Security+ Guide to Network Security Fundamentals, Third Edition

Slides:



Advertisements
Similar presentations
Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Advertisements

Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewall Configuration Strategies
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security.
Chapter 12 Network Security.
Guide to Network Defense and Countermeasures Third Edition
Intrusion Detection Systems and Practices
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 5 Network Defenses.
Department Of Computer Engineering
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Chapter 6: Packet Filtering
Chapter 13 – Network Security
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Module 10: Windows Firewall and Caching Fundamentals.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Eric Van Horn Cosc 356.  Nearly every organization in todays era uses computers and a network to send, receive, and store information  Very important.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Click to edit Master subtitle style
Introduction to Networking
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
Digital Pacman: Firewall Edition
* Essential Network Security Book Slides.
Security+ Guide to Network Security Fundamentals, Third Edition
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Presentation transcript:

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 5 Network Defenses

Objectives Explain how to enhance security through network design Define network address translation and network access control List the different types of network security devices and explain how they can be used Security+ Guide to Network Security Fundamentals, Third Edition

Crafting a Secure Network A common mistake in network security Attempt to patch vulnerabilities in a weak network that was poorly conceived and implemented from the start Securing a network begins with the design of the network and includes secure network technologies Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Design Subnetting IP addresses are actually two addresses: one part is a network address and one part is a host address Classful addressing The split between the network and host portions of the IP address originally was set on the boundaries between the bytes Subnetting or subnet addressing Allows an IP address to be split anywhere Networks can essentially be divided into three parts: network, subnet, and host Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Design (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Design (continued) Security is enhanced by subnetting a single network Multiple smaller subnets isolates groups of hosts Network administrators can utilize network security tools Makes it easier to regulate who has access in and out of a particular subnetwork Subnets also allow network administrators to hide the internal network layout Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Design (continued) Virtual LAN (VLAN) In most network environments, networks are divided or segmented by using switches A VLAN allows scattered users to be logically grouped together even though they may be attached to different switches Can reduce network traffic and provide a degree of security similar to subnetting: VLANs can be isolated so that sensitive data is transmitted only to members of the VLAN Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Design (continued) VLAN communication can take place in two ways All devices are connected to the same switch Traffic is handled by the switch itself Devices are connected to different switches A special “tagging” protocol must be used, such as the IEEE 802.1Q-2005 A VLAN is heavily dependent upon the switch for correctly directing packets Attacks on the switch that attempt to exploit vulnerabilities such as weak passwords or default accounts are common Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Design (continued) Convergence One of the most visible unification efforts is a process known as convergence of voice and data traffic over a single IP network Advantages Cost savings Management Application development Infrastructure requirements Reduced regulatory requirements Increased user productivity Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Design (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Design (continued) Demilitarized Zone (DMZ) A separate network that sits outside the secure network perimeter Outside users can access the DMZ but cannot enter the secure network Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Design (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Design (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Technologies Network Address Translation (NAT) Hides the IP addresses of network devices from attackers Private addresses IP addresses not assigned to any specific user or organization Function as regular IP addresses on an internal network Non-routable addresses Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Technologies (continued) NAT removes the private IP address from the sender’s packet And replaces it with an alias IP address When a packet is returned to NAT, the process is reversed An attacker who captures the packet on the Internet cannot determine the actual IP address of the sender Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Technologies (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Technologies (continued) Port address translation (PAT) A variation of NAT Each packet is given the same IP address but a different TCP port number Network Access Control (NAC) Examines the current state of a system or network device before it is allowed to connect to the network Any device that does not meet a specified set of criteria is only allowed to connect to a “quarantine” network where the security deficiencies are corrected Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Technologies (continued) Goal of NAC Prevent computers with sub-optimal security from potentially infecting other computers through the network Methods for directing the client to a quarantine VLAN Using a Dynamic Host Configuration Protocol (DHCP) server Using Address Resolution Protocol (ARP) poisoning Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Technologies (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Security through Network Technologies (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Applying Network Security Devices Devices include: Firewalls Proxy servers Honeypots Network intrusion detection systems Host and network intrusion prevention systems Protocol analyzers Internet content filters Integrated network security hardware Security+ Guide to Network Security Fundamentals, Third Edition

Firewall Firewall Typically used to filter packets Sometimes called a packet filter Designed to prevent malicious packets from entering the network A firewall can be software-based or hardware-based Hardware firewalls usually are located outside the network security perimeter As the first line of defense Security+ Guide to Network Security Fundamentals

Firewall (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Firewall (continued) The basis of a firewall is a rule base Establishes what action the firewall should take when it receives a packet (allow, block, and prompt) Stateless packet filtering Looks at the incoming packet and permits or denies it based strictly on the rule base Stateful packet filtering Keeps a record of the state of a connection between an internal computer and an external server Then makes decisions based on the connection as well as the rule base Security+ Guide to Network Security Fundamentals, Third Edition

