SlideShare a Scribd company logo
1 of 15
Network Security Proposal
Sally Frederick Tudor
Network Administrator
SECURITY AUDIT POLICY
 Make asset list (inventory)
 Make threats list
 Prioritize Assets and Vulnerabilities
Risk = Probability X Harm
 Are NAC’s (ACLs) being implemented?
 Are they monitored and updated regularly?
 Are there Audit logs to review and identify attempts to
access network?
 Are STIGs being implemented and adhered to?
SECURITY AUDIT POLICY
 Inventory of all assets
 Locks on all doors and cabinets
 Educate users on policies and how to adhere to them
 Intruder Detection (IDS)
 Anti-virus program
 Anti-spyware program
 Windows Firewall on your Operating System
 Windows Defender
 Strong password policies
SECURITY AUDIT POLICY
 Disaster Recovery Plan
 Backup policies
 Encryption policies
 Event logging should be enabled and monitored
weekly
 Security policy should be changed or updated as often
as needed
SECURITY AUDIT POLICY
 Are there backup policies?
 Are email communications being protected and
filtered?
 Are Intrusion Detection Systems (IDS) being used on
the network?
 Are key personnel educated on regarding DoDs
policies and guidelines?
 Are physical assets and resources being protected by
Intrusion Prevention System (IPS)?
FIREWALLS
 Firewalls are a MUST!
 All firewalls have a Rules file.
 The best option for your firewall is the default setting:
Deny-All because it is the “cautious approach”.
 Deny-All then assign permissions sparingly as
necessary for operation of the business.
 Packet filtering is done by a firewall and it limits the
data that comes in through your ports.
 By doing so the firewall can block services such as FTP
and Telnet.
FIREWALLS
 Using and maintaining passwords enable
authentication on the firewall so users can only surf
the Web or use E-mail after they have successfully
authenticated themselves, which force employees to
keep track of passwords and to remember them.
 Password lists need to be kept up-to-date; for example
when they are changed, or employees quit or get fired,
or leave the business for any reason.
 The IDS can be installed on a central server, or in the
external and/or the internal routers at the perimeter of
the network.
PROXY SERVERS
 Proxy servers are used to conceal clients, translate
network addresses, and filter content.
 They prevent malicious code from entering the
network.
 They scan the entire data part of IP packets and create
much more detailed log file listings than packet filters.
 Packet filters log only the header information, whereas
proxy servers can log much more.
 Proxy servers rebuild the packets with new source IP
information, which shields internal users from those
on the outside.
ENCRYPTION
 Encryption plays an important role in many firewalls.
 Hackers will take advantage of firewalls that don’t use
encryption.
 Preserves data integrity.
 Encryption plays an important role in enabling virtual
private networks (VPNs).
 Encryption method should be monitored to assess how
well it is working.
 Firewall log files can improve the security against intrusion
attempts by identifying attempts made by hackers to
compromise or breach the network.
REMOTE SECURITY
 Determine which remote access vulnerabilities
currently exist in your environment.
 Vulnerability Scanning finds missing patches, and digs
in deeper to find misconfigurations, unnecessary
shares, null session connections and other exploitable
vulnerabilities you would not otherwise be able to dig
up easily.
 Install and run Microsoft Baseline Security Analyzer
(MBSA) on all systems and review reports.
 Ensure that personal firewall software is installed.
REMOTE SECURITY
 Require antivirus and antispyware on every system.
 Ensure that updates are being applied in real-time if
possible to prevent unnecessary infections.
 Enable strong file and share permissions on remote
hard drives and other storage devices—especially
Windows 2000 and NT—that allows everyone access
by default.
 Have a written policy and documented procedures in
place for managing patches.
REMOTE SECURITY
 Disable null session connections as outlined to prevent
the unauthorized gleaning of user names, security
policy information and more from remote systems.
 Implement a VPN using the free Windows-based
PPTP, or Windows Remote Desktop or Citrix.
 Remember to include remote users; computers and
applications in your security incident response plan
and disaster recovery plans.
 To prevent users from installing IM, P2P, and other
applications that you can’t support grant minimal
privileges.
REMOTE SECURITY
 For systems that are wireless don’t forget to enable
WEP at a minimum since it’s better than nothing.
 Require your users to use directional antennae.
 Enable MAC address controls which help non-techies
from snooping or accessing your network.
 Require a specific vendor model of AP and wireless
NIC to ensure they are hardened consistently
according to your standards and so you can stay
abreast of any major security alerts and necessary
firmware of software updates.
REMOTE SECURITY
 Remember that users may connect to your network via
public hotspots to make user you and they understand
the security implications and have the proper
safeguards in place.
 Enable secure messaging if a VPN or other hotspot
protection is not available via POP3s, SMTPs, Webmail
via HTTPS and other built-in controls.
 Disable Bluetooth if it’s not needed. Otherwise, it’s too
risky by default so lock it down.
NETWORK SECURITY PROPOSAL

