safe and sound

26
SAFE AND SOUND SAFE AND SOUND

Upload: dewitt

Post on 11-Jan-2016

25 views

Category:

Documents


0 download

DESCRIPTION

SAFE AND SOUND. INTRODUCTION. Elements of Security Auditing Applications to Customers Network. Modular Approach. User layer…….Server layer……..Network layer …………..interconnects (cabling)……………. User Layer. Thin-clients, or physically-secure workstations Login + passworded access - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: SAFE AND SOUND

SAFE AND SOUNDSAFE AND SOUND

Page 2: SAFE AND SOUND

INTRODUCTIONINTRODUCTION

Elements of Security AuditingElements of Security Auditing

Applications to Customers NetworkApplications to Customers Network

Page 3: SAFE AND SOUND

Modular ApproachModular Approach

User layer…….Server User layer…….Server layer……..Network layerlayer……..Network layer

……………………..interconnects (cabling)..interconnects (cabling)…………………………

Page 4: SAFE AND SOUND

User LayerUser Layer

Thin-clients, or physically-secure Thin-clients, or physically-secure workstationsworkstations

Login + passworded accessLogin + passworded access

Access only to relevant services, Access only to relevant services, applicationsapplications

Run background malware prevention Run background malware prevention softwaresoftware

Page 5: SAFE AND SOUND

Server LayerServer Layer

Remove unnecessary servicesRemove unnecessary services

User groups to match physical User groups to match physical topologytopology

Don’t run services as root / adminDon’t run services as root / admin

Run OS as read-onlyRun OS as read-only

Page 6: SAFE AND SOUND

Network LayerNetwork Layer

Backup IOS, OS, data

Distribute & centralise topology (failover, and ordered & documented design & layout)

Use firewalls & logging

Use IDS, IPS, traffic monitoring

Page 7: SAFE AND SOUND

CablingCabling

Use more secure cable typesUse more secure cable types

Use patch-panels and colour-Use patch-panels and colour-codingcoding

Layouts that make testing, fault-Layouts that make testing, fault-finding easyfinding easy

Page 8: SAFE AND SOUND

Security ConsiderationsSecurity Considerations

Page 9: SAFE AND SOUND

Network ThreatsNetwork Threats

VirusesViruses

Tend to be inadvertently Tend to be inadvertently activatedactivated

…….or may be installed .or may be installed deliberatelydeliberately

Page 10: SAFE AND SOUND

Network ThreatsNetwork Threats

WormsWorms

Travel the internet, scanning for Travel the internet, scanning for vulnerabilitiesvulnerabilities

Often disrupt networks by Often disrupt networks by flooding, forkingflooding, forking

Page 11: SAFE AND SOUND

Network ThreatsNetwork Threats

Spiders and webbotsSpiders and webbots

Can be used maliciously –Can be used maliciously – Automated signups, website Automated signups, website

duplication, spamduplication, spam

Page 12: SAFE AND SOUND

Network ThreatsNetwork Threats

TrojansTrojans

Masquerade as Masquerade as regular softwareregular software

Tend to allow Tend to allow attacker to attacker to control infected control infected machinemachine

Page 13: SAFE AND SOUND

Network ThreatsNetwork Threats

Spyware and PhishingSpyware and Phishing

Information stealing, user Information stealing, user profilingprofiling

Used in advert targeting, spam, Used in advert targeting, spam, ID theftID theft

Page 14: SAFE AND SOUND

Network ThreatsNetwork Threats

SpamSpam

Can contain other malwareCan contain other malware Congests networksCongests networks

Page 15: SAFE AND SOUND

Network ThreatsNetwork Threats

Delete traces of Delete traces of intrusionsintrusions

Alter logsAlter logs

Forensics get-Forensics get-aroundaround

BombsBombs

Page 16: SAFE AND SOUND

Solutions for CustomerSolutions for Customer

Separate physical network for Separate physical network for WAN accessWAN access

Honeypot to track & ID intrusionsHoneypot to track & ID intrusions

Monitoring station for internal Monitoring station for internal LANsLANs

Page 17: SAFE AND SOUND

Solutions for CustomerSolutions for Customer

HoneypotHoneypot

Mimics internal network or DMZ Mimics internal network or DMZ Allows profiling of network Allows profiling of network

threatsthreats

Page 18: SAFE AND SOUND

Solutions for CustomerSolutions for Customer

SAN - storage area networkSAN - storage area network

RAID 40 : RAID level 4 & RAID RAID 40 : RAID level 4 & RAID level 0level 0

4 – block striping with parity: 4 – block striping with parity:

failure tolerant & faster rebuildsfailure tolerant & faster rebuilds

0 – striping: faster writes0 – striping: faster writes

Page 19: SAFE AND SOUND

Solutions for CustomerSolutions for Customer

RAID 40RAID 40

Page 20: SAFE AND SOUND

Tenable’s Security CenterTenable’s Security Center

Each node is a router, hosts Each node is a router, hosts behind routerbehind router

Page 21: SAFE AND SOUND

AdvisorAdvisor

Parallel co-ordinate plot of firewall Parallel co-ordinate plot of firewall logslogs

Page 22: SAFE AND SOUND

FlamingoFlamingo

Port scanPort scan

1 source1 source

manymany

targetstargets

Page 23: SAFE AND SOUND

RumintRumintVisualisation Jamming Attack Visualisation Jamming Attack

Page 24: SAFE AND SOUND

PsadPsad

Nachi worm Nachi worm

network network behaviourbehaviour

Red nodes Red nodes are ICMP are ICMP packetspackets

Page 25: SAFE AND SOUND

Web server log, Raju Web server log, Raju VargheseVarghese

Spider attack on web server from Spider attack on web server from single IPsingle IP

Red colouration indicates 5xx status Red colouration indicates 5xx status codescodes

Page 26: SAFE AND SOUND

f i nf i n

Network monitoring visualisations Network monitoring visualisations from:from:

http://www.secviz.org/category/http://www.secviz.org/category/image-galleries/graph-exchangeimage-galleries/graph-exchange