1 / 14

Guide To TCP/IP, Second Edition

Guide To TCP/IP, Second Edition. Chapter 9 Securing TCP/IP Environments. Understanding the Basics of Proxy Servers. Between both outgoing and incoming service requests Prevent external users from direct access to internal resources Operate at the Application layer Caching.

dysis
Download Presentation

Guide To TCP/IP, Second Edition

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Guide To TCP/IP, Second Edition Chapter 9 Securing TCP/IP Environments Guide to TCP/IP, Second Edition

  2. Understanding the Basics of Proxy Servers • Between both outgoing and incoming service requests • Prevent external users from direct access to internal resources • Operate at the Application layer • Caching Guide to TCP/IP, Second Edition

  3. Implementing Firewalls and Proxy Servers • Planning and implementing, step by step • Security policies operate somewhere between the two extremes of “anything goes” (totally optimistic) and “no connection” (totally pessimistic) • 1) Plan • 2) Establish equipment • 3) Install • 4) Configure Guide to TCP/IP, Second Edition

  4. Implementing Firewalls and Proxy Servers (cont.) • Planning and implementing, step by step (cont.) • 5) Test • 6) Attack • 7) Tune • Repeat the test-attack-tune cycle (Steps 5-7) • 8) Implement • 9) Monitor and Maintain Guide to TCP/IP, Second Edition

  5. Implementing Firewalls and Proxy Servers (cont.) • Don’t ever work straight out of the box with a firewall or proxy server without checking for additional changes, updates, patches, fixes, and workarounds Guide to TCP/IP, Second Edition

  6. Understanding the Test-Attack-Tune Cycle • Harden the firewall or proxy server • Document the configuration • Do not disabled functionality that applications and services use to work properly • Battery of attack tools to test the network at • Network Associates • GNU NetTools • A port mapper such as AnalogX PortMapper or nmap • Internet Security System’s various security scanners Guide to TCP/IP, Second Edition

  7. Understanding the Role of IDS in IP Security • Automate recognizing and responding to potential attacks and other suspicious forms of network traffic • Recognize intrusion attempts in real time Guide to TCP/IP, Second Edition

  8. Updating Anti-Virus Engines and Virus Lists • Update anti-virus engine software and virus definitions on a regular basis • Automatic update facilities • Transparently and automatically check • E-mail attachments • Inbound file transfers • Floppy disks and other media • Other potential sources of infection Guide to TCP/IP, Second Edition

  9. The Security Update Process • Security update process involves four steps • Evaluate the vulnerability • Retrieve the update • Test the update • Deploy the update Guide to TCP/IP, Second Edition

  10. Understanding Security Policies And Recovery Plans • A security policy is a document that • Reflects an organization’s understanding of what information assets and other resources need protection • How they are to be protected • How they must be maintained under normal operating circumstances • Restored in the face of compromise or loss Guide to TCP/IP, Second Edition

  11. Understanding Security Policies And Recovery Plans (cont.) • Components of a good security policy • An access policy document • An accountability policy document • A privacy policy document • A violations reporting policy document • An authentication policy document • An information technology system and network maintenance policy document Guide to TCP/IP, Second Edition

  12. Understanding Security Policies And Recovery Plans (cont.) • Additional information about security policies and related documents • System and Administration, Networking, and Security (SANS) Institute • Department of Defense funds the Software Engineering Institute (SEI) at Carnegie-Mellon University • Murdoch University’s Office of Information Technology Services Guide to TCP/IP, Second Edition

  13. Windows XP And 2003: Another Generation Of Network Security • Numerous security enhancements and improvements • Kerberos version5 • Public Key Infrastructure (PKI) • Directory Service Account Management • CryptoAPI • Encrypting File System (EFS) • Secure Channel Security protocols (SSL 3.0/PCT) • Transport Layer Security (TLS) protocol Guide to TCP/IP, Second Edition

  14. Windows XP And 2003: Another Generation Of Network Security (cont.) • Numerous security enhancements and improvements (cont.) • Internet Security Framework • Network Access Control • Blank Password Restriction • Internet Connection Firewall • Internet Connection Sharing • Default Lock-Down Guide to TCP/IP, Second Edition

More Related