1 / 13

Securing the Business Network

Securing the Business Network. Network Security. Physical Security. The first rule of network security is to ensure physical security. Physical security refers to the sometimes dreary task of ensuring that only authorized people have physical access to your systems.

holly
Download Presentation

Securing the Business Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Securing the Business Network Network Security

  2. Physical Security • The first rule of network security is to ensure physical security. • Physical security refers to the sometimes dreary task of ensuring that only authorized people have physical access to your systems. • Physical security is all about who has access to the equipment. • Computer rooms should use a RFID (Radio Frequency Identification) card or token to access secured areas and to log access in a database. http://www.techrepublic.com/article/lock-it-down-dont-overlook-physical-security-on-your-network/

  3. Radio Frequency Identification (RFID)

  4. Password Protection • The second rule of security is to use a strong password. • A password should contain at least eight (8) characters, in combination with at least 3 upper/lowercase letters, punctuation, symbols, and numerals. • Changing your password often is a must, as well. http://www.microsoft.com/security/online-privacy/passwords-create.aspx

  5. Installation and Activation of Firewalls • A firewall is a security device that can be a software program or a dedicated network appliance. • The main purpose of a firewall is to separate a secure area from a less secure area and to control communications between the two. • Firewalls control inbound and outbound communications on anything from a single machine to an entire network. http://whatismyipaddress.com/firewall

  6. Wireless Network Safety and Security • Use encryption on your wireless access points (AP). • Make sure to hide your SSID (service set identifier), or at least change its name to something common. • If your router (wired or wireless) has a Web management interface, disable access from the outside network. • Change the admin default password now. • Make sure all of your PCs use antivirus software and if you're using Windows, add antispyware protection. • If you are running a Web server on your LAN, put it on a DMZ. http://www.computerworld.com/s/article/9003012/10_tips_to_secure_your_small_business_network_?pageNumber=1

  7. Wireless Network Safety and Security cont. • Scan web servers regularly for exploits. • Change all of your access passwords regularly. • Use a VPN for access back to your local LAN or your remote Web server. • Disable file/print sharing on everything other than your file server. • Use whole disk encryption on all laptops that will ever leave home. • Start doing regular off-site backups now. • Get a firewall. • Password protect your firewall. • Update your router’s firmware. http://www.smallbusinesscomputing.com/webmaster/article.php/10732_3935021_2/10-Network-Security-Steps-for-Every-Small-Business.htm

  8. Wireless Network Safety and Security cont. • Block pings • Lock down your IP addresses and ports • Use VLANs • Get an IPS (Intrusion Prevention System) • Get a WAF (Web-Application Firewall) • Use a VPN http://www.smallbusinesscomputing.com/webmaster/article.php/10732_3935021_3/10-Network-Security-Steps-for-Every-Small-Business.htm

  9. Financial Districts Wi-Fi Security Survey Key Findings: Widespread Use of Insecure Practices • Visited 7 financial districts (6 in US, 1 in UK) • Scanned Wi-Fi signal for 5 minutes at randomly selected location • 3632 APs scanned • 547 Clients scanned • Picked up Wi-Fi signals at 30 randomly selected points in: New York, Chicago, Boston, Wilmington, DE, Philadelphia, San Francisco, London • A sample Wi-Fi trace tells a lot about network security posture in each location. http://www.airtightnetworks.com/home/resources/knowledge-center/financial-districts-scanning-report.html

  10. 8 Essential Features for a Business Router • Wi-Fi Access Point (802.11n or the draft version 802.11ac) • Guest Wi-Fi Access • Virtual LANs and multiple SSIDs • VPN Server and Client • USB port for printers or drives • Malware and spam protection • Dual or backup WAN port (or 4G support) • RADIUS Server http://www.pcworld.com/article/2038219/8-essential-features-you-need-in-a-business-router.html

  11. Choosing to Hire a Networking Security Professional • Do you specialize in working with small and medium-sized businesses (SMBs)? • What do I need to add to my network? • How can I minimize my overall costs? • What happens if there's a problem? • What do we need to do to prepare? http://www.cisco.com/web/solutions/smb/need_to/secure_my_business_primer.html#4

  12. Certified Ethical Hackers • An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. • A Certified Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker. • Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the victim system(s) or network(s) is not. • The certification is in Version 8 as of late 2013.

  13. Reference Page • http://www.cisco.com/web/solutions/smb/need_to/secure_my_business_primer.html#4 • http://www.smallbusinesscomputing.com/webmaster/article.php/10732_3935021_3/10-Network-Security-Steps-for-Every-Small-Business.htm • http://www.computerworld.com/s/article/9003012/10_tips_to_secure_your_small_business_network_?pageNumber=1 • http://whatismyipaddress.com/firewall • http://www.microsoft.com/security/online-privacy/passwords-create.aspx • http://www.techrepublic.com/article/lock-it-down-dont-overlook-physical-security-on-your-network • http://www.airtightnetworks.com/home/resources/knowledge-center/financial-districts-scanning-report.html • http://en.wikipedia.org/wiki/Certified_Ethical_Hacker • http://www.pcworld.com/article/2038219/8-essential-features-you-need-in-a-business-router.html

More Related