Question

A physical security company has an innovative, patented product and critical secrets to protect. For this...

A physical security company has an innovative, patented product and critical secrets to protect. For this company, protecting physical security and safeguarding network security go hand in hand. A web application in the data center tracks the serialized keycodes and allows customers to manage their key sets. the customers include everyone from theft-conscious retail chains to security-sensitive government agencies. In this case project, how would the security company go about establishing solid network security to protect them against intrusions?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

we will see this step by step.

First what is intrusion?

INTRUSION:An attempt to gain entry or access directed against a system or unauthorised parties

(OR) An attempt to disrupt the normal operations of a system or a network.

So we will see how the company will establish solid network security to protect them against intrusions.

PREVENTION IS IDEAL ,BUT DETECTION IS MUST

INTRUSION DETECTION SYSTEM:

  • An Intrusion detection system monitors the system or network and produces reports and alerts.
  • Network based IDS does so by watching network traffic
  • An IDS Monitors , but does not stop intrusions.

It is best to stop an attacker while still they are at beachhead - before they spread further.

So we have ways to prevent our system/Network from intruders.

The Network Design for small organisation look like:

Network design Small organisation Internet Firewall IPS Router -ForwardIDS Intranet

The Network Design for Largeorganisation look like:

Network design Larger organisation Internet Firewall DS/IPS IDS/IPSRouter DMZ WAP Intranet.eipsip DS/IPS

IPS (Intrusion Prevention Sytsem):

  • An intusion pevention system (IPS) is an IDS that proactively reacts to prevent the system from attacks. For Example, resetting a TCP connection(or Resetting a firewall) when it looks like an attack is taking place
  • Also known as IDPS( Intusion Detection & Prevention System)

Take automated actions to combat an attack :

--> configure firewall to block IP Address of an intruder

-->Launch a seperate program to handle the event

-->Save the packets in a file for further analysis

-->Terminate the TCP session by forging a TCP FIN packet to force a connection to terminate

An IPS is typically placed inline,So that it can actively respond to the connection

Signature based detection:

  • A database of signatures is compared to activity or behaviour
  • sting or pattern matching
  • similar to way anti malware looks for known milacious files and process (For example:An SQL Injection attack ,buffer overflow exploit)

Anamoly Based detection:

  • Anamoly based detection looks for activity or behaviour that is out of ordinary
  • statistical anamoly activity that differs from the baseline activity(what normally happens in a network) .For example: different ports,protocols or bandwidths used
  • protocol anamoly: traffic that doesnot conform to the protocol specifications.For Example:Something on port 80 that is not http.

SNORT:

So to establish the solid network security we can use IPS

Snort is a very popular IDS(can also be used as IPS)

Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks.

It can perform protocol analysis, content searching/matching, and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more.

Snort has three primary uses: It can be used as a

  1. straight packet sniffer like tcpdump,
  2. a packet logger (useful for network traffic debugging, etc), or
  3. as a full blown network intrusion prevention system.
  • We will have simple signature based rules
  • various front ends are available
  • other tools share the same rule set

Snort Packet capture Stream reassembly Packet defragmentation Protocol decoding Normalisation Preprocessing rule detection (p

So , Snort is one of the industry's top network intrusion-detection tools, but there are plenty of free alternatives

  • Security Onion.
  • OSSEC.
  • OpenWIPS-NG.
  • Suricata.
  • Bro IDS.

Snort has influenced other IDS/IPS vendors in a huge way, either by the way they develop their software or by directly using Snort modules in their offering.

So to establish solid network security we can use the above mentioned tools to protect them against intrusions.

------------------------------------------------------------------------------------------------------------------------------------------------

Hope this will help

Add a comment
Know the answer?
Add Answer to:
A physical security company has an innovative, patented product and critical secrets to protect. For this...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Actions that damage a company and its employees should be stamped out, everyone would agree. But ...

    Actions that damage a company and its employees should be stamped out, everyone would agree. But should the people responsible be stamped out, too? HBR CASE STUDY The Reign of Zero Tolerance by Ben Gerson "Mr. Pemberton?" manager. The guards had radioed her that the "Yes, that's me," Simon replied distractedly, his back turned. target wasn't putting up much resistance. "Your personal belongings will be messen The two burly gentlemen who had suddenly gered to your home later today," Sallie...

  • The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks....

    The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks. They show where individuals are, where they’ve been and who they might have talked to or even touched — potentially offering maps to find infected people and clues to stopping new ones. But gaining access to this data, even amid a global pandemic, is made complex by the legal and ethical issues surrounding government access to information that can reveal intimate details about citizens’...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT