slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
Dr. Adeel Akram UET Taxila PowerPoint Presentation
Download Presentation
Dr. Adeel Akram UET Taxila

Loading in 2 Seconds...

play fullscreen
1 / 106

Dr. Adeel Akram UET Taxila - PowerPoint PPT Presentation

  • Uploaded on

Securing Enterprise Network Infrastructure (Towards secure internetworking on Pakistan Educational Research Network). Dr. Adeel Akram UET Taxila. Outline. Introduction to Enterprise Network Enterprise Network Architectures Securing Enterprise Networks

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

Dr. Adeel Akram UET Taxila

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. Securing Enterprise Network Infrastructure (Towards secure internetworking on Pakistan Educational Research Network) Dr. Adeel Akram UET Taxila

    2. Outline • Introduction to Enterprise Network • Enterprise Network Architectures • Securing Enterprise Networks • Enterprise Network Security Requirements • Pakistan Educational Research Network • Type of Network Attacks and Vulnerabilities • Case Studies • Hacking of Educational and Govt. Websites !!! • Lessons Learnt • Recommendations

    3. Introduction to Enterprise Network Enterprise Network is the network that allows communication and resource-sharing among all of a company's business functions and workers. In some cases, Enterprise network would even include the company's suppliers, contractors and distributors. It consists of hardware, software and media connecting information technology resources of an organization.

    4. Enterprise Network Architectures

    5. Securing Enterprise Networks

    6. Securing Enterprise Networks

    7. Securing Enterprise Networks

    8. Securing Enterprise Networks

    9. Securing Enterprise Networks

    10. Enterprise Network Security Requirements Network security has become increasingly more difficult to manage and evaluate, even as industry and government compliance requirements have become more demanding.

    11. Enterprise Network Security Requirements The network threats are real, and costly. Internal and external vulnerabilities can cause business disruption, loss of revenue, or loss of operational efficiencies. Because network security can be breached from both internal and external sources, traditional perimeter firewalls are not enough to protect the network.

    12. Enterprise Network Security Requirements Enterprise networks require new network security tools, network appliances, and professional services to secure large and small networks. The following slides show key components of network security that are now required in all organizations to secure their networks:

    13. Enterprise Security Key Components Unified Threat Management (UTM) Firewalls Network Access Control (NAC), or ROLE-based Networking Mobile Computer Client Protection Event Correlation and Log Analysis Layer-7 Visibility and Packet Analysis Managed Services

    14. Enterprise Network Security Requirements • Unified Threat Management (UTM) Firewalls • It is too costly and operationally inefficient to add-on each separate component as security threats emerge. Today's solutions use multiple scanning methods and multiple defense layers in high-throughput appliances. IDS/IPS, Anti-Virus, Content-Filtering, VPN, Anti-Spam, P2P control, etc. all needs to be included in a network security solution.

    15. Enterprise Network Security Requirements • Network Access Control (NAC), or ROLE-based Networking • Creating differentiated network services based on individual access requirements is the key. The era of every user's ability to browse to all network resources should be over. Role-based networking is required to limit visibility to networks, servers, and TCP/IP ports and protocols, regardless of the user's point-of-entry into the network.

    16. Enterprise Network Security Requirements • Mobile Computer Client Protection • Also referred to as "Mobile NAC", all network devices that can leave and join the network need to have accountability and control regardless of location. The ability to control laptops, PDA's, and other mobile devices when they are not connected to a VPN session is a key requirement.

    17. Enterprise Network Security Requirements • Event Correlation and Log Analysis • Security threats cannot be stopped by reviewing logs in "post-mortem" analysis. To stop "zero-day" threats, the network needs event-correlation and adaptive-response tools. While SNMP report tools are important for network engineers responsible for network health, other tools are required to correlate client, server, and firewall activities with computer application processes.

    18. Enterprise Network Security Requirements • Layer-7 (Application Layer) Visibility and Packet Analysis • The ability to classify all applications regardless of port and protocol is essential for both security and performance analysis. In-line devices for analyzing and reporting network traffic across all OSI layers are essential for compliance, security assessment, and resolving performance issues.

