1 defining network security security is prevention of unwanted information transfer what are the...

31
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? ...Physical Security …Operational Security …Human Factors …Protocols

Upload: clement-jennings

Post on 28-Dec-2015

220 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

1

Defining Network Security

Security is prevention of unwanted information transfer

• What are the components?– ...Physical Security

– …Operational Security

– …Human Factors

– …Protocols

Page 2: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

2

Areas for Protection

• Privacy

• Data Integrity

• Authentication/Access Control

• Denial of Service

Page 3: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

3

Regulations and Standards

• Computer Crime Laws

• Encryption

• Government as “Big Brother”

Page 4: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

4

Security

Threat, Value and Cost Tradeoffs

• Identify the Threats

• Set a Value on Information

• Add up the Costs (to secure)

Cost < Value * Threat

Page 5: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

5

Threats

• Hackers/Crackers (“Joyriders”)

• Criminals (Thieves)

• Rogue Programs (Viruses, Worms)

• Internal Personnel

• System Failures

Page 6: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

6

Network Threats

• IP Address spoofing attacks

• TCP SYN Flood attacks

• Random port scanning of internal systems

• Snooping of network traffic

• SMTP Buffer overrun attacks

Page 7: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

7

Network Threats (cont.)

• SMTP backdoor command attacks

• Information leakage attacks via finger, echo, ping, and traceroute commands

• Attacks via download of Java and ActiveX scripts

• TCP Session Hijacking

• TCP Sequence Number Prediction Attacks

Page 8: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

8

Threat, Value and Cost Tradeoffs

• Operations Security

• Host Security

• Firewalls

• Cryptography: Encryption/Authentication

• Monitoring/Audit Trails

Page 9: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

9

Host Security

• Security versus Performance & Functionality

• Unix, Windows NT, MVS, etc

• PCs

• “Security Through Obscurity”

Page 10: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

10

Host Security (cont)

• Programs

• Configuration

• Regression Testing

Page 11: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

11

Network Security

• Traffic Control

• Not a replacement for Host-based mechanisms

• Firewalls and Monitoring, Encryption

• Choke Points & Performance

Page 12: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

12

Access Control

• Host-based:– Passwords, etc.

– Directory Rights

– Access Control Lists

– Superusers

• Network-based:– Address Based

– Filters

– Encryption

– Path Selection

Page 13: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

13

Network Security and Privacy

• Protecting data from being read by unauthorized persons.

• Preventing unauthorized persons from inserting and deleting messages.

• Verifying the sender of each message.

• Allowing electronic signatures on documents.

Page 14: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

14

FIREWALLS

• Prevent against attacks

• Access Control

• Authentication

• Logging

• Notifications

Page 15: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

15

Types of Firewalls

• Packet Filters– Network Layer

• Stateful Packet Filters– Network Level

• Circuit-Level Gateways– Session Level

• Application Gateways– Application Level

Presentation

Transport

Network

Session

Data Link

Physical

Application

Page 16: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

16

Packet Level

• Sometimes part of router

• TAMU “Drawbridge”

Campus

ROTW

RouterDrawbridge

Page 17: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

17

Circuit Level

• Dedicated Host

• Socket Interfaces

ROTW

Local FW

Page 18: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

18

Application Level

• Needs a dedicated host

• Special Software most everywhere

telnet

ROTW

Firewall

Page 19: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

19

Firewall Installation Issues

DNS

Router

FTP Web Mail

INTERNET

Page 20: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

20

Firewall Installation Issues

• DNS Problems

• Web Server

• FTP Server

• Mail Server

• Mobile Users

• Performance

Page 21: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

21

Address Transparency

• Need to make some addresses visible to external hosts.

• Firewall lets external hosts connect as if firewall was not there.

• Firewall still performs authentication

Page 22: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

22

Network Address Translation

10.0

.0.0

128.

194.

103.

0

FirewallInternet

Gateway

Page 23: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

23

Network Address Translation

ftpd

TCP

IP

Data Link

Hardware

ftp

TCP

IP

Data Link

Hardware

proxy ftp

TCP

IP

Data Link

Hardware

gw control

Host A: Internal HostGateway HostHost B: External Host

DatagramA GW DatagramA B

Page 24: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

24

IP Packet Handling

• Disables IP Packet Forwarding

• Cannot function as a insecure router

• eg. ping packets will not be passed

• Fail Safe rather than Fail Open

• Only access is through proxies

Page 25: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

25

DNS Proxy Security

finance.xyz.com marketing.xyz.comsales.xyz.com

Eagle Gatewayeagle.xyz.com

DNSd

INTERNET

External DNS Server

Page 26: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

26

INTERNET

Virtual Private Tunnels

Hello

Hello

Hello

Hello

Hello

Hello!@@%* !@@%* !@@%*

Encapsulate

Authenticate

Encrypt

Decapsulate

Authenticate

Decrypt

Creates a “ Virtual Private Network “

Page 27: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

27

VPN Secure Tunnels

• Two types of Tunnels supported– SwIPe and IPsec tunnels

• Encryption– DES, triple DES and RC2

• Secret key used for used for authenticatio and encryption

• Trusted hosts are allowed to use the tunnel on both ends

Page 28: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

28

Designing DMZ’s

INTERNET

Web

FTP

Mail

DMZ

ScreeningRouter

CompanyIntranet

Page 29: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

29

Firewall Design Project

Wide Area RouterDallas

Raptor RemoteHawk Console

INTERNET

Mail Server

San Jose

Raptor Eagle

File Server

InternetRouter

Page 30: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

30

Monitoring

• Many tools exist for capturing network traffic.

• Other tools can analyze captured traffic for “bad” things.

• Few tools are real-time.

Page 31: 1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security

31

Summary

• Security must be comprehensive to be effective.

• Remember threat, value, cost when implementing a system.

• Security is achievable, but never 100%.

• Make your system fault tolerant.