Information Security Chapter 13 Modified by: Brierley 4/16/2017.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Network+ Guide to Networks, Fourth Edition
Security+ Guide to Network Security Fundamentals
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Chapter 12 Network Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter 14: Networking Security Network+ Guide to Networks Third Edition.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
Chapter Fifteen NetworkSecurity. Objectives Identify security risks in LANs and WANs Explain how physical security contributes to network security Discuss.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 19: Configuring Windows Firewall
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Network+ Guide to Networks 6th Edition
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Chapter 6: Packet Filtering
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network+ Guide to Networks, Fourth Edition
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Role Of Network IDS in Network Perimeter Defense.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Defining Network Infrastructure and Network Security Lesson 8.
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-401)
Network Security: IP Spoofing and Firewall
Chapter Fifteen Network Security.
AbbottLink™ - IP Address Overview
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Information Security Chapter 13 Modified by: Brierley 4/16/2017

Objectives In this chapter, you will learn to: List the key steps in assessing information security risks Explain the elements and purpose of a security policy Describe strategies for minimizing common security risks associated with people, passwords, physical security, and modem access Discuss the most popular, current methods of encrypting data Modified by: Brierley 4/16/2017

Objectives In this chapter, you will learn to: Identify security threats to: Public and private telephone networks and discuss ways to prevent them LAN- and WAN-based telecommunications and discuss ways to prevent them Wireless telecommunications and discuss ways to prevent them Modified by: Brierley 4/16/2017

Risk Assessment A thorough analysis of an organization’s vulnerability to security breaches and an identification of its potential losses. A risk assessment should answer the following questions: What resources or assets are at risk? What methods could be taken to compromise those resources? Who or what are the most likely threats to resources? What is the probability that the organization or its resources will be compromised? What are the consequences of those resources being compromised? Modified by: Brierley 4/16/2017

Risk Assessment Modified by: Brierley 4/16/2017

Security Policy Goals Ensuring that authorized users have appropriate access to the resources where they have a “need to know” Preventing unauthorized users from gaining access to facilities, cabling, devices, systems, programs, or data Protecting sensitive data from unauthorized access, from individuals both internal and external to the organization Preventing accidental or intentional damage to hardware, facilities, or software Creating an environment in which the network and its connected nodes can withstand and, if necessary, quickly respond to and recover from any type of threat Modified by: Brierley 4/16/2017

Security Policy Content Subheadings for security policy content: Password policy Software installation policy Confidential and sensitive data policy Network access policy Telephone use policy E-mail use policy Internet use policy Remote access policy; Policies for connecting to remote locations, the Internet, and customers’ and vendors’ networks; Policies for use of laptops and loaner machines; Cable Vault and Equipment room access policy. Modified by: Brierley 4/16/2017

Response Policy Suggestions for team roles: Dispatcher: the person on call who first notices or is alerted to the problem. Manager - The team member who coordinates the resources necessary to solve the problem. Technical support specialists - The team members who strive to solve the problem as quickly as possible. Public relations specialist - The team member who acts as official spokesperson for the organization to the public. Modified by: Brierley 4/16/2017

Human Error, Ignorance, and Omission These cause more than half of all security breaches sustained by voice and data networks. Social engineering - involves manipulating social relationships to gain access to restricted resources. The best way to counter social engineering is to educate all employees to ask the supposed technician for his telephone number, agreeing to call him back with the information. Modified by: Brierley 4/16/2017

Human Error, Ignorance, and Omission Risks include: Intruders or attackers using social engineering or snooping to obtain user passwords. Network administrators overlooking security flaws in network design, hard-ware configuration, operating systems, or applications. An unused computer or terminal left logged on to the network, thereby providing an entry point for an intruder. Users or administrators choosing easy-to-guess passwords. Modified by: Brierley 4/16/2017

Passwords Guidelines for choosing passwords: Always change system default passwords after installing new programs or equipment. Do not use familiar information, such as your birth date, anniversary, pet’s name, child’s name, etc. Do not use any word that might appear in a dictionary. Make the password longer than six characters - the longer, the better. Change your password at least every 60 days, or more frequently, if desired. Modified by: Brierley 4/16/2017

Physical Security Locations on voice and data networks that warrant physical security: Inside a central office or POP: Cable vaults Equipment rooms Power sources (for example, a room of batteries or a fuel tank) Cable runs (ceiling and floor) Work areas (anyplace where networked workstations and telephones are located) Modified by: Brierley 4/16/2017

