Top Banner
Information Security Information Security 1 Information Security: Information Security: Demo of Some Security Demo of Some Security Tools Tools Jeffy Mwakalinga Jeffy Mwakalinga
29

Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 1

Information Security:Information Security:Demo of Some Security Demo of Some Security

ToolsToolsJeffy MwakalingaJeffy Mwakalinga

Page 2: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 2

outlineoutline

FirewallFirewall

IntrusionIntrusion DetectionDetection SystemSystem

Ad-AwareAd-Aware

Anti-SpywareAnti-Spyware

AntiAnti SpamSpam TechnologyTechnology

OverviewOverview ofof ExistingExisting SecuritySecurity ToolsTools

Page 3: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 3

Overview of Existing Security Systems : Overview of Existing Security Systems : FirewallsFirewallsUsed even for Deterring (Scaring attackers)Used even for Deterring (Scaring attackers)

Firewalls Designed to prevent malicious packets from entering Software based Runs as a local program to protect one computer (personal firewall) or as a program on a separate computer (network firewall) to protect the networkHardware based separate devices that protect the entire network (network firewalls)

Page 4: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 4

Firewall: SymantecFirewall: Symantec

Page 5: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 5

Firewall: Symantec- Client Firewall SettingsFirewall: Symantec- Client Firewall Settings

Page 6: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 6

Firewall: Symantec- Trojan Horse SettingsFirewall: Symantec- Trojan Horse Settings

Page 7: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 7

Firewall: Symantec- Internet Access ControlFirewall: Symantec- Internet Access Control

Page 8: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 8

Firewall: Symantec- Internet Zone ControlFirewall: Symantec- Internet Zone Control

Page 9: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 9

Firewall: Symantec- Privacy ControlFirewall: Symantec- Privacy Control

Page 10: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 10

Symantecs Firewall AdministratorSymantecs Firewall Administrator

Page 11: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 11

Overview of Existing Security Systems : Overview of Existing Security Systems : Detection -Detection -Intrusion Detection SystemsIntrusion Detection Systems

Intrusion Detection System (IDS) Examines the activity on a network Goal is to detect intrusions and take action

Two types of IDS:Host-based IDS Installed on a server or other computers (sometimes all)

Monitors traffic to and from that particular computerNetwork-based IDS Located behind the firewall and monitors all network traffic

Page 12: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 12

Intrusion Detection System: SymantecIntrusion Detection System: Symantec

Page 13: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 13

Intrusion Detection System: SymantecIntrusion Detection System: SymantecExclusionsExclusions

Page 14: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 14

Intrusion Detection System: SymantecIntrusion Detection System: SymantecSignature ExclusionsSignature Exclusions

Page 15: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 15

Intrusion Detection System: SymantecIntrusion Detection System: Symantec-Names of Intrusions to be not Monitored-Names of Intrusions to be not Monitored

Page 16: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 16

Anti Advertisement Program AD-AWAREAnti Advertisement Program AD-AWARE

Page 17: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 17

Anti-SpywareAnti-Spyware

Page 18: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 18

Anti-Spam TechnologyAnti-Spam Technology

ContentsContents Matching-phrases,Matching-phrases, expressionsexpressions GreyGrey Listing-recordListing-record send,send, IPIP address,address, recipientrecipient :: forceforce

legitimatelegitimate sendingsending systemssystems toto trytry resendingresending thethe e-maile-mail (90%(90% eliminated)eliminated)

PhonePhone && URLURL BlacklistsBlacklists –can–can fakefake e-maile-mail butbut notnot phonesphones oror linkslinks toto theirtheir sitessites

SubjectSubject LineLine MatchingMatching OriginatorOriginator MatchingMatching -- againstagainst e-mailblacke-mailblack listlist MessageMessage CharacteristicCharacteristic CheckingChecking NetworkNetwork AddressAddress CheckingChecking RealReal timetime blackblack holehole listslists -known-known serversservers thatthat relayrelay

spamsspams LanguageLanguage CombinationsCombinations ofof technologiestechnologies