More Related Content

What's hot

Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
webhostingguy
 

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Network security
Network securityNetwork security
Network security
 
Network security
Network security Network security
Network security
 
Network security
Network securityNetwork security
Network security
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Firewall
FirewallFirewall
Firewall
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
 
Firewall
FirewallFirewall
Firewall
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similar to Sallysspecialservices networksecurityproposal2-100305141834-phpapp02

security_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxsecurity_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptx
Akttripathi
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
Nuuko, Inc.
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
ashu6
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
KerimBozkanli
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
write4
 

Similar to Sallysspecialservices networksecurityproposal2-100305141834-phpapp02 (20)

Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
security_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxsecurity_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptx
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Firewall
FirewallFirewall
Firewall
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University project
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for Healthcare
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Day4
Day4Day4
Day4
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
 
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
 
It security
It securityIt security
It security
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
 

More from Sally's Special Services (8)

Ec311 projectpresentation-100521005642-phpapp02
Ec311 projectpresentation-100521005642-phpapp02Ec311 projectpresentation-100521005642-phpapp02
Ec311 projectpresentation-100521005642-phpapp02
 
Harrywilliamlinderman 091108030352-phpapp01
Harrywilliamlinderman 091108030352-phpapp01Harrywilliamlinderman 091108030352-phpapp01
Harrywilliamlinderman 091108030352-phpapp01
 
Network Proposal
Network ProposalNetwork Proposal
Network Proposal
 
Recommending a Strategy2
Recommending a Strategy2Recommending a Strategy2
Recommending a Strategy2
 
Medical Network Presentation2
Medical Network Presentation2Medical Network Presentation2
Medical Network Presentation2
 
SALLYS SPECIAL SERVICES
SALLYS SPECIAL SERVICESSALLYS SPECIAL SERVICES
SALLYS SPECIAL SERVICES
 
Computer Monitor Presentation
Computer Monitor PresentationComputer Monitor Presentation
Computer Monitor Presentation
 
Sally’s Special Services2
Sally’s Special Services2Sally’s Special Services2
Sally’s Special Services2
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Sallysspecialservices networksecurityproposal2-100305141834-phpapp02

