2-Network Defense Fundamentals
2-Network Defense Fundamentals
2-Network Defense Fundamentals
Fundamentals
Objectives
• Describe the threats to network security
• Explain the goals of network security
• Describe a layered approach to network defense
• Explain how network security defenses affect your
organization
Overview of Threats to Network
Security
• Network intrusions cause:
– Loss of data
– Loss of privacy
– Loss of production
– Financial implications
• Businesses must actively address information
security
Threats to Network Security
• Knowing the types of attackers helps you anticipate
• Motivation to break into systems
– Status
– Revenge
– Financial gain
– Industrial espionage
Threats to Network Security
• Hackers
– Attempt to gain access to unauthorized resources
• Circumventing passwords, firewalls, or other
protective measures
• Disgruntled employees
– Usually unhappy over perceived injustices
– Steal information to give confidential information to
new employees
– When an employee is terminated, security measures
should be taken immediately
Threats to Network Security
• Terrorists
– Attack computer systems for several reasons
• Making a political statement
• Achieving a political goal
– Example: release of a jailed comrade
• Causing damage to critical systems
• Disrupting a target’s financial stability
• Government Operations
– A number of countries see computer operations as a
spying technique
Threats to Network Security
• Malicious Code
– Malware
– Use system’s well known vulnerabilities to spread
• Viruses
– Executable code that copies itself from one place to
another
– Can be benign or harmful
– Spread methods
• Running executable code
• Sharing disks or memory sticks
• Opening e-mail attachments
• Viewing infected Web pages
Threats to Network Security
• Worm
– Creates files that copy themselves and consume
disk space
– Does not require user intervention to be launched
– Some worms install back doors
• A way of gaining unauthorized access to computer or
other resources
– Others can destroy data on hard disks
• Trojan program
– Harmful computer program that appears to be
something useful
– Can create a back door to open system to additional
attacks
Threats to Network Security
• Macro viruses
– Macro is a type of script that automates repetitive
tasks in Microsoft Word or similar applications
– Macros run a series of actions automatically
– Macro viruses run actions that tend to be harmful
• Other Threats to Network Security
– It is not possible to prepare for every possible risk to
your systems
– Try to protect your environment for today’s threat
– Be prepared for tomorrow’s threats
Threats to Network Security
• Social Engineering: The People Factor
– Attackers try to gain access to resources through
people
– Employees are fooled by attackers into giving out
passwords or other access codes
– To protect against employees who do not always
observe accepted security practices:
• Organizations need a strong and consistently enforced
security policy and rigorous training program
Common Attacks and Defenses
Attack Description Defense
Denial of service (DoS) attack The traffic into and out of a network is blocked when servers are flooded Keep your server OS up to date; log instances of frequent connection
with malformed packets (bits of digital information) that contain false IP attempts against one service.
addresses, other harmful data, or other fake communications.
SYN flood A network is overloaded with packets that have the SYN flag set. Servers Keep your firewall and OS up to date so that these attacks are blocked
are overloaded with requests for connections and are unable to respond to by means of software patches and updates, and review your log files of
legitimate requests (a denial of service attack). access attempts to see whether intrusion attempts have been made.
Virus Network computers are infected by viruses. Install antivirus software and keep virus definitions up to date. Keep
applications and operating systems patched.
Trojan program A user installs a malicious Trojan program that can create a "back door" an Install antivirus software and keep virus definitions up to date. Keep
attacker can exploit. applications and operating systems patched.
Social An employee is misled into giving out passwords or other sensitive Educate employees about your security policy, which is a set of goals
engineering information. and procedures for making an organization's network secure.
Malicious port scanning An attacker looks for open ports to infiltrate a network. Install and configure a firewall, which is hardware and/or software
designed to filter out unwanted network traffic and protect authorized
traffic.
Internet Control Message Protocol A network is flooded with a stream of ICMP echo requests to a target Set up packet filtering.
(ICMP) message abuse computer.
Man-in-the-middle attack An attacker operates between two computers in a network and Use VPN encryption.
impersonates one computer to intercept communications.
Remote The operating systems crash because they are unable to handle arbitrary Set up an IDPS (intrusion detection and prevention system).
Procedure Calls (RPC) attacks data sent to an RPC port.
Common Attacks and Defenses
Web application Brute force password guessing is used to Perimeter defenses should be used to
attacks gain a valid username/password pair. ensure that layered defenses identify and
Popular targets of this attack are Microsoft prevent attacks aimed at Web servers.
SQL, SSH servers, and FTP. Cross-site Log files can help determine if your Web
scripting, SQL injection, and PHP File server has been compromised. Ensure
Include attacks are the most popular that all applications and operating systems
methods for compromising Web sites. are patched regularly.
