Difference between revisions of "SECURITY: Cyber Security Technology Map (en)"

From OnnoWiki
Jump to navigation Jump to search
(Created page with "==Theory== * Peta Teknologi Network Security * Cyber Defence * http://www.owasp.org/index.php/Category:Principle - Apps Security Principles * Trend Keamanan Interne...")
 
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
==Theory==
+
[[Network security]] has become essential knowledge for those who want to seriously engage in [[Internet]] activities. Unfortunately, technology has evolved to such a complex degree that it demands [[network security]] professionals to learn extensively to fully understand the entire concept & technology of [[network security]]. To facilitate the learning process, it is advisable to pay close attention to the attached image containing a technology map of [[network security]]. A very good reference on this can be found at http://www.sans.org.
  
* [[Peta Teknologi Network Security]]
+
[[Image:Peta-teknologi-network-security.jpg|center|200px|thumb|Network Security Technology Map]]
* [[Cyber Defence]]
 
* http://www.owasp.org/index.php/Category:Principle - Apps Security Principles
 
* [[Trend Keamanan Internet Indonesia 2010]]
 
* [[20 Linux Server Hardening Security Tips]]
 
* http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html
 
* [[Linux Security Howto]]
 
* [[Security: Basic OS Security]]
 
  
==Manajemen==
+
Generally, the topology of [[computer network]] consists of a public [[Internet]] network that spreads across the world and an [[Intranet]] network located internally in companies/institutions. Between [[InterNet]] and [[IntraNet]], there is usually a [[De-Militarized Zone]] ([[DMZ]]) restricted by a Filtering [[Router]] towards the [[Internet]], and a [[Firewall]] towards the [[IntraNet]]. In the [[De-Militarized Zone]] ([[DMZ]]), various [[server]]s are typically installed, such as, [[Mail Server]], [[FTP Server]], [[Web Server]], and [[DNS Server]].
  
* [[Framework Cybersecurity]]
 
  
==Network Security Appliance==
+
[[File:Cyber-security-model.jpeg|center|500px|thumb]]
  
For those who do not want the hassle of installing various [[software]] / [[network security]] applications, pre-made appliances can be used.
 
  
* [[Cyberoam]]
+
Based on the network topology above, we can divide [[network security]] technology into four (4) major parts, namely:
* [[ipcop]]
 
* [[smoothwall]]
 
* [[ebox]]
 
  
==Evaluasi Jaringan==
+
* [[Penetration testing]]
 +
* [[Certificate Authority]] / [[PKI]]
 +
* [[Vulnerability Testing]]
 +
* [[Managed Security Services]]
  
* [[Meneropong Situs e-banking]]
+
Let's look at the technologies that are part of these four (4) sections, in general,
* [[Menggunakan whois]]
 
* [[Instalasi PacketTracer Cisco di Ubuntu]]
 
  
===Security Test===
+
Penetration Testing, consists of:
 +
* [[Active Content Monitoring / Filtering]], usually placed on the [[mail server]] in the [[DMZ]].
 +
* [[Intrusion Detection - Host Based]], usually placed on [[servers]] in both [[IntraNet]] and [[DMZ]].
 +
* [[Firewall]], acts as an intermediary between [[IntraNet]], [[DMZ]], and [[InterNet]].
 +
* [[Intrusion Detection - Network Based]], usually used to monitor [[IntraNet]].
 +
* [[Authorization]], run in the [[IntraNet]].
 +
* [[Air Gap Technology]], operated in the [[De-Militarized Zone]] ([[DMZ]]).
 +
* [[Network Authentication]], operated in the [[IntraNet]].
 +
* [[Security Appliances]], usually in the form of [[hardware]] [[Firewall]].
 +
* [[Security Services: Penetration Testing]], external companies providing services to us.
 +
* [[Authentication]], operated in the [[IntraNet]].
  