Physical Security Locations on voice and data networks that warrant physical security: Outside telecommunications facilities: Serving area interfaces and remote switching facilities Exterior cross-connect boxes Wires leading to or between telephone poles Base stations and mobile telephone switching offices used with cellular telephone networks Inside a business: Entrance facilities Equipment room (where servers, private switching systems, and connectivity devices are kept) Telecommunications closet Modified by: Brierley 4/16/2017

Physical Security Modified by: Brierley 4/16/2017

Physical Security Relevant questions: Which rooms contain critical systems, transmission media, or data and need to be secured? How and to what extent are authorized personnel granted entry? Are authentication methods (such as ID badges) difficult to forge or circumvent? Do supervisors or security personnel make periodic physical security checks? What is the plan for documenting and responding to physical security breaches? Modified by: Brierley 4/16/2017

Modem Access Modems are notorious for providing hackers with easy access to networks. Although modem ports on connectivity devices can open access to significant parts of a network, the more common security risks relate to modems that users attach directly to their workstations. When modems are attached directly to networked modems, they essentially provide a back door into the network. Daemon dialers - computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem. Modified by: Brierley 4/16/2017

Encryption The use of an algorithm to scramble data into a format that can be read only by reversing the algorithm. Encryption ensures that: Data can only be viewed and voice signals can only be heard by their intended recipient (or at their intended destination). Data or voice information was not modified after the sender transmitted it and before the receiver picked it up. Data or voice signals received at their intended destination were truly issued by the stated sender and not forged by an intruder. Modified by: Brierley 4/16/2017

Key Encryption Modified by: Brierley 4/16/2017

Private Key Encryption Modified by: Brierley 4/16/2017

Public Key Encryption Data is encrypted using two keys: One is a key known only to a user (a private key) and the other is a public key associated with the user. Public-key server - a publicly accessible host (often, a server connected to the Internet) that freely provides a list of users’ public keys. Key pair - The combination of the public key and private key . Digital certificate - a password-protected and encrypted file that holds an individual’s identification information, including a public key. Modified by: Brierley 4/16/2017

Public Key Encryption Modified by: Brierley 4/16/2017

Encryption Methods Kerberos - a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system. PGP (Pretty Good Privacy) - a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission. IPSec (Internet Protocol Security) - defines encryption, authentication, and key management for TCP/IP transmissions. Modified by: Brierley 4/16/2017

Encryption Methods SSL (Secure Sockets Layer) - a method of encrypting TCP/IP transmissions between a client and server using public key encryption technology. When a Web page’s URL begins with the prefix HTTPS, it is requiring that its data be transferred from server to client and vice versa using SSL encryption. Each time a client and server establish an SSL connection, they also establish a unique SSL session. Handshake protocol - authenticates the client and server to each other and establishes terms for how they will securely exchange data. Modified by: Brierley 4/16/2017

Eavesdropping The use of a transmission or recording device to capture conversations without the consent of the speakers. Eavesdropping can be accomplished in one of four ways: Bugging Listening on one of the parties’ telephone extensions Using an RF receiver to pick up inducted current near a telephone wire pair Wiretapping, or the interception of a telephone conversation by accessing the telephone signal Modified by: Brierley 4/16/2017

Eavesdropping Modified by: Brierley 4/16/2017

Private Switch Security A hacker might want to gain access to a PBX in order to: Eavesdrop on telephone conversations, thus obtaining proprietary information Use the PBX for making long-distance calls at the company’s expense, a practice known as toll fraud Barrage the PBX with such a high volume of signals that it cannot process valid calls, a practice known as a denial-of-service (DOS) attack Use the PBX as a connection to other parts of a telephone network, such as voice mail, ACD, or paging systems Modified by: Brierley 4/16/2017

Voice Mail Security Voice mail - the service that allows callers to leave messages for later retrieval, is a popular access point for hackers. If a hacker obtains access to a voice mail system’s administrator mailbox, she can set up additional mailboxes for her private use. Valid voice mail users will never notice. Privacy breaches - if a hacker guesses the password for a mailbox, she can listen to the messages in that user’s mailbox. Modified by: Brierley 4/16/2017

Telecommunications Firewall A type of fire-wall that monitors incoming and outgoing voice traffic and selectively blocks telephone calls between different areas of a voice network. Performs the following functions: Prevents incoming calls from certain sources from reaching the PBX Prevents certain types of outgoing calls from leaving the voice network Prevents all outgoing calls during specified time periods Collects information about each incoming and outgoing call Detects signals or calling patterns characteristic of intrusion attempts, immediately terminates the suspicious connection, and then alerts the system administrator of the potential breach Modified by: Brierley 4/16/2017

