Preview

Perimeter Defense Strategies

Better Essays
Open Document
Open Document
1242 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Perimeter Defense Strategies
PERMITER DEFENSE STRATEGIES – NETWORK SEGMENTS

In order to effectively defend the internal network, any security personnel charged with this responsibility should first consider the perimeter. Basically, the perimeter is the network boundaries, the frontier where data flows in from (and out to) other network segments (Mosson, 2009). Segments of a network are joined by routers, switches, hubs, bridges and gateways (Cole, Krutz and Conley, 2005).

There are a number of general strategies used to protect internal network which are evaluated below.

Firewall Implementation

Often, the first thing people tend to think of in network perimeter defense is a firewall (Posey, 2003). In most common environments, firewalls would be placed at the terminal ends of every network segments (Cole, Krutz and Conley, 2005). A firewall’s basic job is to permit or stop packets from flowing into or out of a network. For perimeter security implementation, firewalls are available as a software (installed inside a route) or as a stand-alone hardware appliance (Mosson, 2009).

Any firewall implementation will not protect the network if it is not configured properly. Thus, a strategy, suggested by Troester (2004) is to use the “principle of least privilege”, meaning, denying all traffic.

In addition, Noonan (2004) argued that the firewall must be hardened. He suggested four (4) measures to achieve this which include:

1. Implementing authentication and authorization, allowing only authorized users to connect to and manage firewalls.
2. Hardening remote administration by turning-off web-based Telnet and SSH services.
3. Hardening firewall services and protocols such as SNMP, NTP, syslog and TFTP.
4. Using redundancy to harden firewall by getting identical hardware/software and configuring them accordingly.

A further defense strategy is to identify how well a firewall is functioning. Posey (2003) suggested that port scanning should be performed. A port scan is a technique by



References: Cole, E, Krutz, R, Conley, J (2005). Network Protocols. Retrieved from: http://eccouncil.books24x7.com/viewer.asp?bookid=12199&chunkid=0466757851 Krebs, B (2003). A Short History of Computer Viruses & Attacks. Retrieved from http://www.securityfocus.com/news/2445 Mosson, A. (2009). Securing Your Network Perimeter. Retrieved from http://www.focus.com/briefs/security-edge-locking-down-network-perimeter/# Noonan, W (2004). Hardening Network Infrastructure. California: McGraw-Hill/Osborne Posey, B. (2003). Defend Your Network’s Perimeter with these strategies. Retrieved http://www.techrepublic.com/article/defend-your-networks-perimeter-with-these-strategies/5031673 Troester, S (2004). Implementing a Defense-indepth Strategy in a non-profit organization. Retrieved from http://www.giac.org/paper/gslc/33/implementing-defense-in-depth-strategy-non-profit-organization/105867

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -In reference to previous network plan U1A1 a firewall will be in place in the LAN/WAN Domain & System/Application Domain to protect internal network from potential external threats.…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    their defensive controls at the perimeter in the belief that this makes it difficult for…

    • 5023 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    MGT220: Midterm Exam

    • 1999 Words
    • 8 Pages

    D. Firewalls are used to protect information in transit. Question 6 2 points Remote administration Trojans (RATs) are a class of backdoors that are extremely dangerous because they enable remote control over the infected machine. Save…

    • 1999 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    In the WAN domain, we need to have firewalls set up to filter all incoming traffic. A firewall will stop all traffic not wanted on the Richman Investments network.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    We show how incremental deployment of such routers can make the Internet safer. Like all things dynamic, change is inevitable. Such is the case with your network environment. Upgrades and modifications to the network architecture can sometimes expose, or create security holes. Hardening a network does not always mean spending large amounts of money. Whether that means spending it on new hardware, software, or man hours really depends on what needs to be addressed. It may include all of the above. The time may come when a cost/benefit analysis will be required by those in charge before hardening activities can move forward. As such it's important to point out some of the non-technical benefits of network hardening for the business as a whole.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Task 1: Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside to the internal network. Hardware firewalls can protect computers on a local area network and they can be implemented without much configuration difficulty.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The screened subnet architecture approach is driven from the idea of screen host architecture, a step further. Since the screening router is present at the primary entry point of the network and screens traffic flow between protected network and internet, an addition of further security layer to it by perimeter network which will isolate the secured network from external affects, will give birth to screened subnet architecture.…

    • 877 Words
    • 4 Pages
    Good Essays