* http://sectools.org/web-scanners.html
+
[[Certificate Authority]] / [[PKI]], supports other technologies & can be operated on [[servers]] in the [[IntraNet]], consisting of:
* http://www.cirt.net/nikto2
+
* [[Certificate Authority]], in both [[IntraNet]] and [[InterNet]].
* http://www.parosproxy.org/
+
* [[File & Session Encryption]], operated in the [[IntraNet]].
* http://sectools.org/web-scanners.html
+
* VPN & Cryptographic Communications, starts in the [[De-Militerized Zone]] and is used to penetrate the [[Internet]] to another [[IntraNet]].
* http://sectools.org/vuln-scanners.html
+
* [[Secure Web Servers]], operated in the [[De-Militarized Zone]] ([[DMZ]]).
 +
* [[Single Sign On]], on [[servers]].
 +
* Web Application Security, on [[Web servers]].
  
Acunetix, Retina Network Security Scanner, Network Security Auditor, etc., can analyze and provide reports / generate reports accurately and professionally.
+
Vulnerability Testing, usually conducted by auditors or security managers, includes:
 +
* [[Vulnerability Scanners - Host Based]], operated on [[IntraNet]] [[servers]].
 +
* Real-Time Security Awareness, Response & Threat Management, used by security managers.
 +
* [[Vulnerability Scanners - Network Based]], operated on filtering [[routers]] directly connected to the [[InterNet]].
  
==Network Security==
+
Managed Security Services, part of the management (non-technical) support for network security. Issues include:
 +
* [[Enterprise Security Policy Implementation]].
 +
* [[Managed Security Services]].
 +
* [[Enterprise Security Administration]].
 +
* Security Services: Policy Development.
 +
* [[Trusted Operating Systems]], installed on all [[computers]].
 +
* Anti D.D.O.D Tools.
  
* [[Beberapa Tip Hacking]]
+
Next, let's look at various concepts with more detailed explanations.
* [[Teknik Memblok Situs Tidak Baik]]
 
* [[Memblok Situs Porno Menggunakan Content Filter di Firefox Windows]]
 
* [[11 Kelemahan Yang Kerap Tidak Disadari Admin Jaringan]]
 
* [[DDos: Langkah Mengatasi Serangan DDoS]]
 
* [[Cloud: Tujuh Resiko Keamanan pada Cloud-Computing]]
 
  
===HoneyPot / HoneyNet===
+
==Penetration Testing==
  
* [[Honeypot]]
+
* [[Active Content Monitoring / Filtering]]. When you connect to the [[Internet]], you risk [[computer viruses]], malicious java / Active-X scripts, etc. This tool will check all content entering the network / [[computer]], continuously updating its library.
 +
* [[Intrusion Detection - Host Based]]. Host-based intrusion detection will monitor log files. It will respond with alarms or counter-attacks if a user attempts to access unauthorized data, files, or services.
 +
* [[Firewall]]. A [[Firewall]] is a system or group of systems that enforce access control policy between two networks.
 +
* [[Intrusion Detection - Network Based]]. Network-based intrusion detection will monitor the network and will respond with alarms when it identifies bad traffic patterns, such as [[scanning]], [[denial of service]] attempts, and other attacks.
 +
* [[Authorization]]. Authentication asks "who are you?". Authorization asks "do you have the right?". With authorization mechanisms, every user who wants to access resources must apply to the authorization server to obtain permission.
 +
* [[Air Gap Technology]]. This type of [[hardware]]/[[software]] allows real-time data transfer between the Internet and the back-end without opening a hole in the [[firewall]]. Sometimes Air Gap solutions require physical disconnection from the external network. Air Gap disconnects all network protocols, restricts access to data at the application layer, and performs content analysis.
 +
* [[Network Authentication]]. This tool uses several approaches to improve the system's ability to distinguish between those who are authorized and those who are not.
 +
* [[Security Appliances]]. A combination of [[hardware]]/[[software]] that provides limited services, such as [[firewalls]], network load management, etc. Because its operating system is very limited, it is easier to manage and not a target for hacker attacks like general-purpose [[UNIX]] or Windows NT.
 +
* Security Services: [[Penetration Testing]]. Consulting organizations that simulate [[hacker]] attacks in the real world and [[social engineering]] attacks. They usually provide advice on how to improve defenses. They typically use [[network-based vulnerability scanning]] tools.
 +
* [[Authentication]]. Authentication is a process that determines something or someone is who or what. The simplest form of authentication process is a logon [[password]], unfortunately very vulnerable to theft. Another way to address this is by using tokens that allow a stricter authentication process.
  
