Planning for Network Security Security Planning Susan Lincke Security Planning: An Applied Approach | 6/21/2016 | 2 Objectives The student should be able to: Define attacks: script kiddy, social engineering, logic bomb, Trojan horse, phishing, pharming, war driving, war dialing, man-in-the-middle attack, SQL injection, virus, worm, root kit, dictionary attack, brute force attack, DOS, DDOS, botnet, spoofing, packet reply. Describe defenses: defense in depth, bastion host, content filter, packet filter, stateful inspection, circuit-level firewall, application-level firewall, de-militarized zone, multihomed firewall, IDS, IPS, NIDS, HIDS, signature-based IDS, statistical-based IDS, neural network, VPN, network access server (RADIUS/TACACS), honeypot, honeynet, hash, secret key encryption, public key encryption, digital signature, PKI, vulnerability assessment Identify techniques (what they do): SHA1/SHA2, MD2/MD4/MD5, DES, AES, RSA, ECC. Describe and define security goals: confidentiality, authenticity, integrity, non-repudiation Define service’s & server’s data in the correct sensitivity class and roles with access Define services that can enter and leave a network Draw network Diagram with proper zones and security equipment Security Planning: An Applied Approach | 6/21/2016 | 3 The Problem of Network Security The Internet allows an attacker to attack from anywhere in the world from their home desk. They just need to find one vulnerability: a security analyst need to close every vulnerability. Solution: Layered defense Security Planning: An Applied Approach | 6/21/2016 | 4 Stages of a Cyber-Operation Target Identification Reconnaissance Target Identification Opportunistic Attack: focuses on any easy-to-break-into site Gaining Access Targeted Attack: specific victim in mind Hiding Presence • Searches for a vulnerability that will work. Establish Persistence Execution Assessment Security Planning: An Applied Approach | 6/21/2016 | 5 Registrant: Microsoft Corporation Hacking Networks Reconnaissance Stage Physical Break-In Dumpster Diving Google, Newsgroups, Web sites Social Engineering • Phishing: fake email • Pharming: fake web pages WhoIs Database & arin.net Domain Name Server Interrogations One Microsoft Way Redmond, WA 98052 US Domain name: MICROSOFT.COM Administrative Contact: Administrator, Domain domains@microsoft.com One Microsoft Way Redmond, WA 98052 US +1.4258828080 Technical Contact: Hostmaster, MSN msnhst@microsoft.com One Microsoft Way Redmond, WA 98052 US +1.4258828080 Registration Service Provider: DBMS VeriSign, dbms-support@verisign.com 800-579-2848 x4 Please contact DBMS VeriSign for domain updates, DNS/Nam changes, and general domain support questions. Registrar of Record: TUCOWS, INC. Security Planning: An Applied Approach | 6/21/2016 | 6 Hacking Networks Reconnaissance Stage War Driving: Can I find a wireless network? War Dialing: Can I find a modem to connect to? Network Scanning: What IP addresses, open ports, applications exist? Protocol Sniffing: What is being sent over communications lines? Security Planning: An Applied Approach | 6/21/2016 | 7 Passive Attacks Eavesdropping: Listen to packets from other parties = Sniffing Traffic Analysis: Learn about network from observing traffic patterns Footprinting: Test to determine software installed on system = Network Mapping Login: Ginger Password: Snap Jennie Carl Bob Security Planning: An Applied Approach | 6/21/2016 | 8 Hacking Networks: Gaining Access Stage Network Attacks: IP Address Spoofing Man-in-the-Middle a aa ab ac … ba bb … aaa aab aac … System Attacks: Buffer Overflow Password Cracking SQL Injection Web Protocol Abuse Watering Hole Attack Trap Door Virus, Worm, Trojan horse Security Planning: An Applied Approach | 6/21/2016 | 9 Bill Some Active Attacks Denial of Service: Message did not make it; or service could not