[PDF] [PDF] Designing and Implementing a Secure Network Infrastructure





Previous PDF Next PDF



Dorian Tool

The Security Infrastructure Design Document helps to document and track the necessary information required to effectively define architecture and.



Security Infrastructure Design Guideline

This document applies to both new building construction and refurbishment of existing buildings. In the case of refurbishment all existing security devices 



System Design Document - Volume I

Jul 11 2009 The features include hardware infrastructure



Oracle Cloud Infrastructure Security Architecture (PDF)

It's intended solely to help you assess the business benefits of OCI and to plan your IT projects. Disclaimer. This document in any form software or printed 



Shifting the Balance of Cybersecurity Risk: Principles and

Apr 13 2023 manufacturers in building software security into their design ... Defense-in-Depth: Design infrastructure so that the compromise of a single ...





Network Infrastructure Security Guide

Jun 15 2022 Zero Trust is a security model



Digital Government Security Infrastructure Design Challenges

they also create significant infrastructure challenges. Key challenges include1. • ensuring secure interoperability among systems from several agencies 



A Guide to a Critical Infrastructure Security and Resilience

Security and resilience should be considered during the design of infrastructure elements. establish accountability; document actual performance; facilitate ...



Dorian Tool

The Security Infrastructure Design Document helps to document and track the necessary information required to effectively define architecture and.



Security Infrastructure Design Guideline

from Security Infrastructure Design Standard v4.0 This document applies to both new building construction and refurbishment of existing buildings.



SECURITY TECHNOLOGY INFRASTRUCTURE Standards and

This document describes the security technology infrastructure recommended for stakeholders principles that form the trust foundation for GA4GH.



System Design Document Template

Sep 30 2017 System Architecture and Architecture Design . ... Security Software Architecture . ... 1.1 Purpose of the System Design Document (SDD).



Oracle Cloud Infrastructure Security Architecture (PDF)

This document in any form software or printed matter



Security ReportJune 2014.indd

Nov 19 2015 school safety infrastructure criteria for school building ... security and other security infrastructure features and design strategies.



How to Implement Security Controls for an Information Security

This document is designed to assist CBRN facilities in developing a comprehensive set of security controls to support the implementation of a risk-based 



Report of the School Safety Infrastructure Council

Nov 19 2015 school safety infrastructure criteria for school building ... security and other security infrastructure features and design strategies.





[PDF] Sample Security Infrastructure Design Document

The Security Infrastructure Design Document helps to document and track the necessary information required to effectively define architecture and







[PDF] Secure Infrastructure Design

In the realm of physical security for example this concept is demonstrated in the distribution of keys and other access devices Does Bob have a legitimate 



[PDF] Security Infrastructure Design Guideline - Curtin Properties

Curtin University has a strong commitment to the security of its buildings land and spaces and for the personal safety of all users of these areas



Create A Security Infrastructure Design Document For A Fictional

Assignment: In this project you'll create a security infrastructure design document for a fictional organization The security services and tools you describe 



[PDF] Designing and Implementing a Secure Network Infrastructure

You need to add security functionality to create secure VPNs That means using firewalls for access control and probably IPsec for confidentiality and data 



Create a security infrastructure design document - Studypool

Assignment: In this project you'll create a security infrastructure design You should upload your document in PDF format (i e my_submission pdf )



Create a security infrastructure design document for Cheggcom

Create a security infrastructure design document for an imaginary organization The security services and tools you describe in the document must be able to 

  • What is a security infrastructure design document?

    The Security Infrastructure Design Document helps to document and track. the necessary information required to effectively define architecture and. system design in order to give the guidance on the security architecture of the. IT environment that is going to be established.
  • How do you build a secure IT infrastructure?

    With that, some of the ways to build secure IT infrastructure for your small business include:

    1Limit User Access To Your Business Network. 2Install Necessary Cybersecurity Tools. 3Have Security Awareness Training For Employees. 4Establish Solid IT Policies. 5Invest In High-Performance Storage Solutions. 6Update Your Firewall.
  • How to design network security architecture?

    Principles of Secure Network Design

    1Defense in depth.2Compartmentalization.3Least privilege.4Weakest link.5Separation and rotation of duties.6Hierarchically trusted components and protection.7Mediated access.8Accountability and traceability.
  • Google Front End service
    The GFE ensures that all TLS connections are terminated with correct certificates and by following best practices such as supporting perfect forward secrecy. The GFE also applies protections against DoS attacks.

