SlideShare a Scribd company logo
1 of 15
Network Security Proposal
Sally Frederick Tudor
Network Administrator
SECURITY AUDIT POLICY
 Make asset list (inventory)
 Make threats list
 Prioritize Assets and Vulnerabilities
Risk = Probability X Harm
 Are NAC’s (ACLs) being implemented?
 Are they monitored and updated regularly?
 Are there Audit logs to review and identify attempts to
access network?
 Are STIGs being implemented and adhered to?
SECURITY AUDIT POLICY
 Inventory of all assets
 Locks on all doors and cabinets
 Educate users on policies and how to adhere to them
 Intruder Detection (IDS)
 Anti-virus program
 Anti-spyware program
 Windows Firewall on your Operating System
 Windows Defender
 Strong password policies
SECURITY AUDIT POLICY
 Disaster Recovery Plan
 Backup policies
 Encryption policies
 Event logging should be enabled and monitored
weekly
 Security policy should be changed or updated as often
as needed
SECURITY AUDIT POLICY
 Are there backup policies?
 Are email communications being protected and
filtered?
 Are Intrusion Detection Systems (IDS) being used on
the network?
 Are key personnel educated on regarding DoDs
policies and guidelines?
 Are physical assets and resources being protected by
Intrusion Prevention System (IPS)?
FIREWALLS
 Firewalls are a MUST!
 All firewalls have a Rules file.
 The best option for your firewall is the default setting:
Deny-All because it is the “cautious approach”.
 Deny-All then assign permissions sparingly as
necessary for operation of the business.
 Packet filtering is done by a firewall and it limits the
data that comes in through your ports.
 By doing so the firewall can block services such as FTP
and Telnet.
FIREWALLS
 Using and maintaining passwords enable
authentication on the firewall so users can only surf
the Web or use E-mail after they have successfully
authenticated themselves, which force employees to
keep track of passwords and to remember them.
 Password lists need to be kept up-to-date; for example
when they are changed, or employees quit or get fired,
or leave the business for any reason.
 The IDS can be installed on a central server, or in the
external and/or the internal routers at the perimeter of
the network.
PROXY SERVERS
 Proxy servers are used to conceal clients, translate
network addresses, and filter content.
 They prevent malicious code from entering the
network.
 They scan the entire data part of IP packets and create
much more detailed log file listings than packet filters.
 Packet filters log only the header information, whereas
proxy servers can log much more.
 Proxy servers rebuild the packets with new source IP
information, which shields internal users from those
on the outside.
ENCRYPTION
 Encryption plays an important role in many firewalls.
 Hackers will take advantage of firewalls that don’t use
encryption.
 Preserves data integrity.
 Encryption plays an important role in enabling virtual
private networks (VPNs).
 Encryption method should be monitored to assess how
well it is working.
 Firewall log files can improve the security against intrusion
attempts by identifying attempts made by hackers to
compromise or breach the network.
REMOTE SECURITY
 Determine which remote access vulnerabilities
currently exist in your environment.
 Vulnerability Scanning finds missing patches, and digs
in deeper to find misconfigurations, unnecessary
shares, null session connections and other exploitable
vulnerabilities you would not otherwise be able to dig
up easily.
 Install and run Microsoft Baseline Security Analyzer
(MBSA) on all systems and review reports.
 Ensure that personal firewall software is installed.
REMOTE SECURITY
 Require antivirus and antispyware on every system.
 Ensure that updates are being applied in real-time if
possible to prevent unnecessary infections.
 Enable strong file and share permissions on remote
hard drives and other storage devices—especially
Windows 2000 and NT—that allows everyone access
by default.
 Have a written policy and documented procedures in
place for managing patches.
REMOTE SECURITY
 Disable null session connections as outlined to prevent
the unauthorized gleaning of user names, security
policy information and more from remote systems.
 Implement a VPN using the free Windows-based
PPTP, or Windows Remote Desktop or Citrix.
 Remember to include remote users; computers and
applications in your security incident response plan
and disaster recovery plans.
 To prevent users from installing IM, P2P, and other
applications that you can’t support grant minimal
privileges.
REMOTE SECURITY
 For systems that are wireless don’t forget to enable
WEP at a minimum since it’s better than nothing.
 Require your users to use directional antennae.
 Enable MAC address controls which help non-techies
from snooping or accessing your network.
 Require a specific vendor model of AP and wireless
NIC to ensure they are hardened consistently
according to your standards and so you can stay
abreast of any major security alerts and necessary
firmware of software updates.
REMOTE SECURITY
 Remember that users may connect to your network via
public hotspots to make user you and they understand
the security implications and have the proper
safeguards in place.
 Enable secure messaging if a VPN or other hotspot
protection is not available via POP3s, SMTPs, Webmail
via HTTPS and other built-in controls.
 Disable Bluetooth if it’s not needed. Otherwise, it’s too
risky by default so lock it down.
NETWORK SECURITY PROPOSAL

