SlideShare a Scribd company logo
The owners’ concerns
Define the scope of security and
 why it is important
Group Policies
Network Access Protection (NAP)
Snort Intrusion Detection System
 (SIDS)
Snort Intrusion Prevention System
 (SIPS )
 The Brooklyn Circus owner does not
   want confidential files stolen. For this
   reason, the network administrator has
   configured essential security tools on
   Windows Server 2008 which maintains
   the integrity of the businesses data.
 One of the major concerns are the
   constant changes to files and financial
   information currently housed on
   Windows Server 2008 has been a major
   testament to its’ success and growth.
 The prime importance of securing
   Brooklyn Circus’ network is to
   prevent loss, through misuse of
   data.
 The main threats which may erupt if
   network security is at risk are
    Breaches of confidentiality
    Data corruption
    Data manipulation
Group & Account Policies
            Group Policies                                       Account Policies
   A group policy is a way to provide consistent        Account Policies are security measures set up
    security to Windows Server 2008 and the               in those group policies and governs all three
    clients who are connected to it.
                                                          domains through an established Kerberos
   Group policies reduce surface attacks and can         Transitive Trust Relationship.
    be expanded in the future. The primary domain
    controller in New York will replicate those
    policies and securities to the other domains.
                                                         RMSs are security rights which provide security
                                                          for file types created by applications. RMS
   In Windows Server 2008, security settings are         determines who can have rights to manage,
    one of the newly added categories of Group            read, copy, save, print, and forward data
    Policy                                                between networks.
        Regulate access to storage devices and who
         installs those devices
Account Lockout Policy & IP Security (IPsec)
     Account Lockout Policy                                  IP Security (IPsec)
   An account lockout policy is set in place to       IPsec is a secured IP-based communication
    prohibit access to a specific account after a       and encryption standard created between
    number of unsuccessful login attempts.              each client in and around the network.
   The first line of defense for these policies       Each computer is enabled to exchange
    are reversible encrypted passwords. Users           certificates and authenticate the receiver
    are required to change their passwords              and sender.
    every 45 to 90 days.
Network Access Protection
(NAP)

    A set of security features which
     monitors and manages the
     Windows Server 2008 and its’
     clients to ensure the same level
     of security is maintained on all
     computers.
    If a client computer does not
     have the current security
     updates, NAP will either limit
     access to the network or
     automatically update the clients’
     computer.
Snort Intrusion Detection Systems
                           (SIDS)
           Security countermeasure solution which enhances
           network security of the network infrastructure.
                 Implemented at the information infrastructure security level.
                 Serves as the next line of defense after the firewall.
                 Monitor network traffic of all the domains by pinpointing
                  intruder attacks in real time mode.
                 The firewall blocks access points within the network; however,
                  they are unable to decipher between malicious activities of
                  hackers.
Approaches
                                 Network-
Host-Based                       Based
                                                              to Snort
(SHIDS)                          (SNIDS)                     Intrusion
                              
    SHIDS offers the
    administrator the
                                   SNIDS assist in
                                   detecting attacks on     Detection
    benefit of being able          the network level.
    to detect attacks
    directed at the host
                                                             Systems



Both perform automated checks on log files,
file checksums, file and directory permissions,
local network port activity, and other basic
host security items.
   Prevent attacks
   Decrease their impact
   Acts a sniffer to respond to security breaches.
   The IPS configured on Windows Server 2008
    is a highly advanced security system.
   IPSs have the ability to take immediate action,
    based on protocols established by the network
    administrator.
   Informs the firewall about the location (IP
    address) where the attack originated.
   The firewall will block the specified address.

More Related Content

What's hot

Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
Rasool Irfan
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
johnb0118
 
Network security
Network securityNetwork security
Network security
Harsh Kishore Mishra
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
webhostingguy
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
Narendran Vaideeswaran
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
Marynol Cahinde
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
Amr Rashed
 
Cloud native patterns antipatterns
Cloud native patterns antipatternsCloud native patterns antipatterns
Cloud native patterns antipatterns
Martin Stemplinger
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Seo Tss
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
Juniper Networks
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta
 
Day1
Day1Day1
Day1
Jai4uk
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
HTS Hosting
 
Security Architecture and Design - CISSP
Security Architecture and Design - CISSPSecurity Architecture and Design - CISSP
Security Architecture and Design - CISSP
Srishti Ahuja
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Seqrite
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
Piyush Jain
 
Can Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network Security
EC-Council
 

What's hot (20)

Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
 
Network security
Network securityNetwork security
Network security
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
Cloud native patterns antipatterns
Cloud native patterns antipatternsCloud native patterns antipatterns
Cloud native patterns antipatterns
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
Day1
Day1Day1
Day1
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
Security Architecture and Design - CISSP
Security Architecture and Design - CISSPSecurity Architecture and Design - CISSP
Security Architecture and Design - CISSP
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Can Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network Security
 

Viewers also liked

Sql
SqlSql
The Brooklyn Circus Network
The Brooklyn Circus NetworkThe Brooklyn Circus Network
The Brooklyn Circus Network
jeremywatkins57
 
Media techsoc
Media techsocMedia techsoc
Media techsoc
Brian Jones
 
ARS Getting Started
ARS Getting StartedARS Getting Started
ARS Getting Started
browneyesmrn
 