===Mail Security===
+
==Certificate Authority / PKI==
  
* [[Postfix: Konfigurasi relayhost dengan Authentikasi]]
+
* [[Certificate Authority]]. A [[Certificate Authority]] ([[CA]]) is an organization that issues and manages security credentials and public keys for [[encryption]] & [[decryption]] of messages. Certificates managed include public keys that strengthen authentication, privacy & non-repudiation.
* [[Block Spam Menggunakan Postfix]]
+
* [[File & Session Encryption]]. [[Encryption]] is a process where data is changed in form so that it is difficult to open and understand by people who do not have the authority for it. Advanced [[computer]] [[algorithms]] are used in the [[encrypt]] & [[decrypt]] process when needed.
* [[Blok Spam Menggunakan Postfix dan Bogofilter]]
+
* [[VPN]] & [[Cryptographic Communications]]. [[Virtual Private Network]] ([[VPN]]) allows secure communication over the public Internet network. This is very cost-effective for companies with mobile workers or company branches, allowing communication without using expensive private telephone networks.
* [[Instalasi MailScanner]]
+
Secure Web Servers. A tool that allows us to provide web services in an engineered environment so that security holes are minimal.
* http://www.scamnailer.info/
+
* [[Single Sign On]]. A software package that helps users access several computers without having to remember many passwords. Single Sign On essentially does not change the underlying processes, but hides the differences through an additional layer of software.
* [[Teknik Anti Spam]]
+
* [[Web Application Security]]. Web application security will protect web applications and existing resources from threats on the Internet, such as, stealing company assets, credit card theft, defacing sites, etc. This is done by detecting/blocking hacking techniques in this area.
* [[Melihat Header e-mail]]
 
  
===Firewall & Blokir Sites===
+
==Vulnerability Testing==
* [[Mini Howto iptables untuk Firewall]]
 
* [http://aceh.linux.or.id/archives/393 Firestarter [[Firewall]] untuk [[Ubuntu]]]
 
* [[Teknik Memblok Situs Tidak Baik]]
 
* [[Firewall Untuk Proxy DansGuardian]]
 
* [[Edit Konfigurasi Pemblokiran Dansguardian]]
 
* [[Instalasi phpSHIELD]]
 
* http://www.fail2ban.org/wiki/index.php/Main_Page - Deteksi Serangan & Ban automatis
 
* [[Zero Trust Network Access (ZTNA)]]
 
  
===Network Monitoring & Intrution Detection===
+
* [[Vulnerability Scanners - Host Based]]. Tool to check the system settings to determine whether they are appropriate/consistent with the company's security policy. This tool is commonly used by auditors.
* [[Suricata]]
+
* Real-Time Security Awareness, Response & Threat Management. RTSA allows a security manager to see what is happening in the company that uses many tools from multiple vendors in real-time through a console. RTSA helps reduce the number of personnel needed to monitor many devices.
* [[Instalasi Nessus]]
+
* [[Vulnerability Scanners - Network Based]]. [[Software]] that can simulate the behavior of attackers and study about 600 possible weaknesses in the system being attacked.
* [[Instalasi Nessus Client]]
 
* [[Nessus: Melalui Web]]
 
* [[Instalasi NTOP]]
 
* [[Instalasi SNORT dan BASE]] [[Intrusion Detection System]] ([[IDS]])
 
* [[Instalasi EasyIDS]]
 
* [[Suricata Open Source Next Generation Intrusion Detection and Prevention Engine]]
 
* http://www.endace.com/cyber-security-monitoring.html
 
* [[Snorby Preconfigured Security Application]]
 
* http://www.linux-sec.net/IDS/ ([[IDS]])
 
* http://www.monkey.org/~dugsong/talks/ids/ ([[IDS]]).
 