  • 1. Network Security Proposal Sally Frederick Tudor Network Administrator
  • 2. SECURITY AUDIT POLICY  Make asset list (inventory)  Make threats list  Prioritize Assets and Vulnerabilities Risk = Probability X Harm  Are NAC’s (ACLs) being implemented?  Are they monitored and updated regularly?  Are there Audit logs to review and identify attempts to access network?  Are STIGs being implemented and adhered to?
  • 3. SECURITY AUDIT POLICY  Inventory of all assets  Locks on all doors and cabinets  Educate users on policies and how to adhere to them  Intruder Detection (IDS)  Anti-virus program  Anti-spyware program  Windows Firewall on your Operating System  Windows Defender  Strong password policies
  • 4. SECURITY AUDIT POLICY  Disaster Recovery Plan  Backup policies  Encryption policies  Event logging should be enabled and monitored weekly  Security policy should be changed or updated as often as needed
  • 5. SECURITY AUDIT POLICY  Are there backup policies?  Are email communications being protected and filtered?  Are Intrusion Detection Systems (IDS) being used on the network?  Are key personnel educated on regarding DoDs policies and guidelines?  Are physical assets and resources being protected by Intrusion Prevention System (IPS)?
  • 6. FIREWALLS  Firewalls are a MUST!  All firewalls have a Rules file.  The best option for your firewall is the default setting: Deny-All because it is the “cautious approach”.  Deny-All then assign permissions sparingly as necessary for operation of the business.  Packet filtering is done by a firewall and it limits the data that comes in through your ports.  By doing so the firewall can block services such as FTP and Telnet.
  • 7. FIREWALLS  Using and maintaining passwords enable authentication on the firewall so users can only surf the Web or use E-mail after they have successfully authenticated themselves, which force employees to keep track of passwords and to remember them.  Password lists need to be kept up-to-date; for example when they are changed, or employees quit or get fired, or leave the business for any reason.  The IDS can be installed on a central server, or in the external and/or the internal routers at the perimeter of the network.
  • 8. PROXY SERVERS  Proxy servers are used to conceal clients, translate network addresses, and filter content.  They prevent malicious code from entering the network.  They scan the entire data part of IP packets and create much more detailed log file listings than packet filters.  Packet filters log only the header information, whereas proxy servers can log much more.  Proxy servers rebuild the packets with new source IP information, which shields internal users from those on the outside.
  • 9. ENCRYPTION  Encryption plays an important role in many firewalls.  Hackers will take advantage of firewalls that don’t use encryption.  Preserves data integrity.  Encryption plays an important role in enabling virtual private networks (VPNs).  Encryption method should be monitored to assess how well it is working.  Firewall log files can improve the security against intrusion attempts by identifying attempts made by hackers to compromise or breach the network.
  • 10. REMOTE SECURITY  Determine which remote access vulnerabilities currently exist in your environment.  Vulnerability Scanning finds missing patches, and digs in deeper to find misconfigurations, unnecessary shares, null session connections and other exploitable vulnerabilities you would not otherwise be able to dig up easily.  Install and run Microsoft Baseline Security Analyzer (MBSA) on all systems and review reports.  Ensure that personal firewall software is installed.
  • 11. REMOTE SECURITY  Require antivirus and antispyware on every system.  Ensure that updates are being applied in real-time if possible to prevent unnecessary infections.  Enable strong file and share permissions on remote hard drives and other storage devices—especially Windows 2000 and NT—that allows everyone access by default.  Have a written policy and documented procedures in place for managing patches.
  • 12. REMOTE SECURITY  Disable null session connections as outlined to prevent the unauthorized gleaning of user names, security policy information and more from remote systems.  Implement a VPN using the free Windows-based PPTP, or Windows Remote Desktop or Citrix.  Remember to include remote users; computers and applications in your security incident response plan and disaster recovery plans.  To prevent users from installing IM, P2P, and other applications that you can’t support grant minimal privileges.
  • 13. REMOTE SECURITY  For systems that are wireless don’t forget to enable WEP at a minimum since it’s better than nothing.  Require your users to use directional antennae.  Enable MAC address controls which help non-techies from snooping or accessing your network.  Require a specific vendor model of AP and wireless NIC to ensure they are hardened consistently according to your standards and so you can stay abreast of any major security alerts and necessary firmware of software updates.
  • 14. REMOTE SECURITY  Remember that users may connect to your network via public hotspots to make user you and they understand the security implications and have the proper safeguards in place.  Enable secure messaging if a VPN or other hotspot protection is not available via POP3s, SMTPs, Webmail via HTTPS and other built-in controls.  Disable Bluetooth if it’s not needed. Otherwise, it’s too risky by default so lock it down.

Editor's Notes

  1. March 2, 2010