Designing and Implementing a

Designing and Implementing a

Secure Network Infrastructure

Secure Network Infrastructure

NANOG October 19, 2003

NANOG October 19, 2003

Merike Kaeo

Merike Kaeo

kaeo@merike.com kaeo@merike.com

Agenda

Agenda

§Session I (1:30 Session I (1:30 --3:00)3:00)

Security Technology Details

Security Technology Details

§Session II (3:30 Session II (3:30 --5:00)5:00)

Secure Infrastructure Architectures

Secure Infrastructure Architectures

§Session III (7:30 Session III (7:30 --9:00)9:00)

Sample Configuration Scenarios

Sample Configuration Scenarios

Security Technology Details

Security Technology Details

Who cares about technology if

Who cares about technology if

you don you don''t know what you want t know what you want or need to protect or need to protect............

First Step

First Step........Security Policy..Security Policy §What are you trying to protect?What are you trying to protect? -What data is confidential?What data is confidential? -What resources are precious?What resources are precious? §What are you trying to protect against?What are you trying to protect against? -Unauthorized access to confidential data?Unauthorized access to confidential data? -Malicious attacks on network resources?Malicious attacks on network resources? §How do regulatory issues affect your policy?How do regulatory issues affect your policy?

Characteristics of a Good

Characteristics of a Good

Security Policy

Security Policy

§Can it be implemented technically?Can it be implemented technically? §Are you able to implement it organizationally?Are you able to implement it organizationally? §Can you enforce it with security tools and /or Can you enforce it with security tools and /or sanctions? sanctions?

§Does it clearly define areas of responsibility for Does it clearly define areas of responsibility for

the users, administrators, and management? the users, administrators, and management? §Is it flexible and adaptable to changing Is it flexible and adaptable to changing environments? environments?

Why Should You Care?

Why Should You Care?

§Your job may be at stakeYour job may be at stake §Your reputation may be at stakeYour reputation may be at stake

§Why do you Why do you notnotcare?care?

Time for reality check.....most

companies STILL DO NOThave corporate sanctioned security policies....operators define them ad-hoc

Typical Network Components

Typical Network ComponentsInternet

Remote

AccessCorporate Network

Customer

CustomerAuthentication /

Syslog ServersNOC Hosts

Elements of a Security

Elements of a Security

Architecture

Architecture

§AuthenticationAuthentication

§AuthorizationAuthorization

§Data IntegrityData Integrity

§Data Origin AuthenticationData Origin Authentication

§Data ConfidentialityData Confidentiality

§Network AvailabilityNetwork Availability

§AuditAudit

Questions To Ask

Questions To Ask

ØWho can have access to what?Who can have access to what? ØHow to provide authentication?How to provide authentication? ØPhysical device security?Physical device security? ØDevice network access security?Device network access security? ØNeed for data confidentiality?Need for data confidentiality? ØNeed for data integrity?Need for data integrity? ØHow to verify security policy?How to verify security policy?

ØHow to enforce policy?How to enforce policy?

ØHow to detect intrusions?How to detect intrusions?

Varying Degrees of Robustness for

Varying Degrees of Robustness for

Security Elements

Security Elements

Will I Go Bankrupt ?

•Spend More Money •Spend More Time Is It An Embarrassment ?NEED TO DO A RISK ANALYSIS !

Risk Assessment

Risk Assessment

§Identify critical assetsIdentify critical assets -Hardware, software, data, people, documentationHardware, software, data, people, documentation

§Place a value on assetPlace a value on asset

-Intangible asset Intangible asset --importance or criticalityimportance or criticality -Tangible asset Tangible asset --replacement value and/or training replacement value and/or training costs costs §Determine likelihood of security breaches Determine likelihood of security breaches -What are threats and vulnerabilities?What are threats and vulnerabilities?

Risk Mitigation vs Cost of

Risk Mitigation vs Cost of

Security

Security

Risk mitigation:theprocess of selecting appropriate controls to reduce risk to an acceptable level.

The level of acceptable riskis determined by

comparing the risk of security hole exposure to the cost of implementing and enforcing the security policy. Assess the cost of certain losses and do not spend more to protect something than it is actually worth.

The Security Policy Should

The Security Policy Should

Include

Include..........

§Physical security controlsPhysical security controls -Media Media -Equipment locationEquipment location -Environmental safeguardsEnvironmental safeguards §Logical security controlsLogical security controls -Subnet boundariesSubnet boundaries -Routing boundariesRouting boundaries -Logical access control (preventative / detective)Logical access control (preventative / detective) §System and data integritySystem and data integrity -FirewallsFirewalls -Network servicesNetwork services

§Data confidentialityData confidentiality

The Security Policy Should

The Security Policy Should

Include

Include........

§Mechanisms to verify and monitor security controlsMechanisms to verify and monitor security controls

-AccountingAccounting -ManagementManagement -Intrusion detectionIntrusion detection

§Policies and procedures for staff that is responsible for the coPolicies and procedures for staff that is responsible for the corporate rporate networknetwork

-Secure backupsSecure backups -Equipment certificationEquipment certification -Use of Portable ToolsUse of Portable Tools -Audit TrailsAudit Trails -Incident HandlingIncident Handling

§Appropriate security awareness training for users of the corporaAppropriate security awareness training for users of the corporate te networknetwork

Incident Handling

Incident Handling

§You will have to deal with a security breachYou will have to deal with a security breach §Software will always require upgrades due Software will always require upgrades due to vulnerability discovery to vulnerability discovery

§DONDON''T PANICT PANIC

Have procedures in place before a

Have procedures in place before a

security breach happens!!! security breach happens!!!

