Information Security, Network Security, and Network Access Control
Information Security, Network Security, and Network Access Control
! Security Resources
! Security Concepts
! Information Security
! Information Security Hot Topics
! Network Security
! Network Access Control
! ! http://www.sans.org/reading_room
! ! "802.11 Denial of Service Attacks and Mitigation"
! ! "Detecting and Preventing Rogue Devices on the Network"
! ! Mailing Lists
! ! BugTraq, Wireless Security, Etc.
! ! mailto:[email protected]
! CERT
! http://cert.org/
! Insecure.Org
! http://insecure.org/
! ! Security Tools
! ! http://sectools.org/
Secure By Design
- Not Security as an Afterthought. It is very Difficult To Go
back Later and Add a Security Layer -- look at the Internet
Protocols for example.
Defense In Depth
- Create Multiple Layers of Defense. Not the “tootsie pop”
hard shell, soft inside. Layers include Host Security, Data
Security, Firewalls, Anti-Virus, etc.
Least Privilege
- Allow the minimum level of access needed to perform a task.
This applies in account management, as well as the
generation of access control policy.
End-to-End Security
- The higher up in the Layers you are, the better. If you can
secure the application, then problems at the lower layers are
less important. Example: PGP Encrypted Mail.
- Even so, this does not mean you should not keep trying to
achieve BETTER security.
- You will get Hacked. You will have to Respond. Plan Ahead
for these events.
Definition
- An organized program designed to protect critical
information assets from exposure, modification, or
disruption.
ISO Standard
- International Organization for Standardization and
International Electrotechnical Commission
- Security policy
- Asset management
- Compliance
- Vulnerability Assessment
- Host Security
- Network Security
- Intrusion Detection
- Incident Handling
- Policy Development
- Enforcement
Network Security 15 Wireless Network Security
Information Security
Job Positions
- Chief Security Officer ( Policy Development )
- Auditor
- Amount of Time/Money
Political
Financial
Application
Presentation
Session
Transport
Network
DataLink
Physical
Hot Topics
- Policy Development
- Data Security
- Application Security
- Identity Theft
Sean’s Definition:
- "A collection of network-connected devices, technologies,
and best practices that work in complementary ways to
provide security to information assets."
- ! http://www.bradfordnetworks.com/
- ! http://www.cisco.com/
- NESSUS http://nessus.org/
- nikto http://www.cirt.net/
- BRO http://www.bro-ids.org/
- Reliability
- Cost
- Doing A Good Job In Those Two Areas, Makes The Rest Of the
Arguments for a Commercial NAC System Less Compelling