What Is Network Security
What Is Network Security
What Is Network Security
Network security is any activity designed to protect the usability and integrity of your
network and data.
It includes both hardware and software technologies
Firewalls
Firewalls put up a barrier between your trusted internal network and untrusted outside
networks, such as the Internet. They use a set of defined rules to allow or block traffic. A
firewall can be hardware, software, or both.
Email security
Email gateways are the number one threat vector for a security breach. Attackers use personal
information and social engineering tactics to build sophisticated phishing campaigns to
deceive recipients and send them to sites serving up malware. An email security application
blocks incoming attacks and controls outbound messages to prevent the loss of sensitive data.
"Malware," short for "malicious software," includes viruses, worms, Trojans, ransomware,
and spyware. Sometimes malware will infect a network but lie dormant for days or even
weeks. The best antimalware programs not only scan for malware upon entry, but also
continuously track files afterward to find anomalies, remove malware, and fix damage.
Network segmentation
Access control
Not every user should have access to your network. To keep out potential attackers, you need
to recognize each user and each device. Then you can enforce your security policies. You can
block noncompliant endpoint devices or give them only limited access. This process is
network access control (NAC).
Application security
Any software you use to run your business needs to be protected, whether your IT staff builds
it or whether you buy it. Unfortunately, any application may contain holes, or vulnerabilities,
that attackers can use to infiltrate your network. Application security encompasses the
hardware, software, and processes you use to close those holes.
Behavioral analytics
To detect abnormal network behavior, you must know what normal behavior looks like.
Behavioral analytics tools automatically discern activities that deviate from the norm. Your
security team can then better identify indicators of compromise that pose a potential problem
and quickly remediate threats.
Data loss prevention
Organizations must make sure that their staff does not send sensitive information outside the
network. Data loss prevention, technologies can stop people from uploading, forwarding, or
even printing critical information in an unsafe manner.
Intrusion prevention systems
An intrusion prevention system (IPS) scans network traffic to actively block attacks.
Cisco Next-Generation IPS (NGIPS) appliances do this by correlating huge amounts of
global threat intelligence to not only block malicious activity but also track the progression of
suspect files and malware across the network to prevent the spread of outbreaks and
reinfection.
Cybercriminals are increasingly targeting mobile devices and apps. Within the next 3 years,
90 percent of IT organizations may support corporate applications on personal mobile
devices. Of course, you need to control which devices can access your network. You will also
need to configure their connections to keep network traffic private.
Security information and event management
SIEM products pull together the information that your security staff needs to identify and
respond to threats. These products come in various forms, including physical and virtual
appliances and server software.
VPN
A virtual private network encrypts the connection from an endpoint to a network, often over
the Internet. Typically, a remote-access VPN uses IPsec or Secure Sockets Layer to
authenticate the communication between device and network.
Web security
A web security solution will control your staff’s web use, block web-based threats, and deny
access to malicious websites. It will protect your web gateway on site or in the cloud. "Web
security" also refers to the steps you take to protect your own website.
Wireless security
Wireless networks are not as secure as wired ones. Without stringent security measures,
installing a wireless LAN can be like putting Ethernet ports everywhere, including the
parking lot. To prevent an exploit from taking hold, you need products specifically designed
to protect a wireless network.
Firewalls operate using specific firewall rules. A firewall rule will typically include a
source address, a protocol, a port number and a destination address.
Only trusted people (source addresses) may enter the castle (destination address) at
all. Or perhaps only people that arrive on foot (protocol). Once inside, only people
within the house are permitted to enter certain rooms (destination ports), depending
on who they are. The king may be allowed in any room (any port), while guests and
servants may only access a certain number of rooms (specific ports).
In this analogy, the firewall would act like an elaborate alarm system.
First, firewalls are classified by what they are and where they reside. For example,
firewalls can either be hardware or software, cloud-based or on-premises.
