Lesson 3 - Secure Enterprise Architecture and Component
Lesson 3 - Secure Enterprise Architecture and Component
Networks are part of a large, centrally managed, and internetworked architecture solutions.
Enterprise Network Architecture
Telecommunications: Protocol:
Electromagnetic transmission of A standard set of rules
data
Types of Network Architecture
Presentation 2 3 Session
Application 1 4 Transport
Physical 7 5 Network
6
Data Link
Types of Networks
Types of Networks
Storage Area
Personal Area Network (SAN)
Network (PAN)
A process of using computing technology to transfer data from one point to another.
Information to be
communicated
Medium or channel
Computer-Based and Business Information Systems
Computer-Based Information System
Procedures
Hardware People
The
computer-
Software applications based Internet
information
system are:
Database Networks
Telecommunications
Business Information Systems
Decision
Support System
SOA Systems
Transaction
Processing
Electronic Commerce
Management
Information
System
Hardware Failure
Hardware Failure
• Exposed • Virus
Data • Spyware
• Lost
Hardware
Malicious
Data Loss
Code
Physical Data
Theft Corruption
• Storage • Damaged
Media Drive
• Computers • Corrupted
Drive
Hardware Failure
Asset
Error reports Availability reports Utilization reports management
(automated) reports
Host security refers to securing the operating system from unauthorized access.
Host-Based Security Controls
Wireless networks are computer networks that are not connected by cables of any kind.
Wireless Networks
Benefit: Drawback:
Mobility Speed
Flexibility/Scalability
Wireless Attacks
Pose challenges to
security professionals
Tel Aviv free Wi-Fi network was hacked. One notable example of how easy it can be
for a hacker to take over a Wi-Fi network comes from Tel Aviv.
Case Study: Wireless Attack
VPN extends the corporate network securely via encrypted packets sent out via
virtual connections over the public internet to distant offices, home workers,
salespeople, and business partners.
Virtual Private Network
Intranet VPN
Extranet VPN
Virtual Private Network
RFID uses radio waves to read and capture information stored on a tag attached to an object.
RFID Risks
Management Operational
Technical
Case Study: RFID Hack
Control Zones
Network Security Controls
Network-Based Security
Goals Issues
• Performance issues
• Centralized control
Web Application Firewall
Intrusion Detection System otherwise known as IDS is monitored network usage anomaly.
A honeypot system is a computer that sits in the screened subnet or the DMZ and
attempts to lure attackers.
It is a process of examining your systems and network devices for security holes and weaknesses.
Vulnerability Scanning
• Identify vulnerability
The types depend on the organization, its security objectives, and the management goals.
Types of Penetration Testing
In black box testing, the tester has no knowledge of the internal design or features of the
system. It simulates the external attacker the best.
Types of Penetration Testing
In white box testing, the tester has complete knowledge of the internal system, it may yield a
more complete result, but it may not be representative of an external hacker. It may be a good
indicator of an internal type of threat.
Types of Penetration Testing
In grey box testing, some information about internal working is given to the tester.
These are systematic evaluations performed with the purpose of demonstrating the
effectiveness of controls to a third party.
Security Audits