Introduction to Networking Security GenCyber 2019
Purpose of Computer Networks Resource Availability Networking Basics Purpose of Computer Networks Provide access to shared resources, like printers, applications, and services Resource Availability Physical and virtual infrastructure strives to provide 24x7 access to networked resources
Physical and Virtual Infrastructure TCP/IP Stack Application How a pair of applications interact Examples: HTTP, FTP, SMTP Transport Communication between applications on separate computers Specs: Maximum data rates, congestion control Internet Fundamental basis of the Internet – multiple interconnected networks Network Interface Communication between hardware and software protocols Specs: network addresses, packet sizes Physical Underlying transmission media and hardware Examples: Wiring, radio, satellite
Only as strong as the weakest link… APPLICATION TRANSPORT Without strong security at each TCP/IP layer, the entire system is vulnerable INTERNET NETWORK INTERFACE Understanding each step of data communications is crucial for networking security PHYSICAL
What’s the worst that could happen? What was breached? Sensitive personal information for 145 million Americans What caused it? Web application vulnerability (which they knew about two months before the breach) What was breached? Account details for more than 3 billion users What caused it? Phishing link clicked resulting in installation of database backdoor What was breached? Travel and other details for 500 million customers What caused it? Still unknown – though it has been uncovered hackers had long-term access https://www.wired.com/story/equifax-breach-no-excuse/ https://arstechnica.com/tech-policy/2019/04/yahoo-tries-to-settle-3-billion-account-data-breach-with-118-million-payout/ https://techcrunch.com/2019/01/04/marriott-five-million-passport-numbers-stolen-starwood/
How a pair of applications interact Application Layer APPLICATION TRANSPORT INTERNET How a pair of applications interact Common Security Issues Protocol configuration Security policies Firewall implementation NETWORK INTERFACE Examples HTTP FTP SMTP PHYSICAL Attack Prevention User education Policy enforcement
Communication between applications on separate computers Transport Layer APPLICATION TRANSPORT INTERNET Communication between applications on separate computers Common Security Issues Encryption methods Replay attacks NETWORK INTERFACE Examples TCP UDP SSL SSH PHYSICAL Attack Prevention Authentication Data integrity assurance SSL/TLS
Fundamental basis for the Internet – interconnected networks Internet Layer APPLICATION TRANSPORT INTERNET Fundamental basis for the Internet – interconnected networks Common Security Issues Router configuration IP spoofing NETWORK INTERFACE Examples Routers PHYSICAL Attack Prevention VPNs Secure passwords Firewalls
Understanding HTTP Packets Download the HTTP Packets Lab from https://soitsummer.com Follow the instructions, and complete the questions on the last page
Network Interface Layer APPLICATION TRANSPORT INTERNET Communication between hardware and software protocols Common Security Issues Wireless security protocol (e.g., WEP) NETWORK INTERFACE Examples Switches WPA2 PHYSICAL Attack Prevention VLANs
Underlying transmission media and hardware Physical Layer APPLICATION TRANSPORT INTERNET Underlying transmission media and hardware Common Security Issues Internal threats Eavesdropping NETWORK INTERFACE Examples Ethernet Fiber cabling PHYSICAL Attack Prevention Physical access control
Know Your Attack Take an Attack Card from the whiteboard in the back of the room. Research and prepare brief answers to the following questions. Describe how this attack occurs from a technology perspective. Identify the layer(s) of the TCP/IP stack affected. What security flaws enable this attack to happen? What should people know to protect themselves from this attack? Man In The Middle
Questions?