Network Security Model

Views:
 
Category: Education
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

Network Security Model…:

Network Security Model… -Soumen (09030142001)

Network Security.:

Network Security. Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations. An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them. 9/16/2010 2

Threats to network security include::

Threats to network security include: Viruses. Trojan Horse Programs. Vandals. Attacks. Data Interception. Social Engineering. 9/16/2010 3

Network security tools include::

Network security tools include: Antivirus software packages Secure network infrastructure Virtual private networks Identity services Encryption Security management 9/16/2010 4

Network Security Model.:

Network Security Model. Network security model is an typical approach of the solution for the problem ‘Network Security’. NSM divides the daunting task of securing a network infrastructure into seven manageable sections. 9/16/2010 5

Need for NSM.:

Need for NSM. NSM is used as a tool to breakdown network security into seven simple layers with a logical process. NSM is used by network architects to insure that they are not missing any important security details while designing a network. NSM is used to develop maintenance schedules and lifecycles for the security of the existing network. 9/16/2010 6

Typical seven layered NSM.:

Typical seven layered NSM. Physical Layer VLAN Layer. ACL Layer. Software Layer. User Layer. Administrative Layer. IT Department. 9/16/2010 7

Physical Layer.:

Physical Layer. Physical layer’s primary focus is on physical security. It prevent attackers from accessing a facility to gain data stored on servers, computers, or other mediums. The physical layer is one of the easiest layers to secure because it does not require advanced technical concepts to do so. Several forms of physical security consists of site design, access control devices, alarm, camera. 9/16/2010 8

VLAN Layer.:

VLAN Layer. The VLAN layer deals with the creation and maintenance of Virtual Local Area Networks. The primary reason that you make VLANs is to group together common hosts for security purposes. VLANs are an essential layer to the NSM because a network without segmentation contains a cluster of servers and devices without any clear organization. 9/16/2010 9

ACL Layer.:

ACL Layer. The ACL layer is focused on the creation and maintenance of Access Control Lists. ACLs are written on both routers and firewalls. ACLs are created to allow and deny access between hosts on different networks, usually between VLANs. This makes them absolutely indispensable in the area of network security. By setting up strong access control lists, a network security professional can stop many attacks before they begin. 9/16/2010 10

Software Layer.:

Software Layer. The software layer is focused on keeping software up to date with upgrades and patches in order to mitigate software vulnerabilities. If the software layer is compromised then an attacker can potentially get anything on that host and hence its important. The software layer also helps protect the user layer. 9/16/2010 11

User Layer.:

User Layer. The user layer focuses on the user’s training and knowledge of security on the network. The user layer is important to the NSM because if the user layers get compromised a user account is most likely also compromised. The user layer is listed first because once the administrative layer has been breached it is not important that the user layer is still secure. 9/16/2010 12

Administrative Layer.:

Administrative Layer. The administrative layer focuses on the training of administrative users. The administrative layer is important to the NSM because if the administrative layer is compromised an administrative account is likely also compromised. Most attackers will target the administrative layer before the IT department layer because the IT department layer contains users most likely to identify the attack. 9/16/2010 13

IT Department.:

IT Department. The IT department layer contains all of the network security professionals, network technicians, architects, and support specialists who in turn make a network operational, and maintain the network, and all of the hosts that reside on that network. The IT department layer is important to the NSM because if the IT layer fails the attacker will have system level access to all devices on the network. Failure of IT department can also cause massive financial loss to a company because client trust has been affected. 9/16/2010 14

How the Network Security Model can be used to mitigate an attack.:

How the Network Security Model can be used to mitigate an attack. Initial Mitigation Long-Term Mitigation 9/16/2010 15

Conclusion:

Conclusion As of now there is no full-proof model for network security; the presented model is defined and proven a possible Network Security Model which will allow general network security to be implemented and maintained by any size company. This is a framework and each layer can be modified to include company specific issues and details which aren’t outlined here. 9/16/2010 16

Thank you.:

Thank you. 9/16/2010 17

authorStream Live Help