Your SlideShare is downloading. ×
July132000
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

July132000

326

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
326
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. Introduction to Networks Sandy Bacik [email_address] Breakwater Security Associates
    • 2. Agenda
      • Complexity of network incidents
      • Firewalls
      • Encrypted tunnels
      • Zone Alarm
    • 3. Way Back When
    • 4. Way Back When
      • Not enough hard drive space to hide anything
      • No logs on the workstation
      • All logs were centralized on the main frame
      • Easy phone logs for traces
    • 5. Then...
    • 6. Then...
      • Not enough hard drive space to hide anything
      • No logs on the workstation
      • All logs were centralized on the main frame
      • Easy phone logs for traces
    • 7. Then...
    • 8. Then...
      • Now the hard drives could start storing information
      • Sometime there were logs on the workstation
      • The logs are now decentralized, but for the most part remained with the network
      • Easy phone logs for traces
    • 9. Early Today...
    • 10. Early Today...
      • Now the hard drives could start storing information
      • Sometime there were logs on the workstation
      • The logs are now decentralized
      • Easy phone logs for traces
      • Still no really good encrypted tunnels
    • 11. Today
    • 12. Today
      • Almost anything can be logged - somewhere
      • The logs are now decentralized
      • Now follow packets, not phone logs
      • Encrypted tunnels - all bets are off
    • 13. Where to look for logs
      • Corporate/Personal servers
      • Corporate/Home workstation
      • Firewall
      • Internet Service Provider (ISP) and all their logs
      • Outside networks - anywhere in the world
    • 14. Issues with log file tracking
      • Time synchronizations from system to system
      • Time synchronizations from server to workstation
      • IP address spoofing
      • Understanding each systems log file information
    • 15. IP Addresses 192 . 168 . 124 . 123 http://www.cisco.com/univercd/cc/td/doc/product/software/ssr90/ptc_r_90/54084.htm
    • 16. Domain Names .com .edu .gov .mil .net .org .int . xx
    • 17. Domain Lookups
      • www.iana.org/dev7/iana/
      • www.internic.net
      • www.networksolutions.com
      • www.arin.net
    • 18. Whois Sample
    • 19. Whois Sample
    • 20. Whois Sample
    • 21. Simple ways to track an IP address/host name
      • ping -a <ipaddress>
      • ping <sitename>
      • tracert <ipaddress>
      • tracert <sitename>
    • 22. Ping results
    • 23. Ping results
    • 24. Tracert results
    • 25. What is a firewall?
      • A set of hardware and software mechanisms that shield ‘internal’ trusted networks from ‘external’ untrusted networks such as the Internet or shield internal networks from other internal networks.
    • 26. Firewall Design
    • 27. What a firewall does not protect against
      • Invalid configurations
      • Other entry points into the network
      • Dial-up access
      • Viruses
      • Single points of failure/throughput
      • Insiders
    • 28. Purposes of encryption
      • Protect sensitive information from disclosure
      • Identify the corruption or unauthorized change of information
      • Designed to make compromise too expensive or too time consuming
    • 29. What is a VPN?
      • Virtual private network
      • An encrypted tunnel
      • A secure link between entities using the Internet or a network as a backbone
    • 30. What’s a VPN for?
      • Strong encryption for sensitive data transmission
      • Reliability of critical data transmissions
      • Good authentication
      • Access and traffic control
    • 31. VPN Design
    • 32. How can we protect our home machine(s)
      • Virus scanners
      • Logging and auditing
      • Firewalls
        • http://www.zonelabs.com/default.htm
    • 33. ZoneAlarm Alerts
    • 34. ZoneAlarm Lock
    • 35. ZoneAlarm Security
    • 36. ZoneAlarm Programs
    • 37. ZoneAlarm Configure
    • 38. ZoneAlarm STOP
    • 39. Thank you

    ×