160 likes | 384 Views
MIS 4700. Security Part B. Maintaining IP Security. Apply security patches and Fixes to Operating system faults Security holes Microsoft security bulletins www.microsoft.com/security. Maintaining IP Security (cont.). Recognizing attack signatures IDS and network analyzer
E N D
MIS 4700 Security Part B
Maintaining IP Security • Apply security patches and Fixes to • Operating system faults • Security holes • Microsoft security bulletins • www.microsoft.com/security
Maintaining IP Security (cont.) • Recognizing attack signatures • IDS and network analyzer • Using IP Security (IPSec) • Cryptographic security services • Support explicit and strong authentication • Integrity and access controls • Confidentiality of IP datagrams • (AH), (ESP)
Protecting the Perimeter of the Network • Important devices and services to help protect the perimeter of your networks • Bastion host • Boundary (or border) router • Demilitarized zone • Firewall • Network address translation (NAT) • Proxy server • Screening host • Screening router
Understanding the Basics of Firewalls • Control traffic flow and network access • Inspect incoming traffic • Block or filter traffic • Placed at network boundaries or organizational boundaries • Physical or software • Firewalls basic security functions • Address filtering • Proxy services • Network address translation
Useful Firewall Specifics • Four major elements • Screening router functions • Domain name, IP address, port address, message type • Proxy service functions • “Stateful inspection” of packets sequences and services • Virtual Private Network services
Commercial Firewall Features • Additional features and functions in some, but not necessarily all, firewalls • Address translation/privacy services • Specific filtering mechanisms • Alarms and alerts • Logs and reports • Transparency • Intrusion detection system (IDS) • Management controls
Understanding the Basics of Proxy Servers • Between both outgoing and incoming service requests • Prevent external users from direct access to internal resources • Operate at the Application layer • Caching
Implementing Firewalls and Proxy Servers • Planning and implementing, step by step • Security policies operate somewhere between the two extremes of “anything goes” (totally optimistic) and “no connection” (totally pessimistic) • 1) Plan • 2) Establish equipment • 3) Install • 4) Configure
Implementing Firewalls and Proxy Servers (cont.) • Planning and implementing, step by step (cont.) • 5) Test • 6) Attack • 7) Tune • Repeat the test-attack-tune cycle (Steps 5-7) • 8) Implement • 9) Monitor and Maintain
Implementing Firewalls and Proxy Servers (cont.) • Don’t ever work straight out of the box with a firewall or proxy server without checking for additional changes, updates, patches, fixes, and workarounds
Understanding the Test-Attack-Tune Cycle • Harden the firewall or proxy server • Document the configuration • Do not disabled functionality that applications and services use to work properly • Battery of attack tools to test the network at • Network Associates • GNU NetTools • A port mapper such as AnalogX PortMapper or nmap • Internet Security System’s various security scanners
Understanding the Role of IDS in IP Security • Automate recognizing and responding to potential attacks and other suspicious forms of network traffic • Recognize intrusion attempts in real time
Updating Anti-Virus Engines and Virus Lists • Update anti-virus engine software and virus definitions on a regular basis • Automatic update facilities • Transparently and automatically check • E-mail attachments • Inbound file transfers • Floppy disks and other media • Other potential sources of infection
The Security Update Process • Security update process involves four steps • Evaluate the vulnerability • Retrieve the update • Test the update • Deploy the update