run Masquerading or Spoofing: The actual sender is not the claimed sender Message Modification: The message was modified in transmission Packet Replay: A past packet is transmitted again in order to gain access or otherwise cause damage Denial of Service Joe Bill Ann Spoofing Joe (Actually Bill) Ann Message Modification Joe Packet Replay Joe Bill Bill Ann Ann Security Planning: An Applied Approach | 6/21/2016 | 10 Man-in-the-Middle Attack 10.1.1.1 10.1.1.3 (2) Login (1) Login (4) Password (3) Password 10.1.1.2 Security Planning: An Applied Approach | 6/21/2016 | 11 SQL Injection Java Original: “SELECT * FROM users_table WHERE username=” + “’” + username + “’” + “ AND password = “ + “’” + password + “’”; Inserted Password: Aa’ OR ‘’=’ Java Result: “SELECT * FROM users_table WHERE username=’anyname’ AND password = ‘Aa’ OR ‘ ‘ = ‘ ‘; Welcome to My System Login: Inserted Password: foo’;DELETE FROM users_table WHERE username LIKE ‘% Java Result: “SELECT * FROM users_table WHERE username=’anyname’ AND password = ‘foo’; DELETE FROM users_table WHERE username LIKE ‘%’ Inserted entry: ‘|shell(“cmd /c echo “ & char(124) & “format c:”)|’ Password: Security Planning: An Applied Approach | 6/21/2016 | 12 Review: Password Cracking: Dictionary Attack & Brute Force Pattern Calculation Result Time to Guess (2.6x1018/month) Personal Info: interests, relatives 20 Manual 5 minutes Social Engineering 1 Manual 2 minutes 80,000 < 1 second American Dictionary 4 chars: lower case alpha 264 5x105 8 chars: lower case alpha 268 2x1011 8 chars: alpha 528 5x1013 8 chars: alphanumeric 628 2x1014 3.4 min. 8 chars alphanumeric +10 728 7x1014 12 min. 8 chars: all keyboard 958 7x1015 2 hours 12 chars: alphanumeric 6212 3x1021 96 years 12 chars: alphanumeric + 10 7212 2x1022 500 years 12 chars: all keyboard 9512 5x1023 NIST SP 800-118 Draft16 5x1028 16 chars: alphanumeric 62 Security Planning: An Applied Approach | 6/21/2016 | 13 Hacking Networks: Hiding Presence; Establishing Persistence Control system: system commands, log keystrokes, pswd Backdoor Trojan Horse Useful utility actually creates a backdoor. Replaces system User-Level Rootkit executables: e.g. Login, ls, du Command & Control Slave forwards/performs Replaces OS kernel: commands; Spyware/Adware Kernel-Level e.g. process or file Spyware: Keystroke logger Rootkit control to hide Bot collects info: passwords, Spread & infect, collect credit card #s, list email addrs, AdWare: insert ads, DDOS attacks filter search results Security Planning: An Applied Approach | 6/21/2016 | 14 Bots & Distributed Denial of Service Zombies Attacker Handler Victim Russia Bulgaria United States Can barrage a victim server with requests, causing the network to fail to respond to anyone Zombies Security Planning: An Applied Approach | 6/21/2016 | 15 Question 1. 2. 3. 4. An attack where multiple computers send connection packets to a server simultaneously to slow the firewall is known as: Spoofing DDOS Worm Rootkit Security Planning: An Applied Approach | 6/21/2016 | 16 Question 1. 2. 3. 4. A man in the middle attack is implementing which additional type of attack: Spoofing DoS Phishing Pharming Security Planning: An Applied Approach | 6/21/2016 | 17 Network Defense Encryption NETWORK SECURITY Security Planning: An Applied Approach | 6/21/2016 | 18 Security: Defense in Depth Border Router Perimeter firewall Internal firewall Intrusion Detection System Policies & Procedures & Audits Authentication Access Controls Security Planning: An Applied Approach | 6/21/2016 | 19 Bastion Host Computer fortified against attackers Applications turned off Operating system patched Security configuration tightened Security Planning: An Applied Approach | 6/21/2016 | 20 Attacking the Network What ways do you see of getting in? Border Router/Firewall The Internet De-Militarized Zone Commercial Network WLAN Internal