Uploaded by Sachintha Prabashwara

Computing Unit 5 Security LO2 -UPDATED

advertisement
A.Sai Thishok
BSc (Hons) Management of IT
University of Wolverhampton
Learning Outcome - 02
IT Security Solutions
IT SECURITY SOLUTIONS
• NETWORK SECURITY INFRASTRUCTURE
• NETWORK PERFORMANCES
• DATA SECURITY
• DATA CENTRE
• SECURITY VULNERABILITY
NETWORK SECURITY INFRASTRUCTURE
•
•
•
•
•
•
•
•
•
VPN - Virtual Private Network
Clever firewall solution
Intrusion Detection and Prevention
Identity and Access Management (IAM)
Antivirus/antimalware solutions
Disaster recovery
Cryptography
Web filtering
DMZ
VPN - Virtual Private Network
• Encrypted
• No Logs Policy
• Location is private
Paid
* Strong Data Encryption
* Online Privacy Protection
* Lightning fast servers
* No logs policy
Free (3rd Party)
* Less secure protocols
* Lower Connection servers
* Poor Support Assistance
Clever firewall solution
• 3 Types
– Packet Filtering Firewall
– Application / Proxy Firewall
– Hybrid Firewall
• Proxy Firewall
• This don’t let internet know which computer wants to request the
website. This hides us from the attackers in internet
Intrusion Detection and Prevention
• Network Monitoring tools
• IDS – Intrusion Detection System
• IPS – Intrusion Prevention System
Identity and Access Management (IAM)
•
Defining and Managing the roles and access privilege of individual Network Users
•
The Solutions which users have permission (Allowed / Denied)
•
IAM can be
– Customer IAM
– Employee IAM
•
One digital identity per individual, once that individual identity has been established, it
must be maintained & monitored
IAM TOOLS
•
•
•
•
•
Password Management
Security Management
Reporting & Monitoring
Cryptography
Antivirus/antimalware solutions
•
To Prevent, Detect and Remove malicious Software / Apps
Disaster recovery
•
•
•
•
•
•
Create DR Team
Identify and Assess Disaster Risk
Determine critical App. Doc and Resources
Specify Backup & Off-Site Storage procedure
Test & Maintain the DRP
Emergency Contact
•
•
DR Considered as a subset of Business Continuity
Companies with Major loss of Data from 2015
– 43% never able to recover data
– 29% closed in 2 years minimum
Data Backup
– Frequency – Depend on data some data backed up continuously / Real Time (Capturing at real times)
– Retention
•
Disaster recovery (Contd..)
•
Best Practices
•
•
•
•
Practice the Recovery
Review Regularly
Back up confirmation
Elements of DR
• Create DR Team
• Identify and Assess Disaster Risk
• Determine Critical Apps / Docs / Resources
• Specify Backup & Off-Site Software Procedure
•
•
What to backup / by whom / how to perform the backup / how frequently backup should happen / location of backup
Test & Maintain the DRP
Cryptography
• Encryption – Decryption
• Symmetric Key
• Asymmetric Key
• Hash Function
Web filtering
• Commonly referred as “Content Control Software”
• Commonly used for
• Prevention tool for Malware / Host Malware
•
Web Filtering Software
–
–
–
–
–
–
Net Nanny
Web Titan
K9
Save Squid
Dans Guardian (Best for Linux)
Open DNS
DMZ
•
•
A real DMZ is a separate network which has no or only very restricted access to the internal
network
A DMZ, short for demilitarized zone, is a network (physical or logical) used to connect hosts that
provide an interface to an untrusted external network – usually the internet – while keeping the
internal, private network – usually the corporate network – separated and isolated form the
external network.
NETWORK PERFORMANCES
•
•
•
•
RAID - Redundant Array of Independent Disks
Stand Alone / Stand By
Dual LAN
Web Server Load Balancing
RAID - Redundant Array of Independent Disks
•
•
RAID is a DATA storing Technology
This is use to
– Data Redundancy
– Performance Improvement
– Fault Tolerance
•
•
•
•
•
•
•
RAID 0
RAID 1
RAID 2
RAID 3
RAID 4
RAID 5
RAID 6
STANDARD LEVEL
•
RAID 10
HYBRID LEVEL
RAID (Contd..)
