2. info@quontrasolutions.co.uk
Network Security
Security Devices
Firewalls
Network Access Security
User Authentication
Device Security
Common Security Threats
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
3. info@quontrasolutions.co.uk
Security Devices
Explain the function Of Hardware and Software
security devices.
Network Based Firewall
Host Based Firewall
IDS
IPS
VPN Concentrator
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
4. info@quontrasolutions.co.uk
Host Based Firewall
Software Based Protection on a device
Sees all the Traffic
Difficult to manage
large groups
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
6. info@quontrasolutions.co.uk
Network Based Firewall
Filters Traffic By Port Number
Can Encrypt traffic in/out of the network.
Can proxy traffic
Most firewalls can be Layer 3 devices (routers).
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
7. info@quontrasolutions.co.uk
Network Based Firewall
Advantages
Protects many devices at once
High-speed
Disadvantages
Limited Visibility into encrypted Information
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
8. IDS/IPS
Intrusion Detection System
Intrusion Prevention System
Intrusions
Exploits against Operating Systems , applications etc.
Bufferoverflows and other vulnerabilities
Detection Vs Prevention
Detection – Alarm or Alert
Prevention – Stop it before it gets into the network.
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
9. IDS/IPS
Advantages
Watches all traffic through a network link
Can completely stop bad traffic
Disadvantages
Limited Visibility into encrypted Data
Yet Another device on the Network
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
11. Identify Common Security Threats and
Mitigations
Security Threats
Dos ,viruses, worms ,attackers ,Man in the
middle attack ,Smurf ,Social engineering
(phishing)
Mitigation Techniques
Policies and Procedures ,user training ,patch
and updates
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
12. Denial Of Service
Anything that prevents a device from providing
normal services
DoS /DDoS
Denial Of Service /Distributed Denial of service
Smurf Attacks
Ping sents to a broadcast address were duplicated to all
IP addresses on the subnets by the routers
We fixed that in 1999
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
13. Viruses and Worms
Viruses infect files and duplicate by copying
themselves with other documents
Worms don’t need any other files or programs in
order to infect other devices
Malware is a catch-all term for viruses ,spywares ,
adwares ,worms and other bad stuff
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
14. Man in the Middle Attack
A form of electronic eavesdropping
Especially useful for encrypted communication
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
15. Man in the Middle Attack
A form of electronic eavesdropping
Especially useful for encrypted communication
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
16. Social Engineering
Major Threats
Electronically Undetectable
Suspicious Telephone Call
Don’t give any information over the Telephone
Look out for unattended persons
Badges
Processes
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
17. Phishing
Electronic Version Of Social Engineering
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
18. Mitigation Techniques
Policies and Procedures
User Training
Patches and Updates
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
19. Summary
DoS (Denial Of Service) or DDoS (Distributed
DoS) prevent a device from providing normal services.
Man in the Middle Attack method can hackers use
to intercept encrypted communication between
stations
Phishing is the electronic method of social
engineering to gather personal information.
www.quontrasolutions.co.uk Call us : 20-3734-1498/99