More Related Content

What's hot

Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingSeo Tss
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systemssamis
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
Windows firewall
Windows firewallWindows firewall
Windows firewallVC Infotech
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESwebhostingguy
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Network security
Network securityNetwork security
Network security
 
Network security
Network security Network security
Network security
 
Network security
Network securityNetwork security
Network security
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Firewall
FirewallFirewall
Firewall
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
 
Firewall
FirewallFirewall
Firewall
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similar to Sallysspecialservices networksecurityproposal2-100305141834-phpapp02

Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
security_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxsecurity_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxAkttripathi
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security ChecklistMobeen Khan
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectUp2Universe
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for HealthcareSteve Dunn
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfKerimBozkanli
 
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxBluechipComputerSyst
 
It security
It securityIt security
It securityavi2607
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxwrite4
 

Similar to Sallysspecialservices networksecurityproposal2-100305141834-phpapp02 (20)

Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
security_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxsecurity_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptx
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Firewall
FirewallFirewall
Firewall
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University project
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for Healthcare
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Day4
Day4Day4
Day4
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
 
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
 
It security
It securityIt security
It security
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
 

More from Sally's Special Services

More from Sally's Special Services (8)

Ec311 projectpresentation-100521005642-phpapp02
Ec311 projectpresentation-100521005642-phpapp02Ec311 projectpresentation-100521005642-phpapp02
Ec311 projectpresentation-100521005642-phpapp02
 
Harrywilliamlinderman 091108030352-phpapp01
Harrywilliamlinderman 091108030352-phpapp01Harrywilliamlinderman 091108030352-phpapp01
Harrywilliamlinderman 091108030352-phpapp01
 
Network Proposal
Network ProposalNetwork Proposal
Network Proposal
 
Recommending a Strategy2
Recommending a Strategy2Recommending a Strategy2
Recommending a Strategy2
 
Medical Network Presentation2
Medical Network Presentation2Medical Network Presentation2
Medical Network Presentation2
 
SALLYS SPECIAL SERVICES
SALLYS SPECIAL SERVICESSALLYS SPECIAL SERVICES
SALLYS SPECIAL SERVICES
 
Computer Monitor Presentation
Computer Monitor PresentationComputer Monitor Presentation
Computer Monitor Presentation
 
Sally’s Special Services2
Sally’s Special Services2Sally’s Special Services2
Sally’s Special Services2
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Sallysspecialservices networksecurityproposal2-100305141834-phpapp02

