Chapter 12: Secure Communications and Network Attacks
Network and Protocol Security Mechanisms Secure communications protocols Authentication protocols
Secure Communications Protocols SKIP swIPe S-RPC SSL TLS SET
Authentication Protocols CHAP PAP EAP
Secure Voice Communications Voice over Internet Protocol (VoIP) Social engineering – In person, over the phone, , IM, social networks PBX fraud and abuse – DISA – Phreakers – Black box, red box, blue box, white box (DTMF)
Multimedia Collaboration Remote meeting Instant messaging
Manage Security security goals Understand security issues security solutions
Security Goals SMTP, POP, IMAP Open relay, closed relay, authenticated relay Nonrepudiation Restrict access Integrity Verify delivery Confidentiality
Understand Security Issues Lack of encryption Delivery vehicle for malware Lack of source verification Flooding Attachments
Security Solutions S/MIME MOSS PEM DKIM PGP
Remote Access Security Management Remote access and telecommuting Techniques Plan remote access security Dial-up protocols Centralized remote authentication services
Remote Access and Telecommuting Techniques Service specific Remote control Screen scraper/scraping Remote node operation
Plan Remote Access Security POTS/PTSN, VoIP, VPN Remote connectivity technology Transmission protection Authentication protection Remote user assistance
Dial-Up Protocols PPP SLIP
Centralized Remote Authentication Services RADIUS TACACS+ – TACACS, XTACACS
Virtual Private Network Tunneling How VPNs work Common VPN protocols – PPTP, L2F, LT2P, IPSec Virtual LAN
Virtualization Virtual software – Virtual applications – Virtual desktop Virtual networking – Software-defined network (SDN) – Network virtualization – Virtual SAN
Network Address Translation Private IP addresses (RFC 1918) – (a full Class A range) – – (16 Class B ranges) – – (256 Class C ranges) Stateful NAT Static and dynamic NAT Automatic Private IP Addressing (APIPA) Loopback address
Switching Technologies Circuit switching Packet switching Virtual circuits – PVCs – SVCs
WAN Technologies WAN connection technologies – Dedicated vs. nondedicated – ISDN: BRI vs. PRI – X.25 – Frame relay – ATM – SMDS – SDLC, HDLC, HSSI Dial-up encapsulation protocols
Miscellaneous Security Control Characteristics Transparency Verify integrity Transmission mechanisms
Security Boundaries Areas of different security requirements Classifications Physical vs. logical Should be clearly defined
Prevent or Mitigate Network Attacks DoS and DDoS Eavesdropping Impersonation/masquerading Replay attacks Modification attacks Address Resolution Protocol spoofing DNS poisoning, spoofing, and hijacking Hyperlink spoofing