240 likes | 313 Views
ISP Responsibility. Working at a Small-to-Medium Business or ISP – Chapter 8. Objectives. Describe ISP security policies and procedures. Describe the tools used in implementing security at the ISP. Describe the monitoring and managing of the ISP.
E N D
ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8
Objectives • Describe ISP security policies and procedures. • Describe the tools used in implementing security at the ISP. • Describe the monitoring and managing of the ISP. • Describe the responsibilities of the ISP with regard to maintenance and recovery.
ISP Security Considerations • Helping clients to create secure passwords • Securing applications • Removing vulnerabilities • Configuring firewalls • Performing security scans
ISP Security Considerations Common security practices: • Encrypting data stored on servers • Using permissions to secure access • Implement user accounts • Assign levels of access
ISP Security Considerations Three steps used to reduce network vulnerability: • Authentication • Authorization • Accounting
ISP Security Considerations • Encryption: use the secure version of a protocol whenever confidential data is being exchanged
Security Tools • Access control lists and port filtering protect against DoS and DDoS attacks
Security Tools • Firewalls use ACLs to control which traffic is passed or blocked
Security Tools • Intrusion Detection System (IDS) • Intrusion Prevention System (IPS)
Security Tools Wireless security: • Changing default settings • Enabling authentication • MAC filtering • Encryption
Security Tools • Host-based firewalls control inbound and outbound network traffic
Security Tools Targets of host security: • Known attacks • Exploitable services • Worms and viruses • Back doors and Trojans
Monitoring and Managing the ISP • Typical features of a Service Level Agreement (SLA):
Monitoring and Managing the ISP • Monitoring network link performance
Monitoring and Managing the ISP In-band management: • Telnet Virtual Terminal (VTY) session • Secure Shell (SSH): preferred for security
Monitoring and Managing the ISP • SNMP enables administrators to gather data about the network • Syslog uses syslog clients to generate and forward log messages to syslog servers
Backups and Disaster Recovery Factors in choosing backup media: • Amount of data • Cost of media • Performance • Reliability • Ease of offsite storage
Backups and Disaster Recovery Methods of file backup: • Normal • Differential • Incremental
Backups and Disaster Recovery How to ensure successful backups: • Swap media • Review backup logs • Trial restores • Drive maintenance
Backups and Disaster Recovery • Use TFTP to protect configurations and Cisco IOS software • Restore a Cisco IOS image using TFTP in ROMmon mode
Backups and Disaster Recovery • Steps to designing an effective recovery plan:
Backups and Disaster Recovery • Phases to creating and implementing a disaster recovery plan:
Summary • ISPs provide desktop security services for customers, such as creating passwords, implementing patches and updates, and assigning permissions. • Many protocols offer secure versions utilizing digital encryption, which should be used when the data being exchanged is confidential. • Port filtering and Access Lists use TCP and UDP port features to permit or deny traffic. • Firewalls can utilize hardware or software to define what traffic can come into or go out of parts of a network. • ISPs are responsible for providing efficient and effective backup and disaster recovery methods for their customers.