Next, and this is the most common distinction between types, firewalls are classified
by functionality.
The most common firewall types based on methods of operation are:
Packet-filtering firewalls
Proxy firewalls
NAT firewalls
Web application firewalls
Next-gen firewalls (NGFW)
Packet-filtering firewalls
Packet-filtering firewalls, the most basic firewall type, examine packets and prevent
them from moving on if the specific security rule is not met. This firewall's function is
to perform a simple check of all data packets arriving from the network router and
inspecting the specifics like source and destination IP address, port number,
protocol, and other surface-level data.
Packet filtering firewalls don’t open data packets to inspect their contents. Any data
packet that fails the simple inspection is dropped.
Their main drawback is that they provide only basic protection and are therefore
more vulnerable to being bypassed.
Packet-filtering firewalls can either be stateful and stateless. Stateless firewalls only
analyze each packet individually, whereas stateful firewalls — the more secure
option — take previously inspected packets into consideration.
Proxy firewalls
Proxy firewalls typically operate in the cloud or through another proxy device. Instead
of allowing traffic to connect directly, a connection to the traffic’s source is
established and the data packet is inspected.
NAT firewalls
Web application firewalls (WAF) are responsible for filtering, monitoring, and
blocking data packets as they travel in and out of websites or web applications. A
WAF can either reside on the network, at the host or in the cloud and is typically
placed in front of one or many websites or applications. WAFs are available as
server plugins, cloud services, or network appliances.
A WAF is most similar to the proxy firewall, but has a more specific focus on
defending against application layer web-based attackers.
NGFW firewalls
As the threat landscape intensifies, the Next-generation firewall (NGFW) is the most
popular firewall type available today.
Firewalls
For most networks, the firewall is one of the first lines of defense. Firewalls act to
isolate your network and protect it from unwanted network traffic. Depending
on your network, firewalls can be built into devices such as routers and switches
or implemented as standalone protection.
Firewalls can operate in two ways:
While intrusion detection systems notify you of any intrusions and require action
on your part, intrusion prevention systems notify you and actively respond to
the intrusion without your intervention.
Proxy servers
Proxy servers provide network security by acting as a go-between for your
network computer’s web browser and the server on the other end of the
connection. Inappropriate and malicious websites are blocked by proxy servers
and access control policies are enforced.
These are only some of your choices when it comes to types of network security
devices, and no single one will do it all. Instead, it’s important to take a layered
approach and utilize as many types of security as your network needs to ensure
your network infrastructure devices remain protected and secure.
Take inventory
It’s important to keep up-to-date inventories of all your network devices and to
know exactly what security policies have been applied to each one. Taking
inventory can be a time-consuming task when done manually, so opt for a
network scanning tool that can do this for you like Auvik.
This is especially important for perimeter devices. If you’ve enabled SSH access
to a firewall from the outside, it’s critical that access is locked down. Be careful
not to lock yourself out though.
Using SNMPv3 instead of v2c over public networks is obvious, but security-
conscious service providers have increasingly been using SNMPv3 within private
networks as well. That’s because v3 reduces the amount of management data
traversing the network in clear text—in case someone is listening in who
shouldn’t be.
While some may rightfully question your choice of passwords, good on you to
rotate your credentials on a quarterly basis. We typically see teams rotating
network device credentials at least annually. Credentials are an important
method of securing network devices.
Credential rotation isn’t on your regular calendar yet? Start the habit now by
setting a recurring ticket in your PSA.
If you have extra ports on routers, switches, and firewalls after completing the
initial configuration, disable them. If they’re ever needed again, you can log back
in and re-enable them.
It’s important to keep in mind that the steps to implement each of these
recommendations will be different between network device vendors. You may
also find that some settings discussed aren’t available on your network
infrastructure devices. That’s OK—implement what you can and manage the risk
around the others. What is network management without an individual
approach to each network?
