T. Lee
NTC/411
November 2013
Week 5 Security Solutions In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information. E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded. Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with
References: Cisco Systems. (2007). Cisco Intrusion Detection. Retrieved from http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/index.shtml Cisco Systems. (2012). Internetworking Technology Handbook. Retrieved from http://docwiki.cisco.com/wiki/Internetworking_Technology_Handbook Cisco Systems. (2012). Intrusion Prevention System with global correlation. Retrieved from http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6634/at_a_glance_c45-578661.pdf Cisco Systems. (2013). Cisco ASA 5500 Series Next Generation Firewalls. Retrieved from http://www.cisco.com/en/US/products/ps6120/index.html Cisco Systems. (2013). Cisco Web Security Appliance. Retrieved from http://www.cisco.com/en/US/prod/collateral/vpndevc/ps10142/ps10164/aag_c45-716641.pdf Kaspersky Lab. (2013). Heuristic analysis in Kaspersky Anti-Virus 2013. Retrieved from http://support.kaspersky.com/us/8641 Lord, N. (2012). Common malware types: Cybersecurity 101. Retrieved from http://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101/ Skillport. (2013). CompTIA Network+ 2012: Network security part 3. Retrieved from Skillport, NTC411 - Global Network Management, Support, and Security website. Symantec Corporation. (2013). Vulnerability trends. Retrieved from http://www.symantec.com/threatreport/topic.jsp?id=vulnerability_trends&aid=zero_day_vulnerabilities