Network security by quontra solutions

Page 1

info@quontrasolutions.com

Quontra solutions Network Security http://www.quontrasolutions.com Call us : (404)-900-9988

www.quontrasolutions.com

Call us : (404)-900-9988


info@quontrasolutions.com

Network Security  Security Devices  Firewalls  Network Access Security  User Authentication  Device Security  Common Security Threats

www.quontrasolutions.com

Call us : (404)-900-9988


info@quontrasolutions.com

Security Devices  Explain the function Of Hardware and Software

security devices.

Network Based Firewall – Host Based Firewall – IDS – IPS – VPN Concentrator –

www.quontrasolutions.com

Call us : (404)-900-9988


info@quontrasolutions.com

Host Based Firewall  Software Based Protection on a device  Sees all the Traffic  Difficult to manage

large groups

www.quontrasolutions.com

Call us : (404)-900-9988


info@quontrasolutions.com

Windows Firewall with Advanced Security

www.quontrasolutions.com

Call us : (404)-900-9988


info@quontrasolutions.com

Network Based Firewall  Filters Traffic By Port Number  Can Encrypt traffic in/out of the network.  Can proxy traffic  Most firewalls can be Layer 3 devices (routers).

www.quontrasolutions.com

Call us : (404)-900-9988


info@quontrasolutions.com

Network Based Firewall  Advantages  Protects many devices at once  High-speed

 Disadvantages  Limited Visibility into encrypted Information

www.quontrasolutions.com

Call us : (404)-900-9988


IDS/IPS  Intrusion Detection System  Intrusion Prevention System  Intrusions  Exploits against Operating Systems , applications etc.  Bufferoverflows and other vulnerabilities

 Detection Vs Prevention  Detection – Alarm or Alert  Prevention – Stop it before it gets into the network.

www.quontrasolutions.com

Call us : (404)-900-9988


IDS/IPS  Advantages  Watches all traffic through a network link  Can completely stop bad traffic

 Disadvantages  Limited Visibility into encrypted Data  Yet Another device on the Network

www.quontrasolutions.com

Call us : (404)-900-9988


VPN concentrator

www.quontrasolutions.com

Call us : (404)-900-9988


Identify Common Security Threats and Mitigations  Security Threats  Dos ,viruses, worms ,attackers ,Man in the

middle attack ,Smurf ,Social engineering (phishing)

 Mitigation Techniques  Policies and Procedures ,user training ,patch

and updates

www.quontrasolutions.com

Call us : (404)-900-9988


Denial Of Service  Anything that prevents a device from providing normal services  DoS /DDoS  Denial Of Service /Distributed Denial of service

 Smurf Attacks  Ping sents to a broadcast address were duplicated to all IP

addresses on the subnets by the routers

 We fixed that in 1999

www.quontrasolutions.com

Call us : (404)-900-9988


Viruses and Worms  Viruses infect files and duplicate by copying

themselves with other documents

 Worms don’t need any other files or programs in

order to infect other devices

 Malware is a catch-all term for viruses ,spywares ,

adwares ,worms and other bad stuff

www.quontrasolutions.com

Call us : (404)-900-9988


Man in the Middle Attack ď‚— A form of electronic eavesdropping ď‚— Especially useful for encrypted communication

www.quontrasolutions.com

Call us : (404)-900-9988


Man in the Middle Attack ď‚— A form of electronic eavesdropping ď‚— Especially useful for encrypted communication

www.quontrasolutions.com

Call us : (404)-900-9988


Social Engineering  Major Threats  Electronically Undetectable

 Suspicious Telephone Call  Don’t give any information over the Telephone

 Look out for unattended persons  Badges  Processes

www.quontrasolutions.com

Call us : (404)-900-9988


Phishing ď‚— Electronic Version Of Social Engineering

www.quontrasolutions.com

Call us : (404)-900-9988


Mitigation Techniques  Policies and Procedures  User Training  Patches and Updates

www.quontrasolutions.com

Call us : (404)-900-9988


Summary  DoS (Denial Of Service) or DDoS (Distributed DoS)

prevent a device from providing normal services.

 Man in the Middle Attack method can hackers use to

intercept encrypted communication between stations

 Phishing is the electronic method of social engineering to

gather personal information.

www.quontrasolutions.com

Call us : (404)-900-9988


info@quontrasolutions.com

To Know More In-depth Knowledge Contact us

Quontra Solutions Call : (404)-900-9988 Email: info@quontrasolutions.Com http://www.quontrasolutions.Com

www.quontrasolutions.com

Call us : (404)-900-9988


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.