MFA Examples
Examples of Multi-Factor Authentication include using a
combination of these elements to authenticate:
Knowledge
Answers to personal security questions
Password
OTPs (Can be both Knowledge and Possession - You know the OTP and you have
to have something in your Possession to get it like your phone)
Possession
OTPs generated by smartphone apps
OTPs sent via text or email
Access badges, USB devices, Smart Cards or fobs or security keys
Software tokens and certificates
Inherence
Fingerprints, facial recognition, voice, retina or iris scanning or other Biometrics
Behavioral analysis
Contents
NAC Applications
Identity Authentication
Access users need to be authenticated, and only authorized users are allowed access to
the campus network. This is a basic requirement for campus network security. Identity
authentication for terminals such as PCs on the campus network need to meet the
following requirements:
After a user with a secure terminal enters the correct user name and password,
the user can be normally connected to the network.
A user with an insecure terminal can only be connected to the network
isolation domain and then connected to the network after terminal security is
repaired.
Unauthorized users are not allowed access to the network.
Access Control
Users can be precisely matched based on the user identity, access time, access location,
terminal type, terminal source, and access mode (5W1H for short) to control the
resources available to users. The following explains 5W1H:
Who are connected to the network (employees or guests)?
Whose devices (enterprise devices or BYOD devices)?
What devices (PCs or mobile phones) are used?
When is the access initiated (during working hours or non-working hours)?
Where is the access initiated (in the R&D area, in a non-R&D area, or at home)?
How do devices access the network (through wired or wireless networks)?
Scans terminals before they are connected to the network to obtain their
security status, for example, antivirus software installation, patch update, and
password strength.
Associates with the NAC device to block the terminals that do not pass security
check. This prevents damages to the service system and helps terminals
complete automatic security issue repair.
Denies network access of terminals whose security problems cannot be
repaired in a timely manner.
The NAC server is the core of the NAC solution. Users can access the NAC
server before passing identity authentication and security check. The NAC
server authenticates users, performs security audits on users, implements
security policies on users, and associates with the NAC device to deliver user
rights. If a user passes identity authentication but fails terminal security check,
the user usually accesses the antivirus/patch/software server to automatically
update the antivirus database on the terminal and install as well as update the
patches of the operating system and application software to meet the terminal
security check requirements. The service server is used for enterprise service
management. Only authenticated and authorized users can access the service
server.
For example, on an enterprise network, users are classified into employees, partners, and
guests. The NAC solution allows customizing network access and permission control rules
for different user roles.
Employees: refer to those who have fixed office locations and long-term work
contracts. Employees typically use company devices as office devices. Company
devices often have security terminals installed before employees obtain the
devices. After passing authentication, employees have sufficient access rights
to the company network.
Partners: refer to those who frequently move and are under few enterprise
constraints. These personnel are connected to the enterprise network for a
certain period of time and access some servers on the network. Partners usually
use the company devices that have security terminals installed. However, the
rights of partners must be strictly controlled because their terminal security is
low.
Visitors: refer to those who are connected to enterprise networks temporarily.
Typically, visitors are wirelessly connected to the enterprise network and can
only access the Internet through the enterprise network. Visitors are strictly
isolated from employees and partners to prevent enterprise information asset
leakage.
NAC Applications
The Network Admission Control (NAC) solution can be applied to many network
scenarios, such as enterprise campus network, bring your own device (BYOD), Internet of
Things (IoT), and public Wi-Fi network scenarios.
IAM solutions help identify and mitigate security risks. You can
use IAM to identify policy violations or remove inappropriate
access privileges, without having to search through multiple
distributed systems. You can also leverage IAM to ensure
that security measures are in place to meet regulatory and audit
requirements.
Information sharing
Ease of use
Productivity gains
IAM centralizes and automates the identity and access
management lifecycle, creating automated workflows for
scenarios like a new hire or a role transition. This can improve
processing time for access and identity changes and reduce
errors.
Reduced IT Costs