•
•
•
•
•
•
RAID 0 – DATA Stripping
RAID 1 – DATA Mirroring
RAID 4 – DATA Parity
RAID 5 – DATA Stripping with Parity
RAID 6 – DATA Dual Parity
RAID 10 (Hybrid) – DATA Stripping & Mirroring
Stand Alone / Stand By
• A PC That is used on its own without requiring a connection to
LAN
• Damage Control
• Does not affect other pcs
Dual LAN
•
Computers with Dual Gigabit connections can also use them to connect simultaneously with
different network
•
Network Connect to
• Customer Accessible Public Network
• Own Private Network
•
•
Highest level of Security
Frees-Up all the bandwidth of in-house Network
Web Server Load Balancing
• Features of Load balancing
–
–
–
It will distribute the incoming traffic to the server / network to the multiple server
Internally Load balancer health check the servers. If anything offline automatically it will switch on
the system
Depends on the request of the service it will add more servers
»
•
If more users access one service it will scale up (Demand)
Benefits
–
–
Security
» A load balancer can add an additional layer of security to the website / network /
servers
» The Web Application Firewall (WAF) in the load balancer protects the website from
hackers. This runs with a rule set like a virus scanner
Authenticate Access of user
» If one of the servers fails, providing service with remaining servers without any impact
to the user
Web Server Load Balancing (Contd..)
Load Balancing Algorithm
•
Round Robin
– The request will be redirect to different servers
•
Least Connection
– Request will be sent to the least sed sever in the network or which process no of
services. To do this load balancer need no know which process / servers having least no
of resources. It will find by doing some additional computing.
•
IP Hash
– When user makes a request that should go to set of servers. Redirecting done by using
clients IP Address . Some servers connected to that only that servers will be connected
DATA SECURITY
• IT Asset Management
• Image Differential & Incremental Backups
• Differential Backup .vs Full Backup
• SAN Servers
IT Asset Management (ITAM)
•
•
•
•
Basically Managing all the asset in an organization connected to IT infrastructure.
Hardware, Servers, Computer, Hardware Devices / Parts, Software (Ex- Anti-Virus, Office
Packages)
ITAM is Highly process oriented
Important of keeping / managing in IT Asset
– Keep tracking the asset
•
Which will help us with all our IT Task
– Support for operational function
– End User Satisfaction & Performance
– Plays major role with maintaining & protecting Ourselves as a company from regulatory
concern
Image Differential & Incremental Backups
•
It is a backup type
•
These type can be applied for all the storage devices
•
There are 3 types of Backup
– Full Backup
– Incremental Backup
– Differential Backup
Image Differential & Incremental Backups (Contd..)
Full Backup
• Common Backup Type (Full Disk Backup)
• This type should be backed up in all backup types
• Advantages
• If want to restore the Data using that single Disk / Storage device we can backup
• Better storage management
– Since it is stored in one single backup file
• Disadvantages
• It will take more time to restore the backed up data. Will be long process
• When back up some huge data (in bulk). So it needs high capacity & hardware requirements & speed.
Image Differential & Incremental Backups (Contd..)
Incremental Back Up
• This is based on updating of files / data
Monday
Backup
Tuesday
Backup
Wednesday
Backup
Thursday
Backup
Friday
Backup
• Advantages
• If we make a mistake in the current file, it can be restored from the previous versions
• Backup time is decreased as only data that is changed since the last backup is needed
Image Differential & Incremental Backups (Contd..)
Differential Back Up
• Bit similar to Increment backup. Because here also backup happens depend on updates
Tuesday
Backup
Tuesday
Backup
Monday
Full
Backup
Tuesday
Backup
• Advantages
• Restoring is faster
• Back up is faster
Tuesday
Backup
Wednesday
Backup
Wednesday
Backup
Thursday
Backup
Wednesday
Backup
Thursday
Backup
Friday
Backup
SAN Servers
•
DAS
– Direct Area Storage (PC -> HDD)
•
NAS
– Network Attached Storage
– NAS Called Centralized storage device
– Will have multiple hard drives in a RAID Configuration
– Good for medium / home level business
SAN Servers (Contd..)
•
SAN ( Storage Area Network)
– Special High Speed Network
– Where we can store & Access Large amount of Data
– Data I shared among different disk arrays
–
If any disk array / server / switch goes down still we can access to data.
DATA CENTRE
• Data Center Replication
• Virtualization
• Secure Transport Protocol
Data Center Replication
•
•
•
•
If one data center goes down another Data center is fully capable of picking its
load & Data
Each Replication cluster will be synched consistently
2 Clusters
– Master Cluster
– Replica Cluster
Advantages
– Data Availability
– Performance improvement (Read / Write)
Virtualization
•
Virtualization is the process of running a virtual instance of a computer system in a
layer abstracted from the actual hardware.
•
Physical Architecture
Physical H/W
Motherboard /HDD / RAM / ROM / NIC
Operating System
Win / Linux
App1
App1
App1
Application S/W
Virtualization (Contd..)
•
Virtual Architecture
Physical H/W
Motherboard /HDD / RAM / ROM / NIC
Operating System
Win / Linux
App1
Virtualization S/W
Application S/W (VMWare / Oracle
Virtual Box / Hyper-V)
Virtualization (Contd..)
Virtualization S/W
Virtualization H/W
Virtual
Machine 1
Virtual
Machine 2
Virtual
Machine 2
Windows
OS
Linux OS
Cent OS
1
1
App
1
2
2
2
VMWare / Oracle
Virtual H/W (NIC, Mother Board, Sound Card, etc.)
Virtual Machine
OS
Related Applications
Virtualization (Contd..)
•
Advantages
–
–
–
–
–
–
–
Reduced capital and operating costs.
Minimized or eliminated downtime.
Increased IT productivity, efficiency, agility and responsiveness.
Faster provisioning of applications and resources.
Greater business continuity and disaster recovery.
Simplified data center management.
Availability of a true Software-Defined Data Center..
• Disadvantages
–
–
–
–
High Cost – Powerful H/W Need
Risk in Physical Session
Implementation
Limitations
Secure Transport Protocol
• Also called Transport Layer Security
• A protocol to secure the communication between Client – Server
• Using encryption to protect the transfer of data and information.
• Basically uses HTTPS
• SSL & TLS are same (LS is an improved version of SSL)
– SSL Versions are 1.0, 2.0, 3.0
•
•
After 3.0 new version introduced with TLS (TLS1.0, 1.2)
Latest version is TLS 1.2
SECURITY VULNERABILITY
•
•
•
•
Logs
Honeypots
Data mining algorithms
Vulnerability testing.
Logs
• A log file is a computer-generated data file that contains information about usage patterns,
activities, and operations within an operating system, application, server or another device.
• These files normally contains messages.
• The message can be about
–
–
–
–
The system
About kernel
Services
Apps / Programs running in PC
• Different types of Logs file
– Log file for System-Log
– Log file for Security-Log
Honeypots
• A honeypot is a security mechanism that creates a virtual trap to lure attackers. An intentionally
compromised computer system allows attackers to exploit vulnerabilities so you can study them
to improve your security policies.
• Advantages
–
–
–
–
Can observe he hackers & get to know about the tricks
Get the details of hackers
Improve our security by observing their work
Identify cyberattacks and assign hackers a passive-fingerprint
Data mining algorithms
• An algorithm in data mining (or machine learning) is a set of analytical and calculations that
creates a model from data. ... The mining model that an algorithm creates from your data can
take various forms, including: A set of clusters that describe how the cases in a dataset are
related
Vulnerability testing.
• Vulnerability is any mistakes or weakness in the system security
• Setup
–
–
–
–
Documentation
Secure Permission
Update / Find Tools
Configure Tools
• Test
– Run the tools
– Run the captured Data packet
Vulnerability testing (Contd..)
• Vulnerability Analysis
– Defining & Classifying Network / System
– Assigning priority to the resource (High / Medium / Low)
• Test
–
–
–
–
–
Run the tools
Run the captured Data packet
Identifying potential threats to each source
Developing a strategy
Define & implement the strategy to minimize threats
• Reporting
• Remediation
• Process of fixing vulnerabilities
Vulnerability testing (Contd..)
• Tools to Test Vulnerability
–
–
–
–
Wireshark
OpenVAS
Air crack / Nikto / Retinal CS Community
Microsoft Baseline Security Analyzer (MBSA)
Download