1 / 11

Network Security 101

Network Security 101. By: David Crim. Security. Balance between oposing interests Security v.s. Convienience Security v.s. Resources Security v.s. Risk. Security v.s. Convenience. Long Passwords, or easy to remember Open access, or forced authentication http web-site, or https.

kuss
Download Presentation

Network Security 101

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Security 101 By: David Crim

  2. Security • Balance between oposing interests • Security v.s. Convienience • Security v.s. Resources • Security v.s. Risk

  3. Security v.s. Convenience • Long Passwords, or easy to remember • Open access, or forced authentication • http web-site, or https

  4. Security v.s. Resources • $$$ • Configuration of devices • Review of logs • Follow through on problems • Create and enforce policies

  5. Security v.s. Risk • Telnet v.s. SSH • Credit Card company v.s. weblog • Microsoft v.s. local shop

  6. Security Scope • You secure your house with alarm systems, a Doberman, barbed wire, electric fences,etc… • Result: Your house is more secure • For you! • Police View • The robbery is still going to happen • This simply shifts the security risk around

  7. Network Security • Traffic Control • Firewalls • ACLs • Traffic Management • Packetshaper • NetFlow • Authentication • Passwords / biometrics • Policies

  8. Traffic Control • Firewall • Cisco PIX • IP Cop / Smoothwall • Windows Firewall • ACLs • VLAN • Subnet • Intranet <-> Internet

  9. Traffic Management • Packetshaping • Packeteer Packetshaper • Linux tools • NetFlows • Ntop • Cisco NetFlow accounting

  10. Authentication • Passwords • Complexity • Length • Upper/Lower case • Special characters • Expiration • Rules • Password = lv89jdNm45 • Rule – All numbers are proceeded by N+1 • Written “hint” = lv8jdNm4 • Rule 2 – All n’s are capitalized • Written “hint” becomes lv8jdnm4

  11. Policies • Enforceable policies • Passwords • ACLs • Proxy servers • Unenforceable policies • Network attachment • EULA • Plausible deniability 

More Related