The objective of this workshop is to examine the key concepts, protocols and the policies involved in establishing and maintaining security for a network, and building an understanding and familiarity with their operation. Device and network infrastructure security is examined with a focus on different layers to establish a robust, stable and secure network and protect the data and processes that occur in
The workshop also looks at the nature and structure of network attacks and the motivation that drives such on‐line malicious activity.
The course further examines the actions and processes that can be used to identify, mitigate and respond to such attacks.
This workshop will be delivered at PacNOG 20 – please visit the PacNOG website for full details and to register – https://pacnog.org/pacnog20/
Engineers, Network Managers and Operators, Security policy makers who are interested in network security and gaining an understanding of the threats they face and how to mitigate such threats.
It is assumed that participants have a basic understanding of network operations and Internet technologies.
• Threat Models
o Types of Attackers
o Network Infrastructure
o Service Infrastructure (e.g. DNS, email)
• Network Infrastructure
o Router and Switch Protection
o Routing Protocol Protection
o Detecting Sick Hosts and Walling Them
• Infrastructure Services
o IPv6 Security
o Anomaly Detection
• End User Hosts
o Mac, Unix, and Linux
o Keeping Up to Date – Patching
o Host Based Firewalls
o Authentication Services
o PKI Services
o Checking for Disease: Scanners
o Preventing Disease: Anti‐virus
o Safe Mail Practices
o Safe Browsing Practices in Firefox, Chrome, Safari
o Safe Inter‐host Protocols: SSH, RSVC, SFTP and more
o Personal Encryption of Files and Communications
o Security Plan
o Inter‐network Cooperation
• Security Personnel
• Planning for Future Changes
Hardware: It is highly recommended that participants bring their own laptop computers with Wifi (b/g/n) and administrative access to system to practice the lessons learned during the workshops.
Software: SSH Client, Telnet Client
Maximum number of attendees