of traffic  communication links require authentication and/or encryption  users are authorized to use various services through the Firewall  What  communication protocols and content types are allowed  times of day organization members are able to browse the Web  types of Web sites organization members can visit
  • 44. 44 Technology – Packet filtering  Based on the header information  Incoming & outgoing packets are treated separately  Filter packets bases on  IP address, Port, Protocol, Type of service  Works on Network & Transport layers  Very effective but can not detect (stateless) attacks like DoS
  • 45. 45 Technology – Circuit Relay  Use none header information  User, time of day  Dynamic packet filtering  Keep track of states  Really effective when both packet filtering & circuit relay are combined together
  • 46. 46 Application Presentation Session Transport Network Data Link Physical Transport Internet Host to network Application Security Proxy Circuit Relay Packet Filter OSI TCP/IP Layer Comparison
  • 47. 47 Security Proxy  Proxy is a program which intercepts packets, examine content, take some action to safeguard the server  Firewall goes beyond packet filtering & circuit relay  Detect forbidden contents  Each packet is stripped of its wrapping, analyzed, processed, re-wrapped & forwarded  Add some delay as well
  • 48. 48
  • 49. 49 Proxies - Advantages  make networks harder to hack by  blocking entire categories of commonly used attacks  concealing details about internal network servers from the public Internet  help to use network bandwidth more effectively by  preventing unwanted or inappropriate traffic entering to the network  Proxies reduce corporate liability by  preventing a hacker from using networks as a launch point for further attacks  Simplify the management of networks by  providing administrator with tools and defaults that can be applied broadly, rather than desktop by desktop
  • 52. 52 Software Vs Hardware  Server based – dedicated  Insecure OS  Not a real-time OS  Pay for things that are not necessary  3 vendors  Frequent patches  Licensed based  Although initial cost is low TCO is high  Dedicated box  Hardened OS  Single vender  Product based  Hard to apply firmware updates  No hard disk (not in all firewalls)  Initial cost is bit high but TCO is significantly lower
  • 53. 53 ASIC (Application Specific IC)  Hardware beats software because of ASIC  Software is hard coded to chip CPU Packet Classification Firewall rule enforcement IPSec (AH, ESP) 3DES NAT SNMP Management Interface (GUI, CLI) Statistics Logs Alarms QoS PKI Load Balancing NICNIC Data Path L2TP PPTP System Bus DES MD5/SHA
  • 54. 54 ASIC… System Bus becomes the bottleneck NICNIC CPU Packet Classification Firewall rule enforcement IPSec (AH, ESP) 3DES NAT SNMP Management Interface (GUI, CLI) Statistics Logs Alarms QoS PKI Load Balancing System Bus Data Path Encryption Accelerator DES MD5/SHA
  • 55. 55 Intelligent ASIC SYSTEM BUS Logs Alarms PKI Statistics SNMP Interface (GUI, CLI) Management CPU Qos NAT Load Balancing Firewall Rule Inforcement IPSec DES 3DES MD5, SHA1 Packet Classification Custom Security ASIC DATA PATH 3) Following packets of flow are cut through, bypassing CPU 1) First Packet of flow forwarded to CPU for classifications and security policy lookup Logs NAT QoS Packet Classification Firewall rule Enforcement Load Balancing DES 3DES SHA MD5 IPSec L2TP PPTP 2) Policy for flow forwarded to custom security ASIC cache memory
  • 57. 57 Features  QoS  Active Active  Active Passive  Server load balancing  Centralized management  Value added service  No hard disk  Hardened Linux  (Proprietary Vs Open)
  • 58. Demo
  • 61. 61 Why?  Risk comes from out side so why do I bother about internal servers?  In reality risk comes from inside than outside  Either planned or unplanned  None of the commercial OSs are secure  It is a separate layer not a integrated part of the system
  • 62. 62 A legitimate user  Any one who get access as the power user can do anything  Change the content of a web page to divert credit card information to a different location  Create a user account as a backdoor  Delete all the log entries that could indicate a system hack  System reconfiguration