Telecommunications Firewall Modified by: Brierley 4/16/2017

Network Operating System To begin planning client-server security, every network administrator should understand which resources on the server all users need to access. Network administrators typically group users according to their security levels as this simplifies the process of granting users rights to resources. Besides establishing client rights and restrictions to network resources, a network administrator must pay attention to security precautions when installing and using the network operating system. A vigilant network administrator will also take care to keep her servers’ NOS software current. Modified by: Brierley 4/16/2017

Network Operating System Restrictions that an administrator may use to protect network resources include: Time of day - Use of logon IDs can be valid only during specific hours, for example, between 8:00 A.M. and 5:00 P.M. Total time logged in - Use of logon IDs may be restricted to a specific number of hours per day. Source address - Use of logon IDs can be restricted to certain workstations or certain areas of the network Unsuccessful logon attempts - As with PBX security, use of data network security allows administrators to block a connection after a certain number of unsuccessful logon attempts. Modified by: Brierley 4/16/2017

Security Through Network Design Risks inherent in data network hardware and design: Transmissions can be intercepted Leased lines are vulnerable to eavesdropping Shared media and broadcast traffic allow data capture Device ports can be exploited Private IP addresses can be exploited Private and public hosts on the same network Modified by: Brierley 4/16/2017

Firewall Packet-filtering firewall - a device that operates at the Data Link and Transport layers of the OSI model. Modified by: Brierley 4/16/2017

Firewall Criteria used to accept or deny data include: Source and destination IP addresses Source and destination ports Use of the TCP, UDP, or ICMP transport protocols A packet’s status as the first packet in a new data stream or a subsequent packet A packet’s status as inbound or outbound to or from a private network Modified by: Brierley 4/16/2017

Firewall Factors to be considered when choosing a firewall: Does the firewall support encryption? Does the firewall support user authentication? Does the firewall allow the network administrator to manage it centrally and through a standard interface? How easily can you establish rules for access to and from the firewall? Does the firewall support filtering at the highest layers of the OSI model, not just at the Data Link and Transport layers? Modified by: Brierley 4/16/2017

Proxy Servers Proxy server (Gateway) - the network host that runs the proxy service. Proxy servers manage security at all layer’s of the OSI model. On a network, a proxy server is placed between the private and public parts of a network. Proxy service - a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic. Modified by: Brierley 4/16/2017

Proxy Servers Modified by: Brierley 4/16/2017

Virtual Private Networks (VPNs) Private networks that uses public channels to connect clients and servers. Point-to-Point Tunneling Protocol (PPTP) - A Layer 2 protocol that encapsulates PPP so that any type of data can traverse the Internet, masked as pure IP transmissions. Layer 2 Tunneling Protocol (L2TP) - an enhanced version of L2F that, like L2F, supports multiple protocols. does not require costly hardware upgrades to implement optimized to work with the next generation of IP (IPv6) and IPSec Modified by: Brierley 4/16/2017

Cellular Network Security Hackers intent on obtaining private information can find ways to listen in on cellular conversations. Potentially more damaging than eavesdropping is cellular telephone fraud. cellular telephone cloning - occurs when a hacker obtains a cellular telephone’s electronic serial number (ESN), and then reprograms another handset to use that ESN. To combat cloning fraud, cellular telephones transmit their ESN numbers in encrypted form. Modified by: Brierley 4/16/2017

Wireless WAN Security War driving - searching for unprotected wireless networks by driving around with a laptop configured to receive and capture wireless data transmissions. Wired Equivalent Privacy (WEP) standard - a key encryption technique that assigns keys to wireless nodes. Extensible Authentication Protocol (EAP) - defined by the IETF in RFC 2284. Does not perform encryption. Instead, it is used with separate encryption and authentication schemes. Modified by: Brierley 4/16/2017

Summary In a risk assessment, an organization analyzes its valuable assets, ways in which the assets might be compromised, the sources of threats to those assets, and the consequences that would arise if those assets were stolen or damaged. Key goals of a security policy include: preventing unauthorized users from gaining access to facilities, cabling, devices, systems, programs, or data, and preventing accidental or intentional damage to hardware, facilities, or software; Encryption acts as the last means of defense against information eavesdropping, theft, or tampering. Modified by: Brierley 4/16/2017

Information Security Chapter 13 END Modified by: Brierley 4/16/2017