Firewall Private Network Security Planning: An Applied Approach | 6/21/2016 | 21 Filters: Firewalls & Routers The good, the bad & the ugly… Filter The Good The bad & the ugly Route Filter: Verifies source/destination IP addresses Packet Filter: Scans headers of packets Content Filter: Scans contents of packet (e.g., IPS) Default Deny: Any packet not explicitly permitted is rejected Fail Safe or Fail Secure: If router fails, it fails shut Security Planning: An Applied Approach | 6/21/2016 | 22 Packet Filter Firewall Web Response Illegal Dest IP Address Web Request Email Response SSH Connect Request DNS Request Ping Request Illegal Source IP Address Email Response FTP request Microsoft NetBIOS Name Service Email Connect Request Telnet Request Web Response Security Planning: An Applied Approach | 6/21/2016 | 23 Informal Path of Logical Access Students & Instructors Login Desire2 Learn Campus Library Register Public: Potential Students Graduates Legend Advisors & Registrars Public Web Lab Students & Instructors Staff Nurses Public Private Confidential PoS Health Services Security Planning: An Applied Approach | 6/21/2016 | 24 Step 1: Determine Services: Who, What, Where? Service (e.g., web, sales database) Source (e.g., home, world, local computer) Workbook Destination (local server, home, world, etc.) Registration, Desire2Learn Students and Instructors: Anywhere in the World Computer Service Servers Registration Registrars and Advisers: On campus On campus students and staff. Off-campus requires login Computer Service Servers Health Services On campus: nurses office Computer Service Servers External (Internet) web services On campus: Campus labs, dorms, Anywhere in the world faculty offices Library databases Specific off-site library facilities Security Planning: An Applied Approach | 6/21/2016 | 25 Step 2: Determine Sensitivity of Services Service Name (E.g., web, email) Desire2-Learn Workbook Sensitivity Class Roles (E.g., (E.g., sales, engineering) Confidential) Private Current Students, Instructors Server (*=Virtual) Student_ Scholastic Registration Confidential Health Service Confidential Web Pages: activities, news, departments, … Public Current Students, Registration, Accounting, Advising, Instructors Nurses Student_ Students, Employees, Public Web_Services* Register Health_Services Security Planning: An Applied Approach | 6/21/2016 | 26 Isolation & Compartmentalization Compartmentalize network • by Sensitivity Class & Role Segment Network into Regions = Zones • E.g., DMZ, wireless, Payment Card Isolate Apps on Servers: • physical vs. virtual (e.g. VMware) • Virtual Servers combine onto one Physical server. has own OS and limited section of disk. Hypervisor software is interface between virtual system’s OS and real computer’s OS. Security Planning: An Applied Approach | 6/21/2016 | 27 Multi-Homed Firewall: Separate Zones Internet Screening Device: Router Private Payment Card Zone Screened Host IPS ECommerce The router serves as a screen for the Firewall, preventing Denial of Service attacks to the Firewall. Demilitarized Zone External DNS Protected Internal Network Zone IDS Database/File Servers Web Server Email Server Security Planning: An Applied Approach | 6/21/2016 | 28 Step 3: Allocate Network Zones Workbook Zone Services Internet De-Militarized Zone Wireless Network Web, Email, DNS Wireless local employees Private Databases Server Zone Confidential Payment card, health, Zone grades info Private user Wired staff/ Zone students Student Lab Student labs Zone Zone Description (You may delete or add rows as necessary) This zone is external to the organization. This zone houses services the public are allowed to access in our network. This zone connects wireless/laptop employees/students (and crackers) to our internal network. They have wide access. This zone hosts our student learning databases, faculty