Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Nad710 Linux Network Security


Published on

Linux Network Security

Published in: Technology
  • Be the first to comment

Nad710 Linux Network Security

  1. 1. NAD710 – Linux Network Security   How to Protect Your Network May 25, 2002 Professor Tom Mavroidis
  2. 2. System Assessment <ul><li>User Accounts </li></ul><ul><li>Access Control lists </li></ul><ul><li>Network Access Control </li></ul><ul><li>Encryption </li></ul><ul><li>Logging </li></ul><ul><li>Intrusion Detection </li></ul>
  3. 3. Protect the Exterior <ul><li>First you’ll need an exterior router </li></ul><ul><li>Routers come in many forms, you have to choose based on your needs </li></ul><ul><li>Some are basic (Linksys) </li></ul><ul><li>Others advanced (Cisco) </li></ul>
  4. 4. Why Cisco <ul><li>You would generally need a sophisticated router to be able to block unwanted incoming traffic </li></ul><ul><li>Cisco has many different lines of routers to suit any business need </li></ul>
  5. 5. Cisco IOS Software <ul><li>Cisco uses its IOS software to control its routers and switches. </li></ul><ul><li>This IOS software make Cisco routers some of the most powerful and versatile routers in the industry </li></ul>
  6. 6. Entry Level Routers <ul><li>If you don’t need such a sophisticated router you can use one of the entry level routers like Linksys, Dlink or SMC. Each come with their own proprietary configuration screens </li></ul>
  7. 7. Perimeter Security <ul><li>Perimeter security devices inside the network are designed to control access to networks and to hide data moving outside the network. There are numerous vulnerabilities inside the network. Secure networking cannot be achieved without addressing these vulnerabilities . </li></ul>
  8. 8. Perimeter Security <ul><li>This element provides the means to control access to critical network applications, data, and services so that only legitimate users and information can pass through the network. </li></ul>
  9. 9. Controlling who gets in <ul><li>Routers and switches with access control lists and/or stateful firewalling, as well as dedicated firewall appliances provide this control. </li></ul>
  10. 10. <ul><li>Complementary tools, including virus scanners and content filters, also help control network perimeters </li></ul>