* http://www.cert.org/tech_tips/intruder_detection_checklist.html ([[IDS]])
 
* http://www.robertgraham.com/pubs/network-intrusion-detection.html ([[IDS]])
 
* http://www.sans.org/newlook/resources/IDFAQ/ID_FAQ.htm ([[IDS]])
 
* [[Linux Monitoring Tool]]
 
  
====Securing from NetCut====
+
==Managed Security Services==
  
* [[Pertahanan Melawan ARP spoofing di Linux]]
+
* [[Enterprise Security Policy Implementation]]. [[EPSI]] allows security managers to automate every security step from a central console, starting from creating, editing, approving, publishing, distribution, education, compliance, reporting, and maintenance. This tool will enforce socialization, check employee understanding, record incidents, and measure compliance, which ultimately will help manage IT risks without burdening limited staff.
* [[Membuat Linux Kebal ARP Poisoning ARP Spoofing]]
+
* [[Managed Security Services]]. Vendors offering managed security services assume that they will take over some percentage of the work as outsourced. In this way, administrators can do other work.
* [[Pemutus jaringan LAN di linux dengan TechnoCut]]
+
* [[Enterprise Security Administration]]. This tool administers enterprise-level security, ensuring that all users in an enterprise receive the same rights and obligations. This system is especially very useful for providing access for new users, and importantly, eliminating all access for employees who have left.
* [[Anti NetCut]]
+
* Security Services: Policy Development. Consultants who assist in quickly developing security policies. They generally already have templates so that security policies can be implemented quickly, such as good email use, extranet to PKI.
* [[tuxcut]]
+
* [[Trusted Operating Systems]]. Because all security mechanisms are highly dependent on the operating system, [[trusted O/S]] technology provides the only mechanism on [[O/S]] to withstand attacks.
 +
* Anti D.D.O.D Tools. Anti Ddos tools will identify irregular usage on the network. If irregularities occur, the tool will attempt to check the legitimacy of access and recommend some preventive steps.
  
===Secure Connection===
+
==Interesting Links==
* http://www.madboa.com/geek/gpg-quickstart/#keyintro - GPG Key
 
* [[Virtual Private Network]] ([[VPN]])
 
* [[Instalasi dan Konfigurasi rsync]] untuk backup antar mesin
 
* [[Persiapan SSH untuk SCP Batch]]
 
* [[Topal - Pengikat GnuPG dan Alpine]]
 
* [[Mengikat GnuPG dan Alpine]]
 
* [[Menggunakan GnuPG]]
 
* [[GnuPG Mini Howto]]
 
* [[GnuPG Privacy Handbook]]
 
* [[Ubah Nomor Port sshd]]
 
  
===Authentication===
+
* [[Network Security]]
 
+
* [[Various Hacking Tips]]
* [[openldap]]
 
 
 
===Shutdown Windows Remotely===
 
 
 
* http://www.howtoforge.com/how-to-remotely-shut-down-windows-xp-computers-from-a-linux-server
 
* http://www.lgr.ca/blog/2008/04/shutdown-windows-from-linux.html
 
* http://www.linuxforums.org/forum/redhat-fedora-linux-help/60324-remote-shutdown-windows-linux-box.html
 
* http://landofthefreeish.com/linux/howto-remote-shutdown-of-a-windows-computer-from-linux/
 
* http://blog.beausanders.com/?q=node/8
 
 
 
==OS Security==
 
 
 
* http://www.go2linux.org/fedora-centos-root-password-recovery - kalau lupa password root
 
* [[Enkripsi Disk]]
 
* [[20 Linux System Monitoring Tool]]
 
* [[Cyber Security: Detect and remove trojans in a Linux operating system]]
 
 
 
===Anti Rootkit===
 
 
 