servers, and student servers. This highly-secure zone hosts databases with payment and other confidential (protected by law) information. This zone hosts our wired/fixed employee/classroom computer terminals. They have wide univ. & external access. This zone hosts our student lab computers, which are highly vulnerable to malware. They have wide access Security Planning: An Applied Approach | 6/21/2016 | 29 Step 4: Define Controls Workbook Zone DeMilitarized Zone Server (*=Virtual) Service Web_ Web, Services*, Email, Email_Serve DNS r DNS_Server Wireless Wireless local Network users StudentScho Classroom Private Server Zone lastic software, Student_File Faculty & student s Faculty_File storage. s Required Controls (Conf., Integrity, Auth., Nonrepud., with tools: e.g., Encryption/VPN, hashing, IPS) Hacking: Intrusion Prevention System, Monitor alarm logs, Anti-virus software within Email package. Confidentiality: WPA2 Encryption Authentication: WPA2 Authentication Confidentiality: Secure Web (HTTPS), Secure Protocols (SSH, SFTP). Authentication: Single Sign-on through TACACS Hacking: Monitor logs Security Planning: An Applied Approach | 6/21/2016 | 30 Bill Data Privacy Confidentiality: Unauthorized parties cannot access information Confidentiality Authenticity Joe Joe (Actually Bill) Bill (->Secret Key Encryption) Authenticity: Ensures claimed sender = actual sender. (->Public Key Encryption) Integrity: Ensures the message is not modified in transmission. Ann Integrity Joe (->Digital Signature) Non-Repudiation Joe Bill (->Hashing) Nonrepudiation: Ensures sender cannot later deny sending message. Ann Ann Ann Security Planning: An Applied Approach | 6/21/2016 | 31 Confidentiality: Encryption – Secret Key Examples: DES, AES plaintext Encrypt Ksecret ciphertext Decrypt Ksecret plaintext Sender, Receiver have IDENTICAL keys Plaintext = Decrypt(Ksecret, Encrypt(Ksecret,Plaintext)) NIST Recommended: 3DES w. CBC AES 128 Bit Security Planning: An Applied Approach | 6/21/2016 | 32 Confidentiality, Authentication, Non-Repudiation Public Key Encryption Examples: RSA, ECC, Quantum Sender, Receiver have Complimentary Keys Plaintext = Decrypt(kPRIV, Encrypt(kPUB,Plaintext)) Joe Joe Encrypt Kpublic Decrypt Kpublic Encryption (e.g., RCS) Message, private key Authentication, Non-repudiation Digital Signature Decrypt Kprivate Encrypt Kprivate Key owner Key owner Plaintext = Decrypt(kPUB, Encrypt(kPRIV,Plaintext)) NIST Recommended: 2011: RSA 2048 bit Security Planning: An Applied Approach | 6/21/2016 | 33 Confidentiality: Remote Access Security Firewall The Internet VPN Concentrator Virtual Private Network (VPN) often implemented with IPSec Can authenticate and encrypt data through Internet (red line) Easy to use and inexpensive Difficult to troubleshoot Susceptible to malicious software and unauthorized actions Often router or firewall is the VPN endpoint Security Planning: An Applied Approach | 6/21/2016 | 34 Integrity: Secure Hash Functions Examples: HMAC, SHA-2, SHA-3 Ensures the message was not modified during transmission Message Message H Message H Compare Secure Hash H H H K H K K Message Message H H K Message HMAC H = Hash Algorithm K=Encryption Key H=Hashed Value Transmitted Hash H H Compare H NIST Recommended: SHA-2, SHA-3 Security Planning: An Applied Approach | 6/21/2016 | 35 Non-Repudiation: Digital Signature Electronic Signature Uses public key algorithm Verifies integrity of data Verifies identity of sender: non-repudiation Message Encrypted K(Sender’s Private) Msg Digest Security Planning: An Applied Approach | 6/21/2016 | 36 Authentication: Public Key Infrastructure (PKI) 7. Tom confirms Sue’s DS 5. Tom requests Sue’s DC 6. CA sends Sue’s DC Tom 4. Sue sends Tom message signed with Digital Signature Digital Certificate User: Sue Public Key: 2456 Certificate Authority (CA) 3. Send approved Digital