CompTIA Network+ N Authorized Cert Guide

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewall Configuration Strategies
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Firewalls and Intrusion Detection Systems
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 5 Network Defenses.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
NW Security and Firewalls Network Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Chapter 6: Packet Filtering
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
K. Salah1 Security Protocols in the Internet IPSec.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Security fundamentals
Network security Vlasov Illia
IPsec Problems and Solutions
CompTIA Security+ Study Guide (SY0-401)
IPSecurity.
Working at a Small-to-Medium Business or ISP – Chapter 8
SECURING NETWORK TRAFFIC WITH IPSEC
Radius, LDAP, Radius used in Authenticating Users
Click to edit Master subtitle style
Security in Networking
CompTIA Security+ Study Guide (SY0-401)
Network Security: IP Spoofing and Firewall
* Essential Network Security Book Slides.
Security+ Guide to Network Security Fundamentals, Third Edition
Firewalls Routers, Switches, Hubs VPNs
Virtual Private Networks (VPNs)
– Chapter 3 – Device Security (B)
Firewalls Chapter 8.
Introduction to Network Security
Protection Mechanisms in Security Management
Session 20 INST 346 Technologies, Infrastructure and Architecture
Lecture 36.
Lecture 36.
Presentation transcript:

CompTIA Network+ N10-006 Authorized Cert Guide Chapter 12 Network Security

Foundation Topics Security Fundamentals Defending Against Attacks Firewalls VPN Intrusion Detection and Prevention

Securing a Network What are the goals of network security, and what sorts of attacks do you need to defend against? What best practices can be implemented to defend against security threats? What are the characteristics of various remote-access security technologies? How can firewalls be used to protect an organization’s internal network, while allowing connectivity to an untrusted network, such as the Internet? How can virtual private networks (VPNs) be used to secure traffic as that traffic flows over an untrusted network? What is the difference between intrusion prevention and intrusion detection systems, and how do they protect an organization from common security threats?

Network Security Goals The three primary goals of network security are as follows: Confidentiality Integrity Availability This is commonly called the CIA triad. Confidentiality – implies keeping the data private Integrity – ensures that data has not been modified in transit Availability – means that the data is accessible when needed

Confidentiality One method for providing confidentiality is through encryption. Encryption ensures that data can only be decoded by the intended recipient. Encryption has two basic forms: Symmetric encryption Asymmetric encryption

Symmetric Encryption Symmetric encryption implies that the same key is used by both the sender and receiver of a packet. Examples of symmetric algorithms include the following: DES (Data Encryption Standard) Developed in the mid-1970s 56-bit key Considered weak today 3DES (Triple DES) Uses three 56-bit keys (168-bit total) AES (Advanced Encryption Standard) Preferred symmetric encryption standard Available in 128-bit, 192-bit and 256-bit key versions

Symmetric Encryption Example

Asymmetric Encryption Asymmetric encryption uses different keys for the sender and receiver of a packet. The most popular implementation of asymmetric encryption is RSA. The RSA algorithm is commonly used with a public key infrastructure (PKI). The PKI system is used to encrypt data between your client and a shopping website, for example.

Asymmetric Encryption Example

Integrity Data integrity ensures that data has not been modified in transit. It might also verify the source originating the traffic. Examples of integrity violations include the following: Defacing a corporate web page Altering an e-commerce transaction Modifying electronically stored financial records

Integrity One approach to providing data integrity is through hashing. Sender runs a string of data through an algorithm. The result is a hash or hash digest. The data and the hash are sent to the recipient The recipient runs the data through the same algorithm and obtains a hash. The recipient compares the two hashes. If they are the same, the data was not modified.

Integrity Two of the most common hashing algorithms are the following: Message digest 5 (MD5): Creates 128-bit hash digests Secure Hash Algorithm 1 (SHA-1): Creates 160-bit hash digests Challenge-Response Authentication Mechanism Message Digest 5 (CRAMMD5) is a common variant of HMAC often used in e-mail systems.

