الخميس، 27 ديسمبر 2012
IT Infrastructure Security Issue -Step by Step
It is said “Defense is in Depth”.This security model is represented in the figure below. This model consists of 4 layers of security
This layer is like the four walls and the roof of a secure house. It includes firewalls, routers and proxy servers. A national survey showed that 70-80% of attacks are internal i.e., from within the organization’s internal network. Therefore, securing from internal attacks is the first line of defense. However, having only this line is not enough to protect any network and valuable information.One of the common attacks on this layer is DoS (Denial of Service) attack, which involves flooding the point of connection to outside world with unproductive traffic. common DoS attacks on routers are Smurf, Syn, Ack and Rst attacks. Cisco researchers/security analysts have produced a wonderful document (Refer: http://www.cisco.com/warp/public/707/21.html) on how to configure a router to protect against these attacks. There are numerous solutions documented by various vendors. I have discussed the Cisco’s findings here since I am implementing and managing the same in my organization.The aforesaid paper describes how attacks like Smurf target victim systems using source-spoofed packets originating from a third-party’s (middle) system. One of the methods to stop this involves filtering at the point of connection to the Internet in your network or your ISP. Additionally router vendors have added options to disallow packets with spoofed IP source addresses. Cisco has implemented this by adding a command: “[no] ip verify unicast reverse-path”.To prevent one’s system from being the middle system (the system used to attack the target), Cisco has added another command: “no ip directed-broadcast” in IOS 12.0. This option is set by default, and protects the OSI layer3 broadcast into OSI layer 2 broadcast.If you have a DMZ, make sure the filters between your internal network and DMZ are configured properly:- DMZ is setup as an external network to the internal network (production network)
There are different flavors of UNIX. Linux is one of the widely used and popular variant of UNIX. Like any other operating system, we have to keep fine-tuning Linux too. Some of the precautionary measures related to Linux systems security are as follows:
Web Sites
الاشتراك في:
تعليقات الرسالة (Atom)
Salam alaikum Abeer
ردحذفYour topic is very Important, you know how much I'm interested in protection and security
I found a very useful document about Network Security Model :
http://www.sans.org/reading_room/whitepapers/modeling/network-security-model_32843
your blog gave me alot of information, thanks alot abeer
walicom assalaam my Abeer ;)
ردحذفIm happy you liked the topic and thanks for the link and your nice comment
:$
Mrehaa Abeer
ردحذفGod bless your efforts .. Good covered of the subject
I also found this site talking about Security issues I hope to
benefit students
http://publib.boulder.ibm.com/infocenter/asehelp/v5r6m0/index.jsp?topic=/com.ibm.ase.help.doc/topics/r_infrastructure_security_issues_report.html
جزاك الله كل خير
Thank you very much Mayy
ردحذف<3
your future is not secure if your information is not secure
ردحذفThanks Abeer,very useful information
Hi Abeer
ردحذفGood coverage of the subject, I enjoyed reading of the subject , and i benefited from the protection of information and data.
Thank you
Muna@ You right!
ردحذف" loved your comment" your future is not secure if your information is not secure
Thank you <3
Wa3ad@
ردحذفThank you 7bibati
I'm glad that you liked it :$
Hi Abeer ^_^
ردحذفThank you for the helpful information
I like your blog design so much .
Good luck
Ahlaan wa Sahlaan Maryam ...
ردحذفI'm happy to see your lovely comment..
YOUR EYES ARE BEAUTIFULL <3