Certificates 1. Sue registers with CA through RA Sue Register(Owner, Public Key) 2. Registration Authority (RA) verifies owners Security Planning: An Applied Approach | 6/21/2016 | 37 Hacking Defense: Intrusion Detection/Prevention Systems (IDS or IPS) Router IDS Firewall Network IDS=NIDS Examines packets for attacks Can find worms, viruses, or defined attacks Warns administrator of attack IPS=Packets are routed through IPS Host IDS=HIDS Examines actions or resources for attacks Recognize unusual or inappropriate behavior E.g., Detect modification or deletion of special files Security Planning: An Applied Approach | 6/21/2016 | 38 IDS/IPS Intelligence Systems 90 NastyVirus 80 NIDS: ALARM!!! 70 60 Sales Personnel Factory 50 40 Attacks: 30 NastyVirus 20 Normal BlastWorm Signature-Based: Specific patterns are recognized as attacks 10 0 Mon. Tues. Wed. Thurs. Statistical-Based: The expected behavior of the system is understood If variations occur, they may be attacks (or maybe not) Neural Networks: Statistical-Based with self-learning (or artificial intelligence) Recognizes patterns Security Planning: An Applied Approach | 6/21/2016 | 39 Hacking Defense: Evaluating Applications Unified Threat Management = SuperFirewall = firewall + IPS + anti-virus + VPN capabilities • Concerns are redundancy and bandwidth. Blacklist= restrict access to particular web sites, e.g., social, email sites Whitelist= permit access to only a limited set of web sites. Security Planning: An Applied Approach | 6/21/2016 | 40 Hacking Defense: Honeypot & Honeynet Honeypot: A system with a special software application which appears easy to break into Honeynet: A network which appears easy to break into Purpose: Catch attackers All traffic going to honeypot/net is suspicious If successfully penetrated, can launch further attacks Must be carefully monitored Firewall Honey Pot External DNS IDS Web Server E-Commerce VPN Server Security Planning: An Applied Approach | 6/21/2016 | 41 Hacking Defense: Vulnerability Assessment Scan servers, work stations, and control devices for vulnerabilities Open services, patching, configuration weaknesses Testing controls for effectiveness Adherence to policy & standards Penetration testing Security Planning: An Applied Approach | 6/21/2016 | 42 Step 5: Draw Network Diagram Workbook Internet Router Demilitarized Zone External DNS Email Firewall Public Web Server E-Commerce Zone 3:Confidential Data Zone 1: Student Labs & Files Student Scholastic Zone 2: Faculty Labs & Files Student Records Student Billing Student Billing Student History Transcripts Security Planning: An Applied Approach | 6/21/2016 | 43 Path of Logical Access How would access control be improved? Border Router/ Firewall The Internet De-Militarized Zone WLAN Private Network Router/Firewall Security Planning: An Applied Approach | 6/21/2016 | 44 Protecting the Network Border Router: Packet Filter The Internet De-Militarized Zone Bastion Hosts WLAN Private Network Proxy server firewall Security Planning: An Applied Approach | 6/21/2016 | 45 University Scenario: Dual in-line Firewalls Security Planning: An Applied Approach | 6/21/2016 | 46 Writing Rules Policies Corrections Network Filter Capabilities Write Rules Audit Failures Protected Network Fail-Safe: If the filter fails, it fails closed Default Deny: If a specific rule does not apply, The packet is dropped. Security Planning: An Applied Approach | 6/21/2016 | 47 Firewall Configurations terminal host firewall A A terminal host firewall A A A Router Packet Filtering: Packet header is inspected Single packet attacks caught Very little overhead in firewall: very quick High volume filter Stateful Inspection State retained in firewall memory Most multi-packet attacks caught More fields in packet header inspected Little overhead in firewall: quick Security Planning: An Applied Approach | 6/21/2016 | 48 Firewall Configurations terminal host firewall A B A B terminal host firewall A B A B Circuit-Level Firewall: Packet session terminated and recreated via a Proxy Server All multi-packet attacks caught Packet header completely inspected High overhead in firewall: slow Application-Level Firewall Packet session terminated and recreated via a Proxy Server Packet header completely inspected Most or all of application inspected Highest overhead: slow & low volume Security Planning: An Applied Approach | 6/21/2016 | 49 Summary of Controls Confident. Integrity Authen. Nonrepud. Encryption Protocols: S-HTTP, HTTPS, SSL, SSH2, x PGP, S/MIME ? ? Virtual Private Network (VPN): IPsec x x x Wireless: WPA2, TKIP, IEEE 802.11i x x x Hashing: HMAC, SHA, MD5 x Digital Signature x x x x Public Key Infrastructure x Centralized Access Control: RADIUS, TACACS Kerberos Authentication: biometric, flash drive, token x x x x AntiHack Security Planning: An Applied Approach | 6/21/2016 | 50 Confident. Integrity Authen. Nonrepud. AntiHack Firewall, App. or web firewall x Mobile device mgmt x Antivirus, Endpoint Security x Event Logs/SIEM x Intrusion Detection/Prevention Systems x Unified Threat Mgmt x Vulnerability Assessment x Risk, Policy Mgmt x Honeypot/Honeynet x Email security mgmt Bastion host x x x Security Planning: An Applied Approach | 6/21/2016 | 51 Question A map of the network that shows where service requests enter and are processed 1. Is called the Path of Physical Access 2. Is primarily used in developing security policies 3. Can be used to determine whether sufficient Defense in Depth is implemented 4. Helps to determine where antivirus software should be installed Security Planning: An Applied Approach | 6/21/2016 | 52 Question 1. 2. 3. 4. The filter with the most extensive filtering capability is the Packet filter Application-level firewall Circuit-level firewall State Inspection Security Planning: An Applied Approach | 6/21/2016 | 53 Question The technique which implements non-repudiation is: 1. Hash 2. Secret Key Encryption 3. Digital Signature 4. IDS Security Planning: An Applied Approach | 6/21/2016 | 54 Question 1. 2. 3. 4. Anti-virus software typically implements which type of defensive software: Neural Network Statistical-based Signature-based Packet filter Security Planning: An Applied Approach | 6/21/2016 | 55 Question 1. 2. 3. 4. MD5 is an example of what type of software: Public Key Encryption Secret Key Encryption Message Authentication PKI Security Planning: An Applied Approach | 6/21/2016 | 56 Question 1. 2. 3. 4. A personal firewall implemented as part of the OS or antivirus software qualifies as a: Dual-homed firewall Packet filter Screened host Bastion host Security Planning: An Applied Approach | 6/21/2016 | 57 Summary Step 1: Determine Services: What, Who, Where? • Who accesses which services from where? Step 2: Determine Sensitivity of Services • Compartmentalization or Separation partitions services across physical or virtual servers to provide protection between them Step 3: Allocate Network Zones • Compartmentalization partitions a network to provide protection Step 4: Define Controls • Confidentiality, authenticity, integrity, non-repudiation controls • Anti-hacker controls Step 5: Draw the Network Diagram Security Planning: An Applied Approach | 6/21/2016 | 58 Jamie Ramon MD Doctor Chris Ramon RD Dietician Terry Pat Licensed Software Consultant Practicing Nurse HEALTH FIRST CASE STUDY Designing Network Security Security Planning: An Applied Approach | 6/21/2016 | 59 Defining Services which can Enter and Leave the Network Service Source Destination (e.g., home, world, local computer) (local server, home, world, etc.) Security Planning: An Applied Approach | 6/21/2016 | 60 Defining Services and Servers Workbook Service (e.g., web, sales database) Source (e.g., home, world, local