Network Security Principles & Practices - PowerPoint PPT Presentation

1 / 9
About This Presentation
Title:

Network Security Principles & Practices

Description:

Network Security Principles & Practices By Saadat Malik Cisco Press 2003 Chapter 1 Introduction to Network Security Model of Network Security Process Elements ... – PowerPoint PPT presentation

Number of Views:228
Avg rating:3.0/5.0
Slides: 10
Provided by: sceUhclE
Category:

less

Transcript and Presenter's Notes

Title: Network Security Principles & Practices


1
Network Security Principles Practices
  • By Saadat Malik
  • Cisco Press
  • 2003

2
Chapter 1 Introduction to Network Security
  • Model of Network Security Process
  • Elements of Network Security Policy
  • Elements of Network Security Design
  • Case Study

3
(No Transcript)
4
Elements of a Network Security Policy
  • Based on FRC 2196 Site Security Handbook. B.
    Fraser. September 1997. (ftp//ftp.rfc-editor.org/
    in-notes/rfc2196.txt)
  • Computer technology purchasing guidelines
  • wrt security features
  • Privacy policy
  • emails, user data
  • Access policy
  • control of access to assets
  • Accountability policy
  • roles/responsibilities, auditing, incident
    handling

5
Elements of a Network Security Policy (2)
  • Authentication policy (identity management)
  • passwords, remote authentication, smart cards
  • Availability statement
  • expected availability, QoS, hours
  • Maintenance policy for IT system network
  • esp. remote admin, outsourcing
  • Violations reporting policy
  • types of violations, anonymous reporting?
  • Supporting information
  • point(s) of contact, publicity, company
    policies,

6
Network Security Design
  • Assets Threats Risks ? Policies
  • Policies Control measures (tools, procedures,
    etc.) ? Design

7
Elements of Network Security Design
  • Device security features
  • Admin passwords, Secure Shell,
  • Firewalls
  • VPN
  • Client-server VPN, site-to-site VPN
  • IDS
  • AAA (Radius server)
  • Access control
  • Access Control Lists, Committed Access Rate
  • And more ?

8
Case Study
  • pp. 12-21
  • Exercise A Draw a network diagram to show the
    network security design of Biotech, Inc.
  • Exercise B In Table 1-1, three criteria
    (confidentiality, integrity, and availability)
    are used in constructing the critical asset risk
    rating table. Add two more criteria, origin
    integrity and non-repudiability, into the table,
    and assign risk ratings to the two new columns.
    Justify your answer.

9
Network Security DesignAn Exercise
  • Refer to the paper Design of Distributed
    Computer Security Lab. Journal of Computing
    Sciences in Colleges. Volume 20, Issue 1. October
    2004. http//sce.cl.uh.edu/yang/research/DCSL20RM
    CCSC04.pdf
  • Task The DCSL lab is currently located in Delta
    140. A new Computer Security Lab (CSL) is to be
    added to Delta 158. The new lab will consist of
    30 desktop computers, connected to a switch,
    through which a connection to the DCSL network is
    established.
  • Identify the assets.
  • Identify the threats.
  • Risk Analysis.
  • Devise security policies based on the
    requirements you have collected from the paper
    and from relevant personnel.
  • Draw a network security diagram to illustrate
    your design of the complete DCSL and CSL labs.
    Indicate what control measures are to be adopted
    to counter the threats.
Write a Comment
User Comments (0)
About PowerShow.com