Firewall (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Firewall (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Firewall (continued) Personal software firewalls have gradually improved their functionality Most personal software firewalls today also filter outbound traffic as well as inbound traffic Protects users by preventing malware from connecting to other computers and spreading Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Proxy Server Proxy server Reverse proxy A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user Goal is to hide the IP address of client systems inside the secure network Reverse proxy Does not serve clients but instead routes incoming requests to the correct server Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Proxy Server (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Honeypot Honeypot Three primary purposes of a honeypot: Intended to trap or trick attackers A computer typically located in a DMZ that is loaded with software and data files that appear to be authentic Yet they are actually imitations of real data files Three primary purposes of a honeypot: Deflect attention Early warnings of new attacks Examine attacker techniques Security+ Guide to Network Security Fundamentals, Third Edition

Honeypot (continued) Types of honeypots Production honeypots Research honeypots Information gained from honeypots can be both useful as well as alarming Information gained from studies using honeypots can be helpful in identifying attacker behavior and crafting defenses Security+ Guide to Network Security Fundamentals, Third Edition

Network Intrusion Detection Systems (NIDS) Network intrusion detection system (NIDS) Watches for attempts to penetrate a network NIDS work on the principle of comparing new behavior against normal or acceptable behavior A NIDS looks for suspicious patterns Security+ Guide to Network Security Fundamentals, Third Edition

Network Intrusion Detection Systems (NIDS) (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Network Intrusion Detection Systems (NIDS) (continued) Functions a NIDS can perform: Configure the firewall to filter out the IP address of the intruder Launch a separate program to handle the event Play an audio file that says “Attack is taking place” Save the packets in a file for further analysis Send an entry to a system log file Send e-mail, page, or a cell phone message to the network administrator Terminate the TCP session by forging a TCP FIN packet to force a connection to terminate Security+ Guide to Network Security Fundamentals, Third Edition

Host and Network Intrusion Prevention Systems (HIPS/NIPS) Intrusion prevention system (IPS) Finds malicious traffic and deals with it immediately A typical IPS response may be to block all incoming traffic on a specific port Host intrusion prevention systems (HIPS) Installed on each system that needs to be protected Rely on agents installed directly on the system being protected Work closely with the operating system, monitoring and intercepting requests in order to prevent attacks Security+ Guide to Network Security Fundamentals, Third Edition

Host and Network Intrusion Prevention Systems (HIPS/NIPS) (continued) Most HIPS monitor the following desktop functions: System calls File system access System Registry settings Host input/output HIPS are designed to integrate with existing antivirus, anti-spyware, and firewalls HIPS provide an additional level of security that is proactive instead of reactive Security+ Guide to Network Security Fundamentals, Third Edition

Host and Network Intrusion Prevention Systems (HIPS/NIPS) (continued) Network intrusion prevention systems (NIPS) Work to protect the entire network and all devices that are connected to it By monitoring network traffic NIPS can immediately react to block a malicious attack NIPS are special-purpose hardware platforms that analyze, detect, and react to security-related events Can drop malicious traffic based on their configuration or security policy Security+ Guide to Network Security Fundamentals, Third Edition

Protocol Analyzers Three ways for detecting a potential intrusion Detecting statistical anomalies Examine network traffic and look for well-known patterns of attack Use protocol analyzer technology Protocol analyzers Can fully decode application-layer network protocols Different parts of the protocol can be analyzed for any suspicious behavior Security+ Guide to Network Security Fundamentals, Third Edition

Internet Content Filters Monitor Internet traffic and block access to preselected Web sites and files A requested Web page is only displayed if it complies with the specified filters Unapproved Web sites can be restricted based on the Uniform Resource Locator (URL) or by matching keywords Security+ Guide to Network Security Fundamentals, Third Edition

Internet Content Filters (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Integrated Network Security Hardware Types of hardware security appliances: Dedicated security appliances provide a single security service Multipurpose security appliances that provide multiple security functions Integrated network security hardware Combines or integrates multipurpose security appliances with a traditional network device such as a switch or router Particularly attractive for networks that use IDS Security+ Guide to Network Security Fundamentals, Third Edition

Summary Subnetting involves dividing a network into subnets that are connected through a series of routers Similar to subnetting, a virtual LAN (VLAN) allows users who may be scattered across different floors of a building or campuses to be logically grouped Convergence is the integration of voice and data traffic over a single IP network Network technologies can also help secure a network Network address translation (NAT) Network access control (NAC) Security+ Guide to Network Security Fundamentals, Third Edition

Summary (continued) Different network security devices can be installed to make a network more secure Network intrusion detection systems (NIDS) monitor the network for attacks and if one is detected will alert personnel or perform limited protection activities Internet content filters monitor Internet traffic and block attempts to visit restricted sites Security+ Guide to Network Security Fundamentals, Third Edition