Useful Resources

Useful Resources

default.asp§

Security Policy Summary

Security Policy Summary

§Need to have a comprehensive document Need to have a comprehensive document for legal support for legal support §Need a companion document which all Need a companion document which all corporate users will actually read corporate users will actually read

Security Technology Fundamentals

Security Technology Fundamentals

§Crypto 101Crypto 101

§Authentication TechnologiesAuthentication Technologies §Application Layer SecurityApplication Layer Security §Transport Layer SecurityTransport Layer Security §Network Layer Security (IPsec)Network Layer Security (IPsec)

§Link Layer SecurityLink Layer Security

Cryptography Is Used For ?

Cryptography Is Used For ?

§Authentication ProtocolsAuthentication Protocols §Data Origin AuthenticationData Origin Authentication

§Data IntegrityData Integrity

§Data ConfidentialityData Confidentiality

Public Key Encryption

Public Key Encryption

Uses public/private keys

Uses public/private keys

-Keep private key privateKeep private key private -Anyone can see public keyAnyone can see public keyPrivatePrivatePublicPublic

Computing Key pair is computationally expensive!!

Common Algorithms: RSA, El Gamal

Data Origin Authentication

Data Origin Authentication1.Router A generates public/private key pair

2.Router A sends its public key to Router B

3.Router A encrypts packet with its private key and

sends encrypted packet to Router B

4.Router B receives encrypted packet and decrypts with

Router A's public keyPriPriPubPubPubPub11223344PriPriPubPub

ClearEncrypted

Clear

Router A

Router BENCRYPTDECRYPT

Secret Key Encryption

Secret Key Encryption

Sensitive

InformationShared Secret KeyShared Secret Key

Sensitive

Information

(Cleartext) (Ciphertext)(Cleartext)DESDES

InternetENCRYPTDECRYPT

Common Algorithms: DES, 3DES, AES, IDEA

Scalability with Secret Key Crypto

Scalability with Secret Key Crypto

Configuring shared secret keys easily

Configuring shared secret keys easily

becomes administrative nightmare becomes administrative nightmare

Automated mechanism to securely derive

Automated mechanism to securely derive

secret keys => Diffie secret keys => Diffie--Hellman Hellman

Deriving Secret Keys Using Public

Deriving Secret Keys Using Public

Key Technology (e.g., Diffie

Key Technology (e.g., Diffie--Hellman)Hellman)Y

A= (aXA) mod pY

B= (aXB) mod p

Z= (YB) XAmod pZ= (YA)XBmod pDES

X

AXBa , p

By exchanging numbers in the clear,

By exchanging numbers in the clear,

two entities can determine a new unique two entities can determine a new unique number (Z), known only to them number (Z), known only to them

DH Man

DH Man--inin--thethe--Middle AttackMiddle Attack

§DiffieDiffie--Hellman is subject to a manHellman is subject to a man--inin--thethe--middle attackmiddle attack

§Digital signatures of the Digital signatures of the ''public valuespublic values''can enable each can enable each

party to verify that the other party actually generated the party to verify that the other party actually generated the value value => DH exchanges need to be authenticated!!X

AXBa , p

Y AYB

Hash Functions

Hash Functions

A Ahash functionhash functiontakes an input messagetakes an input message of arbitrary length and outputs fixed of arbitrary length and outputs fixed--lengthlength code. The fixed code. The fixed--length output is called thelength output is called the hash hash, or the , or the message digestmessage digest, of the original, of the original input message. input message.

Common Algorithms: MD-5 (128), SHA-1 (160)

Exclusive

Exclusive --OR Function (XOR Function (X--OR)OR)

1 xor 1 = 0 0 xor 0 = 0

1 xor 1 = 0 0 xor 0 = 0

1 xor 0 = 1 0 xor 1 = 1

quotesdbs_dbs5.pdfusesText_9
[PDF] how to create a signature in adobe

[PDF] how to create a simple database in excel vba pdf

[PDF] how to create a yahoo.ca account

[PDF] how to create a youtube channel pdf

[PDF] how to create a zip code

[PDF] how to create alert in kibana

[PDF] how to create an arraylist in java

[PDF] how to create an online business

[PDF] how to create an online course for free

[PDF] how to create an online petition

[PDF] how to create an online portfolio

[PDF] how to create an online signature

[PDF] how to create an online store

[PDF] how to create an online survey

[PDF] how to create apa format table in word