    19. Enterprise Network Security Requirements • Managed Services • Many companies can not become experts in Cyber-Security, PC/Server Management, Regulatory Compliance, and Disaster Recovery. But even small businesses are impacted by critical data security threats and technology maintenance hurdles that detract from the core business goals. Managed Services offer expertise on contractual basis.

    20. Educational Enterprise Network Pakistan Education and Research Network

    21. Pakistan Educational Research Network PERN - Pakistan Education and Research Network is a national research and education network of Pakistan which connects premiere educational and research institutions of the country.

    22. Pakistan Educational Research Network PERN focuses on collaborative research, knowledge sharing, resource sharing, and distance learning by connecting people through the use of Intranet and Internet resources.

    23. Pakistan Educational Research Network

    24. Types of Network Attacks Web-Hacking-Incident-Database -

    25. Top Application Vulnerabilities Web-Hacking-Incident-Database -

    26. Top Attack Outcomes Web-Hacking-Incident-Database -

    27. Hacking Statistics for

    28. Hacking Statistics for

    29. Cyber Attack Response Procedure

    30. FBI Cybercrime Investigation Procedure To ensure that your organization can react to an incident efficiently, make sure that staff knows who is responsible for cyber security and how to reach them. The following steps will help you document an incident and assist federal, state, and local law enforcement agencies in their investigation (be sure to act in accordance with your organization's polices and procedures):

    31. FBI Cybercrime Investigation Procedure • Preserve the state of the computer at the time of the incident by making a backup copy of logs, damaged or altered files, and files left by the intruder. • If the incident is in progress, activate auditing software and consider implementing a keystroke monitoringprogram if possible.

    32. FBI Cybercrime Investigation Procedure To report an incident to the FBI, you can submit a tip report at • Document the losses suffered by your organization as a result of the incident. These could include: • estimated number of hours spent in response/recovery • cost of temporary help • cost of damaged equipment • value of data lost • amount of credit given to customers for inconvenience • loss of revenue • value of any trade secrets

    33. National Response Centre For Cyber Crimes • To report an incident to the NR3C visit: • Federal Investigation Agency Headquarters • Sector-G-9/4, Islamabad • Ph. 051-9261686, Fax. 051-9261685 NR3C CERT (Computer Emergency Response Team) Forensic Lab R&D Implementation of Standards & Procedures Media and Projection Cell Technology Development Center Network Operations & Security Liaison with LEA(s) & public /private sector organizations Trainings & Seminars Legal Regularity & Issues

    34. Case Studies UET Taxila – Internal Website(s) Hacked HEC Website(s) – Hacked LUMS Website(s) – Hacked Ministry of Information and Broadcasting Website – Hacked FIA’s National Response Center for Cyber Crime Website

    35. UET Taxila Website(s) Hacked

    36. UET Taxila’s Internal Website Hacked in 2006 !

    37. Email from Hackers

    38. The Next Day

    39. Searched for traces of Hackers • Event Viewer • Application Logs • System Logs • Security Logs • User Manager • Any Accounts Modifications • New Accounts Creation • Rights requests

    40. Checked Systems for Trojan Horses See if any backdoor is created on the system Try to figure out how hackers accomplished to hack the system Check Task Manager for any suspicious running process Check System/Firewalls Security Logs

    41. Search the Logs

    42. Checked Logs on the DHCP Server • Cross Checked the MAC Address of Hackers from their IP • 00-01-02-08-37-A8

    43. Checked Hostel Switch Logs • Went to Hostel Switch and checked this MAC address binds to which switch port • Port Number 31 on Switch • Consulted the Hostel Network Diagrams to find out Room Number for Port # 31 • Room Number 41

    44. Hackers Caught Red-Handed

    45. Website Restored to Original State

    46. Observations The site was hacked by our own students who were doing internship in Network Center on Windows Server Administration They were also developing student-portal website on the same server and were given administrative rights on the web server They misused their rights to hack the site

    47. The defacing of UET TAXILA’s Examination website in August 2007

    48. Hacked by Whom? • There were 5 main IP addresses that used the URL responsible for hacking and planting the pages on our alpha webserver ! • • • • •