Nad710 Linux Network Security

11
NAD710 – Linux Network NAD710 – Linux Network Security Security How to Protect Your Network May 25, 2002 Professor Tom Mavroidis

description

Linux Network Security

Transcript of Nad710 Linux Network Security

Page 1: Nad710   Linux Network Security

NAD710 – Linux Network NAD710 – Linux Network Security  Security  

How to Protect Your Network

May 25, 2002Professor Tom Mavroidis

Page 2: Nad710   Linux Network Security

System Assessment System Assessment

User AccountsAccess Control listsNetwork Access ControlEncryptionLoggingIntrusion Detection

Page 3: Nad710   Linux Network Security

Protect the ExteriorProtect the Exterior

First you’ll need an exterior router

Routers come in many forms, you have to choose based on your needs

Some are basic (Linksys) Others advanced (Cisco)

Page 4: Nad710   Linux Network Security

Why CiscoWhy Cisco

You would generally need a sophisticated router to be able to block unwanted incoming traffic

Cisco has many different lines of routers to suit any business need

Page 5: Nad710   Linux Network Security

Cisco IOS SoftwareCisco IOS Software

Cisco uses its IOS software to control its routers and switches.

This IOS software make Cisco routers some of the most powerful and versatile routers in the industry

Page 6: Nad710   Linux Network Security

Entry Level RoutersEntry Level Routers

If you don’t need such a sophisticated router you can use one of the entry level routers like Linksys, Dlink or SMC. Each come with their own proprietary configuration screens

Page 7: Nad710   Linux Network Security

Perimeter SecurityPerimeter Security

Perimeter security devices inside the network are designed to control access to networks and to hide data moving outside the network. There are numerous vulnerabilities inside the network. Secure networking cannot be achieved without addressing these vulnerabilities.

Page 8: Nad710   Linux Network Security

Perimeter SecurityPerimeter Security

This element provides the means to control access to critical network applications, data, and services so that only legitimate users and information can pass through the network.

Page 9: Nad710   Linux Network Security

Controlling who gets inControlling who gets in

Routers and switches with access control lists and/or stateful firewalling, as well as dedicated firewall appliances provide this control.

Page 10: Nad710   Linux Network Security

Complementary tools, including virus scanners and content filters, also help control network perimeters

Page 11: Nad710   Linux Network Security