  • 1. Network Security Proposal Sally Frederick Tudor Network Administrator
  • 2. SECURITY AUDIT POLICY  Make asset list (inventory)  Make threats list  Prioritize Assets and Vulnerabilities Risk = Probability X Harm  Are NAC’s (ACLs) being implemented?  Are they monitored and updated regularly?  Are there Audit logs to review and identify attempts to access network?  Are STIGs being implemented and adhered to?
  • 3. SECURITY AUDIT POLICY  Inventory of all assets  Locks on all doors and cabinets  Educate users on policies and how to adhere to them  Intruder Detection (IDS)  Anti-virus program  Anti-spyware program  Windows Firewall on your Operating System  Windows Defender  Strong password policies
  • 4. SECURITY AUDIT POLICY  Disaster Recovery Plan  Backup policies  Encryption policies  Event logging should be enabled and monitored weekly  Security policy should be changed or updated as often as needed
  • 5. SECURITY AUDIT POLICY  Are there backup policies?  Are email communications being protected and filtered?  Are Intrusion Detection Systems (IDS) being used on the network?  Are key personnel educated on regarding DoDs policies and guidelines?  Are physical assets and resources being protected by Intrusion Prevention System (IPS)?
  • 6. FIREWALLS  Firewalls are a MUST!  All firewalls have a Rules file.  The best option for your firewall is the default setting: Deny-All because it is the “cautious approach”.  Deny-All then assign permissions sparingly as necessary for operation of the business.  Packet filtering is done by a firewall and it limits the data that comes in through your ports.  By doing so the firewall can block services such as FTP and Telnet.
  • 7. FIREWALLS  Using and maintaining passwords enable authentication on the firewall so users can only surf the Web or use E-mail after they have successfully authenticated themselves, which force employees to keep track of passwords and to remember them.  Password lists need to be kept up-to-date; for example when they are changed, or employees quit or get fired, or leave the business for any reason.  The IDS can be installed on a central server, or in the external and/or the internal routers at the perimeter of the network.
  • 8. PROXY SERVERS  Proxy servers are used to conceal clients, translate network addresses, and filter content.  They prevent malicious code from entering the network.  They scan the entire data part of IP packets and create much more detailed log file listings than packet filters.  Packet filters log only the header information, whereas proxy servers can log much more.  Proxy servers rebuild the packets with new source IP information, which shields internal users from those on the outside.
  • 9. ENCRYPTION  Encryption plays an important role in many firewalls.  Hackers will take advantage of firewalls that don’t use encryption.  Preserves data integrity.  Encryption plays an important role in enabling virtual private networks (VPNs).  Encryption method should be monitored to assess how well it is working.  Firewall log files can improve the security against intrusion attempts by identifying attempts made by hackers to compromise or breach the network.
  • 10. REMOTE SECURITY  Determine which remote access vulnerabilities currently exist in your environment.  Vulnerability Scanning finds missing patches, and digs in deeper to find misconfigurations, unnecessary shares, null session connections and other exploitable vulnerabilities you would not otherwise be able to dig up easily.  Install and run Microsoft Baseline Security Analyzer (MBSA) on all systems and review reports.  Ensure that personal firewall software is installed.
  • 11. REMOTE SECURITY  Require antivirus and antispyware on every system.  Ensure that updates are being applied in real-time if possible to prevent unnecessary infections.  Enable strong file and share permissions on remote hard drives and other storage devices—especially Windows 2000 and NT—that allows everyone access by default.  Have a written policy and documented procedures in place for managing patches.
  • 12. REMOTE SECURITY  Disable null session connections as outlined to prevent the unauthorized gleaning of user names, security policy information and more from remote systems.  Implement a VPN using the free Windows-based PPTP, or Windows Remote Desktop or Citrix.  Remember to include remote users; computers and applications in your security incident response plan and disaster recovery plans.  To prevent users from installing IM, P2P, and other applications that you can’t support grant minimal privileges.
  • 13. REMOTE SECURITY  For systems that are wireless don’t forget to enable WEP at a minimum since it’s better than nothing.  Require your users to use directional antennae.  Enable MAC address controls which help non-techies from snooping or accessing your network.  Require a specific vendor model of AP and wireless NIC to ensure they are hardened consistently according to your standards and so you can stay abreast of any major security alerts and necessary firmware of software updates.
  • 14. REMOTE SECURITY  Remember that users may connect to your network via public hotspots to make user you and they understand the security implications and have the proper safeguards in place.  Enable secure messaging if a VPN or other hotspot protection is not available via POP3s, SMTPs, Webmail via HTTPS and other built-in controls.  Disable Bluetooth if it’s not needed. Otherwise, it’s too risky by default so lock it down.

Editor's Notes

  1. March 2, 2010