network security (21 sep 2010)

27
NETWORK SECURITY NETWORK SECURITY NETWORK SECURITY NETWORK SECURITY Persidangan Keselamatan ICT Sektor Awam Tahun 2010 PICC, 21 September 2010 PICC, 21 September 2010 PICC, 21 September 2010 PICC, 21 September 2010

Upload: others

Post on 30-Nov-2021

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network Security (21 Sep 2010)

NETWORK SECURITY NETWORK SECURITY NETWORK SECURITY NETWORK SECURITY

Persidangan Keselamatan ICT SektorAwam

Tahun 2010

PICC, 21 September 2010PICC, 21 September 2010PICC, 21 September 2010PICC, 21 September 2010

Page 2: Network Security (21 Sep 2010)

Unit Pemodenan Tadbiran dan Perancangan Pengurusan Malaysia 2

RANGKAKERJA

KESELAMATAN MAKLUMAT

TADBIR URUS

Polisi

Strategi

Peranan &

Tanggungjawab

Pengukuran

Prestasi

Pengurusan Risiko

Perundangan & Peraturan

Pendidikan dan

Latihan

PERKHIDMATAN KESELAMATAN ICT (UMUM)

PengurusanService Level Agreemement

PerancanganPerkhidmatan

System Development Life Cycle

Pembangunansecaraoutsourced

Pengurusan Pembangunan

PengurusanPerubahan

Rekabina N-tier bagi Pusat Data

Email PertukaranDokumen

Operasi

Komunikasi

Identification & Authentication

Authorization Identity & Key Management

Audit Trails & Monitoring

Backup,

Redundancy & Recovery

PERKHIDMATAN KESELAMATAN ICT (TEKNIKAL)

Pembudayaan dan

Pematuhan

INFRASTRUKTUR ICT

Wireless PejabatCawangan/ AgensiLain

Portal Aplikasi Khusus:

Kawal Selia

Pemudah Cara

TadbirUrus

Rangkaian + Komunikasi Landasan Aplikasi

Perimeter Protection

Guest Access

Page 3: Network Security (21 Sep 2010)

Unit Pemodenan Tadbiran dan Perancangan Pengurusan Malaysia 3

Perkhidmatan

Pengurusan

Perkhidmatan

Pembangunan

Perkhidmatan

Operasi

3 3 3 3

ASPEK ASPEK ASPEK ASPEK

UTAMAUTAMAUTAMAUTAMA

PERKHIDMATAN KESELAMATAN ICT

(UMUM)

�Pengurusan Service Level Agreement

�Perancangan

Perkhidmatan

�Pengurusan Service Level Agreement

�Perancangan

Perkhidmatan

�System Development Life Cycle

�Pembangunan

secara outsourced

�System Development Life Cycle

�Pembangunan

secara outsourced

�Pengurusan

Perubahan

�Rekabina N-tier bagi

Pusat Data

�Email

�Pertukaran Dokumen

�Komunikasi

�Pengurusan

Perubahan

�Rekabina N-tier bagi

Pusat Data

�Email

�Pertukaran Dokumen

�Komunikasi

Page 4: Network Security (21 Sep 2010)

Unit Pemodenan Tadbiran dan Perancangan Pengurusan Malaysia 4

Identification

&

Authentication

PERKHIDMATAN KESELAMATAN ICT

(TEKNIKAL)

� Elemen Perkhidmatan Keselamatan ICT (Teknikal)

merangkumi pelaksanaan penyelesaian teknikal yang

bertujuan menekankan aspek perlindungan dan

pemantauan aset Jabatan / Agensi.

AuthorizationIdentity & key

Management

Audit Trails

& Monitoring

Backup,

redundancy

& recovery

5 5 5 5 AspekAspekAspekAspek UtamaUtamaUtamaUtama

Page 5: Network Security (21 Sep 2010)

Unit Pemodenan Tadbiran dan Perancangan Pengurusan Malaysia 5

Rangkaian

&

Komunikasi

INFRASTRUKTUR ICT

� Sebarang Sistem ICT adalah disokong oleh Infrastruktur

ICT yang terdiri dari rangkaian, komunikasi dan sistem

landasan yang menjadi nadi penggerak sistem-sistem

aplikasi Jabatan / Agensi.

Landasan

Aplikasi

INFRAINFRAINFRAINFRA----

STRUKTUR STRUKTUR STRUKTUR STRUKTUR

ICTICTICTICT

�Wireless

�Perimeter Protection

�Pejabat Cawangan /

Agensi Lain

�Guest Access

�Wireless

�Perimeter Protection

�Pejabat Cawangan /

Agensi Lain

�Guest Access

�Portal

�Aplikasi-aplikasi

Khusus

�Portal

�Aplikasi-aplikasi

Khusus

Page 6: Network Security (21 Sep 2010)

Network Security

KESELAMATAN RANGKAIAN

Page 7: Network Security (21 Sep 2010)

What is a Network?