Availability Availability measures data’s accessibility. Examples of how a network’s accessibility can be compromised include the following: Crashing a router or switch through improperly formatted data. Flooding a network with so much traffic that legitimate requests cannot be processed. This is called a denial of service (DoS).

Categories of Network Attacks Each of the security goals (confidentiality, integrity, and availability) is subject to different attack types: Confidentiality attack: Attempts to make confidential data viewable by an attacker Integrity attack: Attempts to alter data Availability attack: Attempts to limit the accessibility and usability of a system

Confidentiality Attack Tactics Examples of confidentiality attack tactics include the following: Packet capture Ping sweep and port scan Dumpster diving Wireless interception Wiretapping Social engineering

Confidentiality Attack Example

Integrity Attack Methods Examples of integrity attack methods include the following: Man-in-the-middle Salami attack Data diddling Trust relationship exploitation Password attack Botnet Session hijacking

Integrity Attack Example

Availability Attack Types Types of availability attacks include the following: Denial of service (DoS) TCP SYN flood Buffer overflow ICMP attacks Electrical disturbances Physical environment attacks

DoS Attack Example

TCP SYN Flood Attack Example

Smurf Attack Example

Electrical Disturbances An availability attack can be launched by interrupting or interfering with electrical service available to a system. Examples include the following: Power spikes Electrical surges Power faults Blackouts Power sag Brownout An uninterruptable power supply (UPS) or backup generator can combat these threats.

Physical Environment Attacks Computing equipment can be damaged by influencing the physical environment, including the following: Temperature Humidity Gas These threats can generally be mitigated through physical restrictions and monitoring.

Defending Against Attacks Several areas require best practices to successfully defend a network against attacks, including the following: User training Patching Security policies Incident response Vulnerability scanners Honey pots and honey nets Access control lists Remote-access security

User Training Many attacks can be thwarted through user training. Examples of security issues that users should be educated on include the following: Social engineering awareness Virus transmission dangers Password security E-mail security

Patching A patch is designed to correct a known bug or fix a known vulnerability in an application or program. In general, patches should be implemented as they become available. (An update differs from a patch by adding new features.)

Security Policies Lack of a security policy, or lack of enforcement of an existing policy, is one reason for security breaches. Security policies serve multiple purposes, such as the following: Protecting an organization’s assets Making employees aware of their obligations Identifying specific security solutions Acting as a baseline for ongoing security monitoring A common component of a corporate security policy is the acceptable use policy (AUP).

Components of a Security Policy

Incident Response How an organization reacts to a security violation is called its incident response. Prosecuting computer crimes can be very difficult. Similar to noncomputer crimes, successful prosecution relies on proving three things: Motive Means Opportunity

Vulnerability Scanners Your network should be periodically tested to verify that your network security components are behaving as expected or to detect unknown vulnerabilities. Applications that conduct these tests are called vulnerability scanners. Two examples are as follows: Nessus Nmap

Nessus

Nmap

Honey Pots and Honey Nets A honey pot acts as a distracter. A system designated as a honey pot appears to be an attractive target. Attackers then use their resources attacking the honey pot, leaving the real servers alone. Honey pot: Single machine Honey net: Multiple honey pots A honey pot/net can also be used to study how attackers conduct their attacks.

