18
UNIT 6 SEMINAR Unit 6 Unit 6 Chapter 6 in CompTIA Chapter 6 in CompTIA Security + Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+ Contact Information: AIM – JMcDanolds Email – [email protected] Office Hours: Tuesday, 7:00 PM ET or Wednesday, 8:00 PM ET 1

UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

Embed Size (px)

Citation preview

Page 1: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

UNIT 6 SEMINAR

Unit 6Unit 6Chapter 6 in CompTIA Security Chapter 6 in CompTIA Security

++

Course Name – IT286-01 Introduction to Network SecurityInstructor – Jan McDanolds, MS, Security+Contact Information: AIM – JMcDanolds Email – [email protected] Hours: Tuesday, 7:00 PM ET or Wednesday, 8:00 PM ET

1

Page 2: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 5 REVIEW

What did we cover last time?

Implementing and Maintaining a Secure NetworkOverview of Network Security ThreatsDefining Security BaselinesHardening the OS and NOSHardening Network DevicesHardening Applications

Now, on to a little light network checking…

2

Page 3: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 5 REVIEW

Basic TCP/IP Utilities

Open Command Prompt (in Accessories in Windows)

ipconfig /allping (ip address)

Tracert (ip address) Do a quick ipconfig /all Find your DNS Servers – ip addressesWrite them down. Ping www.bing.com Next use tracert on Bing’s ip address Write down cities shown in the hops – ex: Cincinnati, San Francisco,

San JosePing (your DNS server ip address) - reply?

3

Page 4: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 5 REVIEW

Nmap video

No sound, shows an internal scan.

Pause at 28 seconds

4

http://www.youtube.com/watch?v=uDbEfeVtIko&feature=related

Page 5: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 5 REVIEW

Defcon - Nmap and Hping http://defcon.org/DEFCON 2010http://www.youtube.com/watch?v=jJDCxzKmROY&feature=relatedDEFCON 19: Nmap: Scanning the Internet – port scanning http://nmap.org/45 minute Fyodor talk about features of Nmap at DEF CON 2008http://www.youtube.com/watch?v=Hk-21p2m8YY&feature=relatedNmap project – Fyodor – developer of Nmap

Hping - Video - Using Security Tools - Hping3 - Linuxhttp://www.youtube.com/watch?v=fagjmQi-sBYhttp://www.hping.org/hping is a command-line oriented TCP/IP packet assembler/analyzer. Supports ICMP echo requests, TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, ability to send files between a covered channel, etc. Use it for penetration testing. 7 minutes

5

Page 6: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 5 REVIEW

Review of Types of ToolsPaper by Boyd Aaron Sigmon – “Hacking Tools & Techniques and How to

Protect Your Network from Them” download in Doc Sharing

1. Port scanners2. Vulnerability scanners3. Packet sniffers (protocol analyzers)4. Root kits5. Password crackers6. Social engineering

6

Page 7: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 6 OVERVIEW

Securing the Network and Environment

Understanding Physical and Network Security

Understanding Business Continuity Planning (BCP)

Developing Policies, Standards, and Guidelines

Working with Security Standards and ISO 17799

Classifying Information

7

Page 8: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 6

Story – Physical SecurityMasked gunmen rob Fremont technology firmBy: The Associated Press 03/01/11 12:27 PM The Associated Press

Authorities are investigating an armed robbery at a Fremont technology firm by 15 masked gunmen who made off with computer parts. Fremont police say the robbers tied up, blindfolded and gagged several employees on the loading dock of Unigen Corp. on Sunday morning. They were wearing matching black clothing and armed with automatic rifles and handguns. Sgt. Chris Mazzone says the robbers spent a half-hour loading computer parts into a truck. One of the employees was able to get free and call police after the robbers left. Mazzone called the heist sophisticated and says the victims only were able to say that the robbers were all male. Unigen is still conducting an inventory to determine exactly what was stolen. Unigen manufactures memory chips among other products.