� Two or more devices connected across some medium by hardware and software that enable the communication.

� Environment of Use : LAN, WAN, MAN.

� Mode of Communications : Media, Cable, Type of Communication.

� Protocol : TCP/IP, OSI

Page 8: Network Security (21 Sep 2010)

Network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.

Network Security

Page 9: Network Security (21 Sep 2010)

How does it work?

� Network security starts from authenticating the user, commonly with a username and a password. Since this requires just one thing besides the user name, i.e. the password which is something you 'know', this is sometimes termed one factor authentication. With two factor authentication something you 'have' is also used (e.g. a security token or 'dongle', an ATM card, or your mobile phone), or with three factor authentication something you 'are' is also used (e.g. a fingerprint or retinal scan).

Page 10: Network Security (21 Sep 2010)

� Once authenticated, a firewall enforces access

policies such as what services are allowed to be

accessed by the network users.[2] Though

effective to prevent unauthorized access, this

component may fail to check potentially harmful

content such as computer worms or Trojans

being transmitted over the network. Anti-virus

software or an intrusion prevention system

(IPS)[3] help detect and inhibit the action of such

malware.

How does it work?

Page 11: Network Security (21 Sep 2010)

� An anomaly-based intrusion detection systemmay also monitor the network and traffic for unexpected (i.e. suspicious) content or behavior and other anomalies to protect resources, e.g. from denial of service attacks or an employee accessing files at strange times. Individual events occurring on the network may be logged for audit purposes and for later high level analysis.

� Communication between two hosts using a network could be encrypted to maintain privacy.

How does it work?

Page 12: Network Security (21 Sep 2010)

Threats In Network Security

� Precursors to attack� Port scan

� Social engineering

� Reconnaissance

� OS and application fingerprinting

� Authentication failures� Impersonation

� Guessing

� Eavesdropping

� Spoofing

� Session hijacking

� Man-in-the-middle attack

Page 13: Network Security (21 Sep 2010)

� Programming flaws

� Buffer overflow

� Addressing errors

� Parameter modification, time-of-check to time-

of-use errors

� Server-side include

� Cookie

� Malicious active code: Java, ActiveX

� Malicious code: virus, worm, Trojan horse

� Malicious typed code

Threats In Network Security

Page 14: Network Security (21 Sep 2010)

Compromise of CIA

� Confidentiality

� Protocol flaw

� Eavesdropping

� Passive wiretap

� Misdelivery

� Exposure within the network

� Traffic flow analysis

� Cookie

Page 15: Network Security (21 Sep 2010)

Compromise of CIA

� Integrity

� Protocol flaw

� Active wiretap

� Impersonation

� Falsification of message

� Noise

� Web site defacement

� DNS attack

Page 16: Network Security (21 Sep 2010)

Compromise of CIA

� Availability

� Protocol flaw

� Transmission or component failure

� Connection flooding, e.g., echo-chargen, ping

of death, smurf, syn flood

� DNS attack

� Traffic redirection

� Distributed denial of service

Page 17: Network Security (21 Sep 2010)

Basic Security in Network

� Authentication, Authorization, and Access Control

� Cryptography.

� Remote Access and Wireless Security

� Virtual Private Network

� Firewall

� Intrusion Detection and Prevention System

� Honeypots

� Infrastructure Security

Page 18: Network Security (21 Sep 2010)

Network Vulnerabilities and Controls.

Page 19: Network Security (21 Sep 2010)

Network Vulnerabilities and Controls.

Page 20: Network Security (21 Sep 2010)

Network Vulnerabilities and Controls.

Page 21: Network Security (21 Sep 2010)

Network Vulnerabilities and Controls.

Page 22: Network Security (21 Sep 2010)

Network Vulnerabilities and Controls

Page 23: Network Security (21 Sep 2010)

Network Vulnerabilities and Controls

Page 24: Network Security (21 Sep 2010)

Firewall Types

Page 25: Network Security (21 Sep 2010)

Example of a Network Design

Page 26: Network Security (21 Sep 2010)

Continuous Effort

� monitor in real-time, backbone network traffic, as

necessary and appropriate, for the detection of

unauthorized activity, intrusion attempts and

compromised equipment.

� carry out and review the results of automated

network-based vulnerability, compromise

assessment and guideline compliance scans of

the systems and devices

Page 27: Network Security (21 Sep 2010)

SEKIANSEKIANSEKIANSEKIAN

TERIMA KASIHTERIMA KASIHTERIMA KASIHTERIMA KASIH