+ All Categories
Home > Documents > Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Date post: 22-Dec-2015
Category:
Upload: caroline-lambert
View: 217 times
Download: 0 times
Share this document with a friend
Popular Tags:
18
Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013
Transcript
Page 1: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Physical and Hardware Security

Chapter 15Networking Essentials

Spring, 2013

Page 2: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Defining FirewallsFirewalls are a combination of ___ & ___

What is a “black box?” (p. 502)

Default deny or default allow – which one?

Page 3: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Types of FirewallsNetwork-based firewalls protect __ from __.

Host-based firewalls protect ____.

Page 4: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Access Control ListsHow they are processed

Lines are compared in sequential orderAfter a match is made, ACL is exitedImplicit deny at the end – why?

Standard ACLs vs Extended ACLsInbound vs outbound ACLs

Page 5: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Ways to make things more secure

DMZ - Image on page 507Protocol switching – shift to IPX – why?Proxy Services

IP proxyWeb proxyFTP proxySMTP proxy

Page 6: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

More Firewall StuffNetwork Layer Firewalls

Stateful – Stateless –

Application Layer FirewallsSlower, because they …

Page 7: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Scanning ServicesDefault Scanning Settings:

Page 8: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Filtering for ContentCommon things to filter:

Page 9: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Local Browser SettingsZones

Trusted Sites

Customizing Settings

Page 10: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Intrusion Detection Systems (IDS)

More of a watchdog than a firewallCan be software or an actual devicePassive responses:

(honeypot) -

Page 11: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

VPN ConcentratorsLike a firewall, but made for VPNs

Allows for higher-speed throughput

Allows for encryption

Page 12: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Problems Affecting Device Security

Physical security – where to keep stuff

Climate conditions –

Three barriers to your server –

Security zones ID Badges

Page 13: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Logical Security Configurations

Logging On LocallyOnly administrator can log onto server

Administrator must log on locally – why?

Page 14: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Access-Control PrinciplesUtilize implicit denies

(UNIX) - .allow file(UNIX) - .deny file

Least-privilege model

Separate administrative duties

Rotate administrator jobs

Page 15: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Access Control MethodsMandatory Access Control (MAC) Model…Discretionary Access Control (DAC)… Role-Based Access Control (RBAC)…Rule-Based Access Control (RBAC)…

Page 16: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Unsecure Protocols (UNIX) –(UNIX) –

Page 17: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Secure Protocols

Page 18: Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Recommended