Music director
Music directorMusic director
Music director
12asoverfelt
 
Ode an die_natur
Ode an die_naturOde an die_natur
Ode an die_natur
Hans Hans
 
Getting started
Getting startedGetting started
Getting started
browneyesmrn
 
Lululemon marketing plan revised
Lululemon marketing plan   revisedLululemon marketing plan   revised
Lululemon marketing plan revised
kcbanks91
 

Viewers also liked (9)

Sql
SqlSql
Sql
 
The Brooklyn Circus Network
The Brooklyn Circus NetworkThe Brooklyn Circus Network
The Brooklyn Circus Network
 
Media techsoc
Media techsocMedia techsoc
Media techsoc
 
ARS Getting Started
ARS Getting StartedARS Getting Started
ARS Getting Started
 
Music director
Music directorMusic director
Music director
 
Ode an die_natur
Ode an die_naturOde an die_natur
Ode an die_natur
 
Asteroïden
AsteroïdenAsteroïden
Asteroïden
 
Getting started
Getting startedGetting started
Getting started
 
Lululemon marketing plan revised
Lululemon marketing plan   revisedLululemon marketing plan   revised
Lululemon marketing plan revised
 

Similar to The Brooklyn Circus’ Secured Network

Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
Trend Micro
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
Metaorange
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
Metaorange
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
IRJET Journal
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security v
SYYULIANISKOMMT
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy
 
Day4
Day4Day4
Day4
Jai4uk
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
IJNSA Journal
 
1500024 en
1500024 en1500024 en
1500024 en
Alber Louis
 
Presentation1 shweta
Presentation1 shweta Presentation1 shweta
Presentation1 shweta
swet4
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptx
SamatarHussein
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
researchinventy
 
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEMNETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
IJORCS
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
George Wainblat
 
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
Deenuji Loganathan
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Mohit Belwal
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
technext1
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
Anand Kater
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
webhostingguy
 

Similar to The Brooklyn Circus’ Secured Network (20)

Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security v
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Day4
Day4Day4
Day4
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
1500024 en
1500024 en1500024 en
1500024 en
 
Presentation1 shweta
Presentation1 shweta Presentation1 shweta
Presentation1 shweta
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptx
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEMNETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Network security
Network security Network security
Network security
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
 

The Brooklyn Circus’ Secured Network

  • 1.
  • 2. The owners’ concerns Define the scope of security and why it is important Group Policies Network Access Protection (NAP) Snort Intrusion Detection System (SIDS) Snort Intrusion Prevention System (SIPS )
  • 3.  The Brooklyn Circus owner does not want confidential files stolen. For this reason, the network administrator has configured essential security tools on Windows Server 2008 which maintains the integrity of the businesses data.  One of the major concerns are the constant changes to files and financial information currently housed on Windows Server 2008 has been a major testament to its’ success and growth.
  • 4.  The prime importance of securing Brooklyn Circus’ network is to prevent loss, through misuse of data.  The main threats which may erupt if network security is at risk are  Breaches of confidentiality  Data corruption  Data manipulation
  • 5.
  • 6. Group & Account Policies Group Policies Account Policies  A group policy is a way to provide consistent  Account Policies are security measures set up security to Windows Server 2008 and the in those group policies and governs all three clients who are connected to it. domains through an established Kerberos  Group policies reduce surface attacks and can Transitive Trust Relationship. be expanded in the future. The primary domain controller in New York will replicate those policies and securities to the other domains.  RMSs are security rights which provide security for file types created by applications. RMS  In Windows Server 2008, security settings are determines who can have rights to manage, one of the newly added categories of Group read, copy, save, print, and forward data Policy between networks.  Regulate access to storage devices and who installs those devices
  • 7. Account Lockout Policy & IP Security (IPsec) Account Lockout Policy IP Security (IPsec)  An account lockout policy is set in place to  IPsec is a secured IP-based communication prohibit access to a specific account after a and encryption standard created between number of unsuccessful login attempts. each client in and around the network.  The first line of defense for these policies  Each computer is enabled to exchange are reversible encrypted passwords. Users certificates and authenticate the receiver are required to change their passwords and sender. every 45 to 90 days.
  • 8. Network Access Protection (NAP)  A set of security features which monitors and manages the Windows Server 2008 and its’ clients to ensure the same level of security is maintained on all computers.  If a client computer does not have the current security updates, NAP will either limit access to the network or automatically update the clients’ computer.
  • 9. Snort Intrusion Detection Systems (SIDS) Security countermeasure solution which enhances network security of the network infrastructure.  Implemented at the information infrastructure security level.  Serves as the next line of defense after the firewall.  Monitor network traffic of all the domains by pinpointing intruder attacks in real time mode.  The firewall blocks access points within the network; however, they are unable to decipher between malicious activities of hackers.
  • 10. Approaches Network- Host-Based Based to Snort (SHIDS) (SNIDS) Intrusion   SHIDS offers the administrator the SNIDS assist in detecting attacks on Detection benefit of being able the network level. to detect attacks directed at the host Systems Both perform automated checks on log files, file checksums, file and directory permissions, local network port activity, and other basic host security items.
  • 11. Prevent attacks  Decrease their impact  Acts a sniffer to respond to security breaches.  The IPS configured on Windows Server 2008 is a highly advanced security system.  IPSs have the ability to take immediate action, based on protocols established by the network administrator.  Informs the firewall about the location (IP address) where the attack originated.  The firewall will block the specified address.