Monday, October 19, 2015

Monday Motivation



“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.”  – Bruce Schneier








Thursday, October 15, 2015

Security Lab 1.0 (Old)

Security Lab 1.0 (Old)


So I wanted to post a picture of my current home lab which currently revolves around Cisco networking switches and routers. I consider this version 1.0 as I am currently moving at the end of this month within the local area. After I finish moving, lab version 2.0 will then be built and will feature more in depth security features and hardware to complete the lab. Below is version 1.0 of the lab.



So lets take a look at this list of hardware I decided to use. Keep in mind that all line ports are 10/100 as the price really jumps for Gigabit line speeds. I do plan on adding a pair of Cisco 4948-10GB switches as the core and for servers in version 2.0

From the top:

  • Comcast DOCSIS 3.0 Cable Modem in bridge mode from ISP to WAN router 
  • Cisco 3825 1 GB RAM with VPN Module (Top Shelf) ISR (Integrated Services Router) 
          -Cisco NAM-120-S Network Analysis Module which is running Cisco Prime
          -Cisco NME-48-POE (running Cisco 3750 Software) Module for remote management of lab
  • Two Cisco 3750 48 Port POE Layer 3 Switches
  • Four Cisco 3550 24 Port POE Layer 3 Switches
  • Two Cisco 3825 Routers 1 GB RAM with VPN Modules 
  • Cisco ASA 5505 SMB Firewall (8 Port PoE)
  • A couple of desktops, one running Windows 7 with VMware Log Insight and other two have CentOS installed. 

Check back in November after I move the lab to the new place and present the Security Lab 2.0 plans! 

Tuesday, October 13, 2015

Top Security Vendors in Today's Enterprise Markets

To understand threats from the past, present, and next generation, you should know your offensive and defensive players in what is called cyber warfare in futuristic terms. A leader in the battlefield, and during war understands his or her enemy, and how to develop his team and weapons. The war is not just on the ground anymore, it is over the "Internet" and opponents vary from age, country, motive, to inside threats. It is impossible to analysis data from a small, medium, large enterprise networks and tell the difference between a positive and false positive security breach. Terms like packet sniffing, and analyzing the wire are easier said than done. Luckily in today's IT security market you have an arsenal of tools to help you keep your network secure. Lets take a look at the key players and emerging vendors.

Big Market Players


Cisco 


Juniper


Checkpoint


Palo Alto



       

Vanquish Networking and Security Blog

The true computer hackers follow a certain set of ethics that forbids them to profit or cause harm from their activities.
— Kevin Mitnick