physical and hardware security chapter 15 networking essentials spring, 2013

18
Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Upload: caroline-lambert

Post on 22-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Physical and Hardware Security

Chapter 15Networking Essentials

Spring, 2013

Page 2: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Defining FirewallsFirewalls are a combination of ___ & ___

What is a “black box?” (p. 502)

Default deny or default allow – which one?

Page 3: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Types of FirewallsNetwork-based firewalls protect __ from __.

Host-based firewalls protect ____.

Page 4: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Access Control ListsHow they are processed

Lines are compared in sequential orderAfter a match is made, ACL is exitedImplicit deny at the end – why?

Standard ACLs vs Extended ACLsInbound vs outbound ACLs

Page 5: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Ways to make things more secure

DMZ - Image on page 507Protocol switching – shift to IPX – why?Proxy Services

IP proxyWeb proxyFTP proxySMTP proxy

Page 6: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

More Firewall StuffNetwork Layer Firewalls

Stateful – Stateless –

Application Layer FirewallsSlower, because they …

Page 7: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Scanning ServicesDefault Scanning Settings:

Page 8: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Filtering for ContentCommon things to filter:

Page 9: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Local Browser SettingsZones

Trusted Sites

Customizing Settings

Page 10: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Intrusion Detection Systems (IDS)

More of a watchdog than a firewallCan be software or an actual devicePassive responses:

(honeypot) -

Page 11: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

VPN ConcentratorsLike a firewall, but made for VPNs

Allows for higher-speed throughput

Allows for encryption

Page 12: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Problems Affecting Device Security

Physical security – where to keep stuff

Climate conditions –

Three barriers to your server –

Security zones ID Badges

Page 13: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Logical Security Configurations

Logging On LocallyOnly administrator can log onto server

Administrator must log on locally – why?

Page 14: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Access-Control PrinciplesUtilize implicit denies

(UNIX) - .allow file(UNIX) - .deny file

Least-privilege model

Separate administrative duties

Rotate administrator jobs

Page 15: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Access Control MethodsMandatory Access Control (MAC) Model…Discretionary Access Control (DAC)… Role-Based Access Control (RBAC)…Rule-Based Access Control (RBAC)…

Page 16: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Unsecure Protocols (UNIX) –(UNIX) –

Page 17: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

Secure Protocols

Page 18: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013