  • 63. 63 ServerLock  An immerging concept  Operating under the belief that protecting your data from unauthorized change is more effective than detecting attacks  Locks  It self  Critical OS files & configurations  Registry  User defined resources
  • 65. 65 Policy  Denies write or delete access based on  The resource  Not on the user  Even Sys Admin cannot do anything  If need to change any protected resource first unlock the resource
  • 66. 66 Location  Resides between user space & kernel space  As a device driver in Windows  As a loadable kernel module in Solaris  Intercept all the system calls
  • 69. 69 Protecting it self  Protects itself from being altered, disabled, or removed by unauthorized individuals, by securing:  Hardware profiles  File System  Registry
  • 70. 70
  • 71. 71 Can guard against  Changes to existing files or registry keys  Creation of new files or registry keys  Other resources  IIS Metabase  User Accounts  Date & Time  Stack Buffer  Custom rules can be added to protect other resources
  • 72. 72 ServerLock Vs AppLock/Web  Server Lock protects the entire server while AppLock protects only specific application  Applock/Web is designed to protect web servers (IIS only) AppLock/Web $595 per server ServerLock $1295-1695 per server ServerLock Manager $5,000 – 15,000
  • 73. 73 Demo Service Incoming Outgoing Properties From To From To HTTP Any Web server Any Any Port 80 FTP HQ only 170 & Dinky Any Any Port 21 SMTP Any Mail server Any Any Port 25 DNS Any 170 Any Any Multi protocol on ports using client ports Telnet HQ only 170 & Dinky Any Any Port 23 Ping Dinky Any Any Any Do Lotus Notes HQ only 170 Any Any TCP on port 1352 WatchGuard None None Trusted Any Multi protocol on port 4103 Virus Scan None None Any 64.75.31.197 TCP on port 80 Authority Admin PC Firewall Any Any TCP on port 113
  • 76. 76 Viruses & Worms  Is the most destructive in terms of data losses, time to recover & money  New destructive threat immerge in every 11 hours  Safeguard requires frequently updating of virus patterns & applying patches
  • 78. 78 Definitios  VirusWall  Resides just after the firewall (internet gateway)  All traffic (SMTP, HTTP, FTP) must pass through the Viruswall  Stops viruses, worms, spam at the entry point  Files are download to the VirusWall Server before sending to clients
  • 79. 79 Server Protection  Server based virus guards are different than a PC based ones
  • 80. 80 Server Protection Cont…  Everything depends on the type of server  Mail servers must use specialized mail scanning software  Centralized management of all servers allow one station to update virus definitions & deploy to others  Preserves bandwidth
  • 81. 81 Desktop Protection  Standalone solutions or centralized solution?  All PCs having same policy  Ease of management & policy enforcement  Preserve bandwidth  Extensive login  User state  Corporate image
  • 82. 82
  • 83. 83 What makes a good Network Security System  Simplicity  If it is complex in design & configuration, hard to manage would course more security holes  Simple designs are more likely to be used consistently & correctly  Scalability  When you (business) grow it should grow with you
  • 84. 84 Good Security System Cont…  High uptime & quick recovery  High meantime between failure  Failover recovery  Distributed architecture  Different tasks on different locations (or PCs)  Dynamically secured  Cannot be static & one time product
  • 85. 85 Good Security System Cont…  Economy of IP addresses  Hiding internal IPs  Reducing the number of public IPs  Secure connection  VPN, management station, subcomponents  Authentication
  • 86. 86 Good Security System Cont…  Login & notification  Keep you informed  Summarized & reports of NW activity  Physically secured
  • 87. 87 Security Vs Sri Lanka  Not aware of the threat  Every one is searching for low cost anti-virus solution that could protect everything  I am not having anything to loose so why do I?  Should I invest more on security? If you spend more on Coffee (Tea) than security you are deserved to be hacked! By advice for defense for US president
  • 88. 88 Conclusion  Security is a dynamic process which you have a role to play (loose or winner)  Third world countries should not be a playground for hackers  Awareness is the best way of protection