Page 19: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 19

Overview of Existing Security Overview of Existing Security Systems :Systems : Network Address Translation Network Address Translation (NAT)(NAT)

Network Address Translation (NAT) Systems Hides the IP address of network devices Located just behind the firewall. NAT device uses an alias IP address in place of the sending machine’s real one “You cannot attack what you can’t see”

Page 20: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 20

Overview of Existing Security Systems :Overview of Existing Security Systems :

Proxy ServersProxy Servers

Proxy Server Operates similar to NAT, but also examines packets to look for malicious content Replaces the protected computer’s IP address with the proxy server’s address

Protected computers never have a direct connection outside the networkThe proxy server intercepts requests. Acts “on behalf of” the requesting client

Page 21: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 21

Adding a Special Network called Demilitarized Adding a Special Network called Demilitarized Zone (DMZ)Zone (DMZ)

Demilitarized Zones (DMZ) Another network that sits outside the secure network perimeter. Outside users can access the DMZ, but not the secure network

Some DMZs use two firewalls. This prevents outside users from even accessing the internal firewall Provides an additional layer of security

Page 22: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 22

Overview of Existing Security Systems :Overview of Existing Security Systems : Virtual PrivateVirtual Private Networks Networks (VPN)(VPN)

Virtual Private Networks (VPNs) Virtual Private Networks (VPNs) A secure A secure network connection over a public network network connection over a public network • Allows mobile users to securely access Allows mobile users to securely access

informationinformation• Sets up a unique connection called a tunnel Sets up a unique connection called a tunnel

Page 23: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 23

Overview of Existing Security Systems :Overview of Existing Security Systems : Virtual Private Virtual Private Networks (VPN)Networks (VPN)

Page 24: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 24

Overview of Existing Security Systems :Overview of Existing Security Systems : HoneypotsHoneypots

Honeypots Computer located in a DMZ and loaded with files and software that appear to be authentic, but are actually imitations

Intentionally configured with security holesGoals: Direct attacker’s attention away from real targets; Examine the techniques used by hackers

Page 25: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 25

Overview of Existing Security Systems :Overview of Existing Security Systems : Secure Socket Secure Socket Layer (SSL)Layer (SSL)

SSL is used for securing communication between SSL is used for securing communication between clients and servers. It provides mainly clients and servers. It provides mainly confidentiality, integrity and authenticationconfidentiality, integrity and authentication

WWW ServerClient

Establish SSL connection - communication protected

Page 26: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 26

Protecting one ComputerProtecting one Computer

Operating system hardening is the process Operating system hardening is the process of making a PC operating system more of making a PC operating system more securesecure• Patch managementPatch management• Antivirus software – to protect your pc from Antivirus software – to protect your pc from

virusesviruses• Antispyware softwareAntispyware software• Firewalls – to deter (scare), protectFirewalls – to deter (scare), protect• Setting correct permissions for sharesSetting correct permissions for shares• Intrusion detection Systems – to detect Intrusion detection Systems – to detect

intrusionsintrusions• Cryptographic systemsCryptographic systems

Page 27: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 27

Protecting a Wireless Local Area Network (WLAN)Protecting a Wireless Local Area Network (WLAN)

Page 28: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 28

Security in a Wireless LANSecurity in a Wireless LAN

WLANs include a different set of WLANs include a different set of security issuessecurity issues

Steps to secure:Steps to secure:• Turn off broadcast informationTurn off broadcast information• MAC address filteringMAC address filtering• EncryptionEncryption• Password protect the access pointPassword protect the access point• Physically secure the access pointPhysically secure the access point• Use enhanced WLAN security standards Use enhanced WLAN security standards

whenever possiblewhenever possible• Use cryptographic systemsUse cryptographic systems

Page 29: Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.

Information SecurityInformation Security 29

SummarySummary

FirewallFirewall

IntrusionIntrusion DetectionDetection SystemSystem

Ad-AwareAd-Aware

Anti-SpywareAnti-Spyware

AntiAnti SpamSpam TechnologyTechnology

OverviewOverview ofof ExistingExisting SecuritySecurity ToolsTools