Access Control Lists An access control list (ACL) is a set of rules, typically applied to router interfaces, that permit or deny traffic. ACL filtering criteria include the following: Source IP Destination IP Source port Destination port Source MAC Destination MAC

ACL Example

Remote-Access Security Remote-access security controls access to network devices such as routers, switches, servers, and PCs. Examples are shown in the following table. Method Description SSH Secure remote access via terminal emulator RADIUS Open standard, UDP-based authentication protocol TACACS+ Cisco proprietary, TCP-based authentication protocol IEEE 802.1X Permits or denies a wired or wireless client access to a LAN Two-factor authentication Requires two types of authentication: something you know, something you have or something you are Single sign-on Authenticate once and access multiple systems

Firewalls A firewall defines a set or rules defining which types of traffic are permitted or denied through the device. A firewall can be either software or hardware. Many firewalls also perform Network Address Translation (NAT) or Port Address Translation (PAT). There are two general categories of firewalls: Packet-filtering firewall: Permits or denies traffic based on packet header Source and destination IP address/port number Looks at each packet individually Stateful firewall: Inspects traffic as part of a session Recognizes whethertraffic originated from inside or outside the LAN

Packet-Filtering Firewall

Stateful Firewall Return traffic for Telnet Session A is permitted because it originated from inside the LAN. Telnet Session B traffic is denied because it originated from outside the LAN without permission.

Firewall Zones A firewall’s interface can be defined as belonging to different firewall zones. After the zones are created, you set up rules based on those zones. Typical zone names include the following: Inside: Connects to your corporate LAN Outside: Typically connects to the Internet DMZ: Connects to devices that should have restricted access from the outside zone (like web servers)

Firewall Zone Example

Virtual Private Networks (VPNs) Many employees work in remote offices or telecommute. A virtual private network (VPN) allows users to securely connect to their main corporate network over an untrusted network (like the Internet). There are two primary categories of VPNs: Site to site: Interconnects two sites, as an alternative to a leased line, at a reduced cost Client to Site (a.k.a. remote access): Connects a remote user with a site

Site-to-Site VPN Example

Client-to-Site VPN Example

Overview of IPsec Although there are other types of VPN technologies, IPsec VPNs are the most common. IPsec (IP security) provides the following protections for VPN traffic. Protection Description Confidentiality Provided by data encryption. Integrity Ensures data was not modified in transit through hashing. Authentication Verifies that the parties are who they claim to be.

IKE Modes and Phases One of the primary protocols used by IPsec is the Internet Key Exchange (IKE). IKE uses encryption between authenticated peers. IKE has three modes of operation: Main mode Aggressive mode Quick mode

IKE Modes and Phases The two primary phases of establishing an IPsec tunnel are as follows: IKE Phase 1: Establishes encryption and authentication protocols between VPN endpoints to create the IKE Phase 1 tunnel IKE Phase 2: Within the secure IKE Phase 1 tunnel, establishes encryption and authentication protocols between VPN endpoints to create the IPsec tunnel

Transport Mode Versus Tunnel Mode

IPsec VPN Steps

Intrusion Detection and Prevention When an attacker launches an attack against a network, an intrusion detection system (IDS), or intrusion prevention system (IPS), is often able to recognize the attack and respond appropriately. Incoming data streams are analyzed for attacks using different detection methods, such as the following: Signature-based detection Policy-based detection Anomaly-based detection

IDS Versus IPS Both IDS and IPS devices recognize attacks, but they operate with some differences: IDS Operates parallel to the network Passive device Monitors all traffic and sends alerts IPS Operates in-line to the network Active device Monitors all traffic, sends alerts, and drops or blocks the offending traffic

IDS and IPS Network Placement

Deploying Network-Based and Host-Based Solutions Sensors dedicated as a network-based intrusion prevention system (NIPS) can work in tandem with a host-based intrusion prevention system (HIPS), which is software installed on a host. A NIPS device might prevent a DoS attack, whereas a HIPS solution could focus on the protection of applications on a host.

NIDS, NIPS, and HIPS Deployment Example

Summary Security Fundamentals Defending Against Attacks Confidentiality, integrity, and availability Attack types Defending Against Attacks User training Patching Policies Incident response Vulnerability scanners Honey pots and honey nets ACLs and remote-access security

Summary Firewalls VPN Intrusion Detection and Prevention Software and hardware types Inspection types VPN IKE modes and phases Intrusion Detection and Prevention Detection methods Deployment types