computer) Destination (local server, home, world, etc.) Registration, Desire2Learn Students and Instructors: Anywhere in the World Computer Service Servers Registration Registrars and Advisers: On campus On campus students and staff. Off-campus requires login Computer Service Servers Health Services On campus: nurses office Computer Service Servers External (Internet) web services On campus: Campus labs, dorms, Anywhere in the world faculty offices Library databases Specific off-site library facilities Security Planning: An Applied Approach | 6/21/2016 | 61 Define Services & Servers Which data can be grouped together by role and sensitivity/criticality? Confidential – Management Service Name Privileged – Contracts Sensitivity Class. Roles Access Public – Web Pages with Server Name Security Planning: An Applied Approach | 6/21/2016 | 62 Evaluating Service Classes & Roles Workbook Service Name (E.g., web, email) Desire2-Learn Sensitivity Class Roles (E.g., (E.g., sales, engineering) Confidential) Private Current Students, Instructors Server (*=Virtual) Student_ Scholastic Registration Confidential Health Service Confidential Web Pages: activities, news, departments, … Public Current Students, Registration, Accounting, Advising, Instructors Nurses Student_ Students, Employees, Public Web_Services* Register Health_Services Security Planning: An Applied Approach | 6/21/2016 | 63 Defining Zones and Controls Compartmentalization: Zone = Region (E.g., DMZ, wireless, internet) Servers can be physical or virtual Zone Service Server Required Controls (Conf., Integrity, Auth., Nonrepud., with tools: e.g., Encryption/VPN) Security Planning: An Applied Approach | 6/21/2016 | 64 Defining Zones Workbook Zone Services Internet De-Militarized Zone Wireless Network Web, Email, DNS Wireless local employees Private Databases Server Zone Confidential Payment card, health, Zone grades info Private user Wired staff/ Zone students Student Lab Student labs Zone Zone Description (You may delete or add rows as necessary) This zone is external to the organization. This zone houses services the public are allowed to access in our network. This zone connects wireless/laptop employees/students (and crackers) to our internal network. They have wide access. This zone hosts our student learning databases, faculty servers, and student servers. This highly-secure zone hosts databases with payment and other confidential (protected by law) information. This zone hosts our wired/fixed employee/classroom computer terminals. They have wide univ. & external access. This zone hosts our student lab computers, which are highly vulnerable to malware. They have wide access Security Planning: An Applied Approach | 6/21/2016 | 65 Defining Controls for Services Workbook Zone DeMilitarized Zone Server (*=Virtual) Service Web_ Web, Services*, Email, Email_Serve DNS r DNS_Server Wireless Wireless local Network users StudentScho Classroom Private Server Zone lastic software, Student_File Faculty & student s Faculty_File storage. s Required Controls (Conf., Integrity, Auth., Nonrepud., with tools: e.g., Encryption/VPN, hashing, IPS) Hacking: Intrusion Prevention System, Monitor alarm logs, Anti-virus software within Email package. Confidentiality: WPA2 Encryption Authentication: WPA2 Authentication Confidentiality: Secure Web (HTTPS), Secure Protocols (SSH, SFTP). Authentication: Single Sign-on through TACACS Hacking: Monitor logs Security Planning: An Applied Approach | 6/21/2016 | 66 Draw the Network Diagram Internet Router Demilitarized Zone External DNS Email Firewall Public Web Server E-Commerce Zone 3:Student Data Zone 1: Student Labs & Files Student Scholastic Zone 2: Faculty Labs & Files Student Records Student Billing Student Billing Student History Transcripts Security Planning: An Applied Approach | 6/21/2016 | 67 MS Visio Diagram