Internet Security Concerns
• Socket
– Port number combined with a computer’s IP address
constitutes a network connection
• Attacker software looks for open sockets
– Open sockets are an invitation to be attacked
– Sometimes sockets have exploitable vulnerabilities
– Hypertext Transport Protocol (HTTP) uses port 80
• HTTP is among most commonly exploited services
E-mail and Communications
• Home users who regularly surf the Web, use e-mail
and instant messaging programs
– Personal firewalls keep viruses and Trojan programs
from entering a system
– Comodo Internet Security is an example of personal
firewall program
Scripting
• A network intrusion that is increasing in frequency is
the use of scripts
– Executable code attached to e-mail messages or
downloaded files that infiltrates a system
– Difficult for firewalls and intrusion-detection and
prevention systems (IDPSs) to block all scripts
– Specialty firewalls and other programs should be
integrated with existing security systems to keep scripts
from infecting a network
• A specialty email firewall can monitor ad control certain
types of content that pass into and out of a network
Always-On Connectivity
• Computers using always-on connections are easier
to locate and attack
– IP addresses remain the same as long as they are
connected to the Internet
• Remote users pose security problems to network
administrators
– Network security policy should specify that remote
users have their computers equipped with firewall
and antivirus protection software
• Always-on connections effectively extend the
boundaries of your corporate network
Goals of Network Security
• Providing Secure Connectivity
• Secure Remote Access
• Ensuring Privacy
• Providing Nonrepudiation
• Confidentiality, Integrity, and Availability
Providing Secure Connectivity
• In the past, network security emphasized blocking
attackers from accessing the corporate network
– Now secure connectivity with trusted users and
networks is the priority
• Activities that require secure connectivity
– Placing orders for merchandise online
– Paying bills
– Accessing account information
– Looking up personnel records
– Creating authentication information
Secure Remote Access
• One of the biggest security challenges is to provide
secure remote access for contractors and traveling
employees
• VPN
– Uses a combination of encryption and authentication
mechanisms
– Ideal and cost-effective solution
– VPNs are explained in more detail in Chapter 11
Secure Remote Access Using VPNs
Figure 1-1 Many businesses provide secure remote access using VPNs
Ensuring Privacy
• Databases with personal or financial information
need to be protected
– US laws exist that protect private information
• Mandates severe penalties for failure to protect it
• Education is an effective way to maintain the privacy
of information
– All employees must be educated about security
dangers and security policies
– Employees are most likely to detect security breaches
• And to cause one accidentally
– Employees can monitor activities of their co-workers
Providing Nonrepudiation
• Nonrepudiation: capability to prevent a participant in
an electronic transaction from denying that it
performed an action
– Ensuring that the sender cannot deny sending a
message and the recipient cannot deny receiving it
• Encryption provides integrity, confidentiality, and
authenticity of digital information
– Encryption can also provide nonrepudiation
• Nonrepudiation is an important aspect of
establishing trusted communication between
organizations
Confidentiality, Integrity, and
Availability
• Confidentiality
– Prevents intentional or unintentional disclosure of
communications between sender and recipient
• Integrity
– Ensures the accuracy and consistency of information
during all processing
• Creation, storage, and transmission
• Availability
– Assurance that authorized users can access resources
in a reliable and timely manner
Using a Layered Defense Strategy:
Defense in Depth
• No single security measure can ensure complete
network protection
• Instead, assemble a group of methods
– That work in a coordinated fashion
• Defense in depth (DiD)
– Layering approach to network security
– Designed by the National Security Agency (NSA) as a
best practices strategy for achieving information
assurance
Using a Layered Defense Strategy:
Defense in Depth
• In general, the layers are:
– Physical security
– Authentication and password security
– Operating system security
– Antivirus protection
– Packet filtering
– Firewalls
– Demilitarized zone (DMZ)
– Intrusion detection and prevention system (IDPS)
– Virtual private networks (VPNs)
– Network auditing and log files
– Routing and access control methods
Physical Security
Figure 1-3 Firewall used to create a DMZ and protect the internal network
Intrusion Detection and Prevention
System (IDPS)
• Use of an IDPS offers an additional layer of protection
• Works by recognizing the signs of a possible attack
– Notifies the administrator
• Some traffic can trigger a response that attempts to
actively combat the threat (intrusion prevention)
• Signs of possible attacks are called signatures
– Combinations of IP address, port number, and
frequency of access attempts
Virtual Private Networks (VPNs)
• A VPN is a network that uses public
telecommunications infrastructure to provide
secure access to corporate assets for remote users
– Provide a low-cost and secure connection that uses
the public Internet
• Alternative to expensive leased lines
– Provides point-to-point communication
• Use authentication to verify users’ identities and
encrypt and encapsulate traffic
Network Auditing and Log Files
• Auditing
– Recording which computers are accessing a network
and what resources are being accessed
– Information is recorded in a log file
• Reviewing and maintaining log files helps you
detect suspicious patterns of activity
– Example: regular and unsuccessful connection
attempts that occur at the same time each day
• You can set up rules to block attacks based on
logged information from previous attack attempts
Network Auditing and Log Files
• Log file analysis
– Tedious and time consuming task
– Record and analyze rejected connection requests
– Sort logs by time of day and per hour
– Check logs during peak traffic time and use to
identify services that consume bandwidth
• Configuring log files to record
– System events
– Security events
– Traffic
– Packets
Graphic Display of Log File Entries