Network security principles practices l.jpg
This presentation is the property of its rightful owner.
Sponsored Links
1 / 9

Network Security Principles & Practices PowerPoint PPT Presentation


  • 111 Views
  • Uploaded on
  • Presentation posted in: General

Network Security Principles & Practices. By Saadat Malik Cisco Press 2003. – Chapter 1 – Introduction to Network Security. Model of Network Security Process Elements of Network Security Policy Elements of Network Security Design Case Study. Elements of a Network Security Policy.

Download Presentation

Network Security Principles & Practices

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Network security principles practices l.jpg

Network Security Principles & Practices

By Saadat Malik

Cisco Press

2003


Chapter 1 introduction to network security l.jpg

– Chapter 1 – Introduction to Network Security

  • Model of Network Security Process

  • Elements of Network Security Policy

  • Elements of Network Security Design

  • Case Study

Network Security


Slide3 l.jpg

Network Security


Elements of a network security policy l.jpg

Elements of a Network Security Policy

  • Based on FRC 2196 Site Security Handbook. B. Fraser. September 1997. (ftp://ftp.rfc-editor.org/in-notes/rfc2196.txt)

  • Computer technology purchasing guidelines

    – wrt security features

  • Privacy policy

    – emails, user data

  • Access policy

    – control of access to assets

  • Accountability policy

    – roles/responsibilities, auditing, incident handling

Network Security


Elements of a network security policy 2 l.jpg

Elements of a Network Security Policy (2)

  • Authentication policy (identity management)

    – passwords, remote authentication, smart cards

  • Availability statement

    – expected availability, QoS, hours

  • Maintenance policy for IT system & network

    – esp. remote admin, outsourcing

  • Violations reporting policy

    – types of violations, anonymous reporting?

  • Supporting information

    – point(s) of contact, publicity, company policies, …

Network Security


Network security design l.jpg

Network Security Design

  • Assets + Threats + Risks  Policies

  • Policies + Control measures (tools, procedures, etc.)  Design

Network Security


Elements of network security design l.jpg

Elements of Network Security Design

  • Device security features

    Admin passwords, Secure Shell, …

  • Firewalls

  • VPN

    Client-server VPN, site-to-site VPN

  • IDS

  • AAA (Radius server)

  • Access control

    Access Control Lists, Committed Access Rate

  • And more … ?

Network Security


Case study l.jpg

Case Study

  • pp. 12-21

  • Exercise A: Draw a network diagram to show the network security design of Biotech, Inc.

  • Exercise B: In Table 1-1, three criteria (confidentiality, integrity, and availability) are used in constructing the ‘critical asset risk rating’ table. Add two more criteria, origin integrity and non-repudiability, into the table, and assign risk ratings to the two new columns. Justify your answer.

Network Security


Network security design an exercise l.jpg

Network Security Design:An Exercise

  • Refer to the paper “Design of Distributed Computer Security Lab”. Journal of Computing Sciences in Colleges. Volume 20, Issue 1. October 2004. http://sce.cl.uh.edu/yang/research/DCSL%20RMCCSC04.pdf

  • Task: The DCSL lab is currently located in Delta 140. A new Computer Security Lab (CSL) is to be added to Delta 158. The new lab will consist of 30 desktop computers, connected to a switch, through which a connection to the DCSL network is established.

    • Identify the assets.

    • Identify the threats.

    • Risk Analysis.

    • Devise security policies based on the requirements you have collected from the paper and from relevant personnel.

    • Draw a network security diagram to illustrate your design of the complete DCSL and CSL labs. Indicate what control measures are to be adopted to counter the threats.

Network Security


  • Login