8

Page 9: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 6

Physical and Network Security

Implementing Access ControlPhysical Barriers - three-layer securityBiometrics – biological trait

Understanding Social Engineering – Kevin Mitnick, The Art of Deception

Scanning the Environment – wireless cells, physical location (HVAC and power)

Shielding – EMI and RFIFire Suppression – fire extinguishers and fixed systems

9

Page 10: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 6

Social Engineering

The Art of Deception by Kevin MitnickChapter 10 – Entering the PremisesSecurity Guard – Leroy GreeneJoe Harper – What did he do prior to the incident?

You can also see a video of Kevin Mitnick on CNN discussing hacking sites. http://www.cnn.com/video/#/video/tech/2011/01/26/nr.internet.security.hacker.cnn?iref=allsearch

You can download a copy of the Art of Deception ebook available at:http://www.taintedthoughts.com/user/perfect_flaw/Kevin%20Mitnick%20-%20The%20Art%20Of%20Deception.pdf

10

Page 11: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 6

Business Continuity Planning (BCP)

Business Impact Analysis (BIA)Critical Function IdentificationPrioritization of CBF (Critical Business Functions)Timeframe of Critical Systems LossEstimate Tangible and Intangible Impact on the Organization(download Business Continuity Sample plan in Doc Sharing)

Assessing RiskRisks to Which the Organization Is ExposedRisks That Need AddressingCoordination with BIA

SLE (single loss expectancy)ALE (annual loss expectancy)ARO (annualized rate of occurrence)

11

Page 12: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 6

Policies, Standards and Guidelines

Implementing PoliciesScope StatementPolicy Overview StatementPolicy StatementsAccountability StatementException Statement

12

Page 13: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 6

Policies, Standards and Guidelines (cont.)

Incorporating StandardsScope and PurposeRole and ResponsibilitiesReference DocumentsPerformance CriteriaMaintenance and Administrative Requirements

Following GuidelinesScope and PurposeRoles and ResponsibilitiesGuideline StatementsOperational Considerations

13

Page 14: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 6

Security Standards and ISO 17799

Communications and Ops MgtAccess ControlInfo Systems Acquisition, Development and MaintenanceInfo Security Incident MgtBusiness Continuity Mgt (BCM)Compliance

14

Code of Practice for Information Security ManagementThe ISO 27002 (formerly 17799) security standards represent one approach to security policy construction.

11 Areas of Focus:Security PolicySecurity OrganizationAsset ManagementHuman Resources/Personnel SecurityPhysical and Environmental Security

Page 15: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 6

Classifying Information

Public InformationLimited Distribution - Full Distribution

Private InformationInternal Information - Restricted Information

Government and Military Classifications

Roles in the Security ProcessOwnerCustodianUserSecurity professionalAuditor

15

Page 16: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 6

Classifying Information

Classification of information in a secure network: Public, Internal and Restricted

Information Access Controls: Bell La-Padula ModelBiba ModelClark-Wilson ModelInformation Flow ModelNoninterference Model

16

Page 17: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 6

Unit 6 Project AssignmentUnit Six Project: Formulate a logical solution to a company’s problems.

The company is Web Site 101

You are an IT security professional for Web Site 101. It has 300 employees, one large corporate office with 3 floors. Security problems have caused the CISO (chief information security officer) to ask you to write a security recommendation.

17

Page 18: UNIT 6 SEMINAR Unit 6 Chapter 6 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+

CHAPTER 6

Unit 6 Project AssignmentProblems: 1 There has been data loss due to employee negligence 2 Physical break ins 3 Employees complain they don’t understand what is expected of them from a security standpoint 4 The network administrators complain the company allows free access to anything on the network for anyone who asks 5 Web Site 101 home web page was recently hacked.

18

Develop a recommendation to cover access control methods, physical access controls, risk assessment and environmental controls and other items you feel important to ensure future information security at Web Site 101.