trey shaffer treys @ postnet.com trey.shaffer @ oneco.net

19
Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Upload: christina-long

Post on 29-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Trey Shaffer

TreyS @ PostNet.com

Trey.Shaffer @ OneCo.net

Page 2: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Intros, Background

• Trey

• Class

Page 3: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Security, broadly speaking

• Threat assessment

• Approach

• Solution

Page 4: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Risk Assessment

• Mission Critical Data

• Mission Critical Transactions

• Public Image

• Lost Productivity– Data recovery– Virus

Page 5: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Security Overview

• 80/20 rule

• 95/5 rule

• Send attackers to your neighbor

Page 6: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Corporate Data Loss

• Sneaker Net

• Laptops

• PDAs

• RAS/VPN• Hacker

Page 7: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Methods of Protection

• Unplug

• Restrict Access

• Control Access

Page 8: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Restrict Access – Who

• User/Password

• Certificates

• Random Generator

• Biometric

Page 9: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Certificates

• You Are Who You (say you) Are

• Three Parties– User– Host– Cert Authority

Page 10: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Restrict Access – Where

• Certificates

• Telephone Number

• IP Address

• DNS Reverse

Page 11: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Methodology

• Choose one

• Thorough

• Repeatable

Page 12: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Break?

Page 13: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Techie Stuff

• TCP/IP Protocol– How it works

• Barrier Solutions– Address translation– Proxy– Firewall

Page 14: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

TCP/IP

• Postal Mail Analogy

• Unique address– Network– Host

• Gateway

• Ports

Page 15: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Control Access

• Naked Isolation

• DMZ

• Internal

Page 16: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Solutions

• Meet Various Needs– Features– Ease of use– Performance– Cost

• Hybrid Feature Sets

Page 17: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Address Translation

• Mask Addresses– Many internal– Single/few external

• Inexpensive

• Universal

• Limited Flexibility

Page 18: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Proxy

• Address Translation• Caching

– Performance– Utilization

• Management– Control– Reporting

Page 19: Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net

Firewall

• Hardware/Software

• Extended Features

• Complex/Flexible Policy

• Multi-Point Implementation

• Complementary Services– VPN– Web filtering