Friday, June 7, 2019

Network Hardening Essay Example for Free

Network Hardening EssayNetwork HardeningNetwork Layout 4 VPN (Remote attack Domain) Virtual Private Networks (VPNs) with VPN software and Secure Socket Layer/VPN (SSL/VPN) tunnels A Virtual Private Network or VPN enables a computer or network-enabled device to channelize and receive data through shared or public networks as if it were directly connected to the cloistered network, while its benefiting from the functionality, security and management policies of the private network. It was created to establish a virtual pint-to-point connection through the using of dedicated connections, virtual tunneling protocols or traffic encryptions. Three Strategies for hardening the network environment1 Firewall Friendly VPNThe increase demands of e-business come with a compelling requirement for data security. Virtual Private Network with IP Security Architecture (IPsec VPN) meets this requirement by providing end-to end encryption and authentication at the IPlayer and protecting confi dential data that flows over possibly untrustworthy networks. IPsec has the advantage of a wide scope of coverage and agile granularity of protection however, incompatibilities exist between IPsec VPN and the Network Address Translation (NAT) that firewalls use.2 Security constitution enforcementMeans of enforcement of security policy should be a primary consideration throughout the research, test and implementation phases of any security technology. Careful research, review of manufacturers documentation, questions presented to vendors and manufacturers, and testing of the technology stack serve to meet this criteria. Without a method of enforcement, effectiveness of security policy is questionable at best. While audit trails, hardware analysis and security logs should be reviewed regularly it is a time-intensive process and this alone alerts the administrator to violations and security threats after they have occurred. Without a means ofenforcement, the administrator is risking the security of the VPN by relying upon the remote VPN users to voluntarily comply with policy. As the secure network perimeter is being extended to encompass the VPN client, security policy must be enforced in real time to protect the integrity of both the VPN client and the network.Having addressed security policy issues that require the VPN client to have antivirus software installed and using the latest update policy also requires a properly configured personal firewall to be running on the client PC or Laptop, and requires a time limit on inactive VPN sessions. How is this to be made obligatory, and remove the responsibility from the VPN user to voluntarily comply with policy? The answer is as stated above by shaping the need and carefully researching solutions available to fulfill this need. The VPN Concentrator, a managed antivirus package, will fulfill the dictated requirements.3 Web content filteringFiltering incoming and outgoing traffic, using signatures, repute ratings and other heuristics. Whitelist allowed types of web content, preferably blocking all executable content by default and use a process to enable individual selected access if a business justification exists. Preferably disallow ActiveX, Java, Flash Player, HTML inline frames and JavaScript except for whitelisted web sites. Preferably use a solution that can too inspect SSL traffic for malicious content, especially SSL communications with unfamiliar web sites. Preferably use technology that automatically opens downloaded files in a sandbox to come up anomalous behavior such as network traffic or changes to the file system or registry. Preferably, since this approach is more proactive and thorough than blacklisting a tiny percentage of malicious domains. An example implementation is available at http//whitetrash.sourceforge.netReferencewww.computer.howstuffworks.com/vpn.htmwww.en.wikipedia.org/wiki/Virtual_private_networkwww.iprodeveloper.comwww.cisco.com/c/en/us/td/docswww.cisco. com/web/about/security/ knowledge/firewall-best-practices.html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.