IS3220 Information Technology Infrastructure Security Unit 2 Network Security Basics © ITT Educational Services, Inc. All rights reserved. Unit 2 Class Agenda 12/17/15 Learning Objectives Lesson Presentation and Discussions. Lab Activities will be performed in class. Assignments will be given in class. Break Times. 10 Minutes break in every 1 Hour. Assignment and labs are posted to the website. http://obinkyerehclassess.weebly.com IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 2 Discussion on How to use the Virtual Lab IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 4 Learning Objective Explain the fundamental concepts of network security IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 5 Key Concepts Confidentiality, integrity, and availability mandates for network resource security Network security and its value to the enterprise Roles and responsibilities in network security Impact of network infrastructure design on security Features, uses, and benefits of network security countermeasures IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 6 Primary Goals of Information Security Confidentiality Security Integrity IS3220 Information Technology Infrastructure Security Availability © ITT Educational Services, Inc. All rights reserved. Page 7 Secondary Goals of Information Security Authentication Privacy Confidentiality Authorization Integrity Availability Non-Repudiation IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 8 Seven Domains of a Typical IT Infrastructure IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 9 The Need for Information Security Risk Threat Vulnerability IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 10 Information Assurance Authentication Non-repudiation Seven Domains of a Typical IT Infrastructure Availability IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 11 Security Policy Establish goals Address risk Provide roadmap for security Set expectations Link to business objectives Map of laws and regulations Supported by standards, procedures, and guidelines IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 12 Examples of Network Infrastructures Workgroup SOHO Client/Server IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 13 General Terms Confidentiality Integrity Availability Trust Privacy Authentication Authorization Non-repudiation IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 14 Networking Terminology Network Firewall Router Virtual Private Network IPSec Demilitarized Zone Intrusion Detection System (IDS) Intrusion Prevention System (IPS) IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 15 EXPLORE: PROCESS IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 16 Policy, Awareness, and Training Policy ~ − sets expectations Awareness ~ − promotes security Training ~ − defines roles and responsibilities IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 17 Security Countermeasures Common Countermeasures Uses Benefits Limitations Firewalls Filter traffic Segmentation Hardware Software First defense Keep noise out Perimeter defense Not content oriented Limited to yes or no Virtual Private Network (VPN) Remote access Encrypted tunnel Private tunnel Extends Cover Man-in-the-middle Not traffic oriented Intrusion Detection/Prevention System Monitor traffic Notification May block attacks Prevention Host or Network IS3220 Information Technology Infrastructure Security Relies on signatures False positives © ITT Educational Services, Inc. All rights reserved. Page 18 Security Countermeasures (Continued) Common Countermeasures Uses Benefits Limitations Data Loss Prevention Monitor data loss Block data loss Sensitive Config Breach Notification Security Incident and Event Management Aggregate sec logs Correlate sec logs Monitor and review False positives Generate alerts Data heavy Limit to log info IS3220 Information Technology Infrastructure Security Signature reliant False positives Circumventable © ITT Educational Services, Inc. All rights reserved. Page 19 Security Countermeasures (Continued) Common Countermeasures Uses Benefits Limitations Continuous Control Monitoring Checks config Automate monitors Standard compliant Self correction Real time monitor Emerging tech Policy dependent Vulnerability Assessment Tests systems Limited to known Create noise IS3220 Information Technology Infrastructure Security Proactive address Centralize tracking © ITT Educational Services, Inc. All rights reserved. Page 20 EXPLORE: CONTEXT IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 21 Consider Business Requirements Availability of the network and its components • Redundancy • High availability • Single point of failure • Denial of service Sensitivity of the data • Encryption • Access control IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 22 Internet Exposure Remote access • Will a VPN work? • Is direct internet access required? IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 23 Wired Networks Lack of external connectivity creates physical isolation • Can rely on physical controls to protect network • External threats must breach physical barrier If external connectivity is required • No control is the same as physical isolation but security must enable the business • Consider segmentation • Rigorous front door screening IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 24 Benefits of Wireless Networking Can be inexpensive to deploy • No need to run wires • Quick connectivity for multiple users Convenience Mobility Ubiquity • All laptops now come equipped with wireless IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 25 Wireless Concerns Introduces new attack surface • Require additional design considerations to mitigate attack Data is transmitted over the air and accessible • Use of encryption technology • Consider implementing segmented wireless networks • Require VPN authentication for wireless access Network can be directly accessed from a distance • Shielding IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 26 Mobile Networking Allows user to be completely mobile Requires considerations for central management Potential for device to be lost IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 27 Unit 2 Assignment and Lab Discussion 2.1 Familiar Domains Assignment 2.3 Selecting Security Countermeasures Assignment is due next Class Class Project:Discussion IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 28 Unit 2 Lab Activities Lab 1.2 Analyze Essential TCP/IP Networking Protocols Lab 2.2 Network Documentation Lab should be completed using VLab on the school website Labs should be completed in Class. If not completed should be submitted in the class. IS3220 Information Technology Infrastructure Security © ITT Educational Services, Inc. All rights reserved. Page 29