* [[Rootkit Hunter]]
 
* [[chkrootkit]]
 
 
 
===Anti Virus===
 
* [[Instalasi antivirus clamav]]
 
* [[Scan File dan URL Secara Online]]
 
* [[Virus]]
 
* [[Anti Virus]]
 
 
 
===Host based IDS===
 
 
 
* [[Tripwire]]
 
* [[systraq]]
 
 
 
===RaspberryPi Pentest===
 
 
 
* http://resources.infosecinstitute.com/pentesting-distributions-and-installer-kits-for-your-raspberry-pi/
 
* http://www.raspberrypi.org/downloads
 
* https://github.com/g13net/PwnBerryPi.git
 
 
 
==Web Security==
 
 
 
* http://www.ipa.go.jp/security/vuln/documents/website_security_en.pdf
 
* https://www.owasp.org/index.php/Web_Application_Firewall
 
 
 
===Web Application Firewall===
 
 
 
* [[Web Application Firewall]]
 
 
 
===SQL Injection===
 
 
 
* [[SQL Injection Web dengan Dork]]
 
* [[Algoritma dan teknik menangkal SQL injection]]
 
* [[Teknik Mengatasi SQL Injection]]
 
* [[Patch SQL Injection Session 1 cmsmadesimple]]
 
* [[Patch SQL Injection Session 2 cmsmadesimple]]
 
* [[Patch SQL Injection Session 3 Final akses module]]
 
 
 
===Cross Site Scripting XSS===
 
 
 
* [[Injeksi XSS Ke Dalam Website]]
 
* [[Analisis dan antisipasi serangan Cross Site Scripting (XSS)]] ('''RECOMMENDED''')
 
* [[Cara Mengatasi XSS Bug pada Bagian Komentar Wordpress]]
 
* [http://books.google.com/books?id=3YFwVj6_51IC&printsec=frontcover&dq=XSS&hl=en&ei=r_YiTabbBIXwrQer_tDNCw&sa=X&oi=book_result&ct=result&resnum=1&ved=0CCMQ6AEwAA XSS attacks: cross-site scripting exploits and defense]
 
* [http://books.google.com/books?id=_9P9ImY3ITwC&pg=PA93&dq=XSS&hl=en&ei=r_YiTabbBIXwrQer_tDNCw&sa=X&oi=book_result&ct=result&resnum=2&ved=0CCgQ6AEwAQ Security+ Guide to Network Security Fundamentals - Page 93]
 
* [http://books.google.com/books?id=bZ9xTCuIWRMC&pg=PT86&dq=XSS&hl=en&ei=r_YiTabbBIXwrQer_tDNCw&sa=X&oi=book_result&ct=result&resnum=4&ved=0CDMQ6AEwAw Hacking: The Next Generation]
 
* [http://books.google.com/books?id=wIWU94zKEtYC&pg=PT118&dq=XSS&hl=en&ei=r_YiTabbBIXwrQer_tDNCw&sa=X&oi=book_result&ct=result&resnum=7&ved=0CEYQ6AEwBg Building scalable web sites]
 
* [http://books.google.com/books?id=Ddwyg3ADVCEC&pg=PA409&dq=XSS&hl=en&ei=r_YiTabbBIXwrQer_tDNCw&sa=X&oi=book_result&ct=result&resnum=10&ved=0CFkQ6AEwCQ The definitive guide to Grails - Page 409]
 
* [http://books.google.com/books?id=XLGdUnShOMYC&pg=PT303&dq=XSS&hl=en&ei=NvgiTZGRKo3QrQeYvOG-Cw&sa=X&oi=book_result&ct=result&resnum=4&ved=0CDQQ6AEwAzgK Apache security]
 
* http://www.owasp.org/index.php/SQL_injection
 
 
 
===Reporting===
 
 
 
* [[Melaporkan Situs Phising]]
 
 
 
===mod security===
 
 
 
* http://www.thefanclub.co.za/how-to/how-install-apache2-modsecurity-and-modevasive-ubuntu-1204-lts-server
 
