EN Lecture Notes Spring 2016

Slides:



Advertisements
Similar presentations
12-1 Last time Security in Networks Threats in Networks.
Advertisements

By Hiranmayi Pai Neeraj Jain
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
G53SEC 1 Network Security Hijacking, flooding, spoofing and some honey.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Chapter Fifteen Working with Network Security. Objectives To discover what dangers lurk in that great big world To examine the basic concepts of security.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Security fundamentals Topic 10 Securing the network perimeter.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
G53SEC 1 Network Security Hijacking, flooding, spoofing and some honey.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Network System Security - Task 2. Russell Johnston.
© SYBEX Inc All Rights Reserved. CompTIA Security+ Study Guide (SY0-201) “Chapter 2: Identifying Potential Risks”
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 6 Introduction to Digital Security
Protecting Servers and Clients
Security fundamentals
Network Security (part 2)
MALWARE.
LECTURE 6 MALICIOUS SOFTWARE
What they are and how to protect against them
CSCE 548 Student Presentation By Manasa Suthram
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 7: Identifying Advanced Attacks
Instructor Materials Chapter 7 Network Security
Information Systems Security
Secure Software Confidentiality Integrity Data Security Authentication
Lecture 8. Cyber Security, Ethics and Trust
Outline Basics of network security Definitions Sample attacks
Chapter 6 Introduction to Digital Security
Chapter 11: It’s a Network
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Security of a Local Area Network
Bob Marshall, MD MPH MISM 11/2015
Introduction to Security: Modern Network Security Threats
Protecting Servers and Clients
Risk of the Internet At Home
Cybersecurity Strategy
Information Security Session October 24, 2005
Outline Basics of network security Definitions Sample attacks
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
Lecture 3: Secure Network Architecture
Networking for Home and Small Businesses – Chapter 8
Network hardening Chapter 14.
Networking for Home and Small Businesses – Chapter 8
Cybersecurity and Cyberhygiene
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
Network Security Mark Creighton GBA 576 6/4/2019.
Introduction to Internet Worm
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

EN.600.424 Lecture Notes Spring 2016 Secure Network Design EN.600.424 Lecture Notes Spring 2016

Security! But How? Everyone wants a secure network. But how? “Whoever thinks his problem can be solved using cryptography, doesn’t understand his problem and doesn’t understand cryptography. — Attributed by Roger Needham and Butler Lampson to Each Other Let’s start our discussion by finding “vectors” Remember, Delivery/Vector Payload

How Are Networks Attacked? Automated attack vectors: Servers, services on TCP/UDP ports Vulnerabilities Misconfiguration Mobile code Compromised local machines Compromised third-party code/servers (e.g., Google hacking, DNS, update) Human attack vectors: Email Honeypot websites/downloads

Attacks On Local Networks Eavesdropping Many local protocols are still “in the clear” Masquerade as a machine with higher privileges Abuse shared resources The common problem is we generally have to assume trust locally Can’t be so “secure” that work doesn’t get done.

Protocol Attacks (Remote) Syn Flooding Principle: Perverse Incentives (see, e.g., spam) Smurfing (Fixed in 2007) Send packet to broadcast domain from target address Principle: Force Multiplier DDoS Principle: Brute Force? Spam (especially malicious/malware) TCP hijacking

Malware Attacks Virus, Worm, Trojan Horse Fred Cohen: Viruses can’t be stopped (Halting problem) Viruses work by corrupting real executables Virus polymorphism Worms spread using a known vulnerability Trojan horses look “useful” but aren’t Rootkit Especially used for botnets, etc Spyware and Adware

Approaches to Network Defenses Management Filtering Intrusion Detection Encryption (at rest and in motion) and protocols

Configuration Management Patches Updates Misc, such as disabling unsafe defaults, etc Disable unnecessary services Topology, architecture, network defense programs, etc Operational security: Training

Filtering Firewalls Only allow traffic that you know you need Packet Filters Application Firewalls (mostly obsolete) Deperimeterism Spam Filters Censoreware Don’t allow secrets out Wiretaps Maintain logs

AntiVirus/Malware Defenses Scanners Static Heuristics Emulation Checksummers System hardening Only allow writes to specific directories Block driver modifications, etc Anti-keylogging

Host/Network Deployments Antivirus can run on hosts Can also run on the network Mail server, especially Firewall, if it does content scanning Nowadays: Cloud See also Intrusion Detection Software (host-based, network based)

Intrusion Detection Use rules, heuristics to detect “anomalies” Generally, detects after the fact! Useful for generating subsequent signatures Often combined into firewalls now

Limitations for IDS Internet is “noisy”, see also, halting problem Too few attacks Software/version specific Encrypted, tunneled traffic Intelligent design

Cryptography SSH WiFi As you all know, WEP is broken. You should try it some time WPA is fairly safe in the right mode with the right config Homeplug (I used this…) IPSec TLS PKI Biggest problem with all of these? KEY MANAGEMENT

Side Bar: Data In Motion Protecting data as it moves from one node to another. Generally, this is done with network protocols, but can be “in the mail” Assumption is that the endpoints are secure Biggest issue is generally key management and authentication (of people and data)

Side Bar: Data At Rest Data stored at an endpoint, or in a temporary location Interesting issues with third parties: Insiders? Reliability/Availability Secure Fail? (fail open or fail closed?) Long term keys, passwords? Survivorship of access?