Seguridad en bancos

Solo disponible en BuenasTareas
  • Páginas : 52 (12816 palabras )
  • Descarga(s) : 4
  • Publicado : 11 de junio de 2010
Leer documento completo
Vista previa del texto
Interested in learning more about security?

SANS Institute InfoSec Reading Room
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.

Securing the Network Perimeter of a Community Bank
Allocating the investment for perimeter protection and detection mechanisms can be an unique challenge with the budget of a smallercommunity bank. This paper s purpose is to raise awareness of the external threats present to confidential customer information held on the private network of community banks, and recommend technologies and designs to protect the perimeter of the network, while taking heed of the limited resources of community banks. The perimeter protection topics will include: routers, firewalls, Wi-Fi...

CopyrightSANS Institute Author Retains Full Rights

AD

Securing the Network Perimeter of a Community Bank
GIAC (GCFW) Gold Certification Author:
Steven
M.
Launius,
SteveLaunius@gmail.com
 Advisor:
Aman
M.
Hardikar

Abstract


Allocating the investment for perimeter protection and detection mechanisms can be an unique challenge with the budget of a smaller community bank. This paper’s purpose isto raise awareness of the external threats present to confidential customer information
Key fingerprint = the private network of community banks,06E4 recommend technologies and held on AF19 FA27 2F94 998D FDB5 DE3D F8B5 and A169 4E46

designs to protect the perimeter of the network, while taking heed of the limited resources of community banks. The perimeter protection topics will include:routers, firewalls, WiFi, phone systems, publicly accessible servers, and remote access. Current and developing techniques for preventing attacks will be presented as will the importance, type, and frequency of independent audits to ensure the perimeter maintains a secure posture.

Securing the Network Perimeter of a Community Bank 2

1. Introduction
Deploying a network in any small or mediumsized business can be an arduous task that brings many risks with it. For community banks, the responsibility of keeping intruders from accessing confidential customer information is mandated by law in the United States (Gramm-Leach-Bliley Act, 1999). This includes protecting a private network from attacks and identifying possible breaches to a bank’s private network. To establish a secure network adefense-in-depth strategy where security measures are placed in many layers that create an entire network, from the end user to the Internet, will be essential. The network perimeter layer has historically been the focus of protecting a private network and is still essential for keeping intruders at bay and providing detection of possible intrusions. The perimeter layer of a network starts when anoutside connection is established and ends with access to a private network. Outside connections can be established by an Internet Service Provider (ISP) such as Charter, Mediacom, and AT&T to name a few. A
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

wireless network can also provide connectivity across multiple rooms or floors of a facility as wireless signals canpenetrate physical boundaries. Any modems connected to computers provide an additional avenue into a private network. The network perimeter can be comprised of devices that block unwanted traffic, allow remote access, filter for potential dangerous content, and detect or block probable attacks. Additionally, the perimeter may contain email and web servers that provide services to customers andemployees externally via the Internet. A private network will be at risk from many threats because of the need to establish connections to other networks, especially the Internet. Understanding the threats present to a private network is important to properly design the perimeter protection for community banks. Every second of every day, scans are perpetuating throughout the Internet looking for...
tracking img