 
 
==Hacking==
 
 
 
* [[Wireless Hacking]]
 
* [[Beberapa Tip Hacking]]
 
* [[Backtrack]]
 
* [[Mari Hacking Website agar menjadi lebih aman]]
 
* [[Bagi yang Account Facebook di Crack]]
 
* [[WebGoat - Web yang tidak aman Untuk Belajar di Hack]]
 
 
 
==Referensi Keamanan Jaringan==
 
 
 
* http://docs.fedoraproject.org/en-US/Fedora/14/html/Security_Guide/index.html
 
* http://www.securityfocus.com
 
* http://www.lists.gnac.net/firewalls
 
* http://www.nfr.com.mailman/listinfo/firewall-wizards
 
* http://www.sans.org/sansnews/
 
* http://www.cert.org/
 
* http://www.safemag.com/
 
* http://www.ciac.org/
 
* http://www.linuxsecurity.com/
 
* http://www.insecure.org/
 
 
 
===Buku-Buku===
 
 
 
* http://stores.lulu.com/owasp
 
 
 
==Referensi Keamanan Web==
 
 
 
* http://www.w3.org/security/faq/
 
* http://www.securityportal.com
 
* http://www.2600.com
 
* http://www.go2net.com/people/paulp/cgi-security/
 
* http://www.consensus.com/security/ssl-talk-faq.html
 
* [http://www.slideshare.net/bpdp/keynote-speakbpdp / Web Engineering dalam Konteks Web Science: Isu Terkini dan Tantangan] author : Bambang Purnomosidi D. P
 
* http://whitesecure.com
 
* http://www.owasp.org/index.php/Main_Page
 
 
 
==Interesting URL==
 
 
 
* http://awarmanf.wordpress.com/2010/05/01/drop-ultrasurf-dengan-iptables/
 
* [http://milisdad.blogspot.com/2009/02/mereset-password-pada-aplikasi-berbasis.html Mereset Password pada Aplikasi Berbasis Web] - Aplikasi yang cukup aman tidak bisa menggunakan cara ini
 
* http://situstarget.com/home/2010/07/02/cara-melaporkan-situs-phising/
 
* https://crypto.stanford.edu/cs155/syllabus.html
 
 
 
==Intersting Links==
 
 
 
* [[Linux Howto]]
 
* [[Cyber Security]]
 
* [[Cyber Security (en)]]
 
  
 
[[Category: Network Security]]
 
[[Category: Network Security]]

Latest revision as of 11:35, 6 January 2025

Network security has become essential knowledge for those who want to seriously engage in Internet activities. Unfortunately, technology has evolved to such a complex degree that it demands network security professionals to learn extensively to fully understand the entire concept & technology of network security. To facilitate the learning process, it is advisable to pay close attention to the attached image containing a technology map of network security. A very good reference on this can be found at http://www.sans.org.

Network Security Technology Map

Generally, the topology of computer network consists of a public Internet network that spreads across the world and an Intranet network located internally in companies/institutions. Between InterNet and IntraNet, there is usually a De-Militarized Zone (DMZ) restricted by a Filtering Router towards the Internet, and a Firewall towards the IntraNet. In the De-Militarized Zone (DMZ), various servers are typically installed, such as, Mail Server, FTP Server, Web Server, and DNS Server.


Cyber-security-model.jpeg


Based on the network topology above, we can divide network security technology into four (4) major parts, namely:

Let's look at the technologies that are part of these four (4) sections, in general,

Penetration Testing, consists of:

Certificate Authority / PKI, supports other technologies & can be operated on servers in the IntraNet, consisting of:

Vulnerability Testing, usually conducted by auditors or security managers, includes:

Managed Security Services, part of the management (non-technical) support for network security. Issues include:

Next, let's look at various concepts with more detailed explanations.

Penetration Testing

  • Active Content Monitoring / Filtering. When you connect to the Internet, you risk computer viruses, malicious java / Active-X scripts, etc. This tool will check all content entering the network / computer, continuously updating its library.
  • Intrusion Detection - Host Based. Host-based intrusion detection will monitor log files. It will respond with alarms or counter-attacks if a user attempts to access unauthorized data, files, or services.
  • Firewall. A Firewall is a system or group of systems that enforce access control policy between two networks.
  • Intrusion Detection - Network Based. Network-based intrusion detection will monitor the network and will respond with alarms when it identifies bad traffic patterns, such as scanning, denial of service attempts, and other attacks.
  • Authorization. Authentication asks "who are you?". Authorization asks "do you have the right?". With authorization mechanisms, every user who wants to access resources must apply to the authorization server to obtain permission.
  • Air Gap Technology. This type of hardware/software allows real-time data transfer between the Internet and the back-end without opening a hole in the firewall. Sometimes Air Gap solutions require physical disconnection from the external network. Air Gap disconnects all network protocols, restricts access to data at the application layer, and performs content analysis.
  • Network Authentication. This tool uses several approaches to improve the system's ability to distinguish between those who are authorized and those who are not.
  • Security Appliances. A combination of hardware/software that provides limited services, such as firewalls, network load management, etc. Because its operating system is very limited, it is easier to manage and not a target for hacker attacks like general-purpose UNIX or Windows NT.
  • Security Services: Penetration Testing. Consulting organizations that simulate hacker attacks in the real world and social engineering attacks. They usually provide advice on how to improve defenses. They typically use network-based vulnerability scanning tools.
  • Authentication. Authentication is a process that determines something or someone is who or what. The simplest form of authentication process is a logon password, unfortunately very vulnerable to theft. Another way to address this is by using tokens that allow a stricter authentication process.

Certificate Authority / PKI

Secure Web Servers. A tool that allows us to provide web services in an engineered environment so that security holes are minimal.

  • Single Sign On. A software package that helps users access several computers without having to remember many passwords. Single Sign On essentially does not change the underlying processes, but hides the differences through an additional layer of software.
  • Web Application Security. Web application security will protect web applications and existing resources from threats on the Internet, such as, stealing company assets, credit card theft, defacing sites, etc. This is done by detecting/blocking hacking techniques in this area.

Vulnerability Testing

  • Vulnerability Scanners - Host Based. Tool to check the system settings to determine whether they are appropriate/consistent with the company's security policy. This tool is commonly used by auditors.
  • Real-Time Security Awareness, Response & Threat Management. RTSA allows a security manager to see what is happening in the company that uses many tools from multiple vendors in real-time through a console. RTSA helps reduce the number of personnel needed to monitor many devices.
  • Vulnerability Scanners - Network Based. Software that can simulate the behavior of attackers and study about 600 possible weaknesses in the system being attacked.

Managed Security Services

  • Enterprise Security Policy Implementation. EPSI allows security managers to automate every security step from a central console, starting from creating, editing, approving, publishing, distribution, education, compliance, reporting, and maintenance. This tool will enforce socialization, check employee understanding, record incidents, and measure compliance, which ultimately will help manage IT risks without burdening limited staff.
  • Managed Security Services. Vendors offering managed security services assume that they will take over some percentage of the work as outsourced. In this way, administrators can do other work.
  • Enterprise Security Administration. This tool administers enterprise-level security, ensuring that all users in an enterprise receive the same rights and obligations. This system is especially very useful for providing access for new users, and importantly, eliminating all access for employees who have left.
  • Security Services: Policy Development. Consultants who assist in quickly developing security policies. They generally already have templates so that security policies can be implemented quickly, such as good email use, extranet to PKI.
  • Trusted Operating Systems. Because all security mechanisms are highly dependent on the operating system, trusted O/S technology provides the only mechanism on O/S to withstand attacks.
  • Anti D.D.O.D Tools. Anti Ddos tools will identify irregular usage on the network. If irregularities occur, the tool will attempt to check the legitimacy of access and recommend some preventive steps.

Interesting Links