Security Awareness: Applying Practical Security in Your World

Slides:



Advertisements
Similar presentations
Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security+ Guide to Network Security Fundamentals, Third Edition
Firewall Configuration Strategies
Security Awareness Chapter 5 Wireless Network Security.
Firewalls and Intrusion Detection Systems
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 5 Network Defenses.
Guide to Computer Network Security
A Guide to major network components
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
Computer Networks IGCSE ICT Section 4.
Networking Components
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Department Of Computer Engineering
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
Common Devices Used In Computer Networks
– Chapter 5 – Secure LAN Switching
Computer Concepts 2014 Chapter 5 Local Area Networks.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Module 10: Windows Firewall and Caching Fundamentals.
DoS/DDoS attack and defense
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
© ITT Educational Services, Inc. All rights reserved.Page 1 IS3220 Information Technology Infrastructure Security Class Agenda 1  Learning Objectives.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Chapter Objectives In this chapter, you will learn:
Click to edit Master subtitle style
Introduction to Networking
Digital Pacman: Firewall Edition
Security+ Guide to Network Security Fundamentals, Third Edition
IS4680 Security Auditing for Compliance
Firewalls Routers, Switches, Hubs VPNs
ICT Computing Lesson 4: Computing Network.
Introduction to Network Security
Presentation transcript:

Security Awareness: Applying Practical Security in Your World Chapter 5: Network Security

Objectives Give an overview of how networks work List and describe three types of network attacks Explain how network defenses can be used to enhance a network security perimeter Tell how a wireless local area network (WLAN) functions and list some of its security features Security Awareness: Applying Practical Security in Your World

Network Security Computer networks in organizations are prime targets for hackers. Computer networks are also found in homes The growth of home networks has resulted in more attacks Security Awareness: Applying Practical Security in Your World

How Networks Work Personal computers  Isolated from other computers (See Figure 5-1) Function limited to the hardware, software, and data on that one computer Computer network  Interconnected computers and devices (See Figure 5-2) Sharing increases functionality, reduces costs, and increases accuracy Security Awareness: Applying Practical Security in Your World

How Networks Work (continued) Security Awareness: Applying Practical Security in Your World

How Networks Work (continued) Security Awareness: Applying Practical Security in Your World

Types of Networks Local area network (LAN)  A network of computers located relatively close to each other Wide area network (WAN)  A network of computers geographically dispersed Security Awareness: Applying Practical Security in Your World

Types of Networks (continued) Security Awareness: Applying Practical Security in Your World

Transmitting Data Protocols  Sets of rules used by sending and receiving devices to transmit data Both sender and receiver must use same set of rules Transmission Control Protocol/Internet Protocol (TCP/IP)  Most common protocol in use IP Address  Unique number assigned to each device on a TCP/IP network that identifies it from all other devices Data is divided into smaller units called packets for transmission through a network (See Figure 5-4) Security Awareness: Applying Practical Security in Your World

Figure 5-4 Security Awareness: Applying Practical Security in Your World

Devices on a Network Different types of equipment perform different functions Many devices are responsible for sending packets through the LAN or across a WAN Router  Directs packets “toward” their destination Network perimeter  Line of defense around a network made up of products, procedures and people (See Figure 5-5) Security Awareness: Applying Practical Security in Your World

Devices on a Network (continued) Security Awareness: Applying Practical Security in Your World

Network Attacks Hackers attack network perimeters in different ways Attacks include: Denial of Service (DoS) Man-in-the-Middle Spoofing Security Awareness: Applying Practical Security in Your World

Denial of Service (DoS) Normal conditions  Computers contact a server with a request Denial of Service (DoS)  Server is flooded with requests, making it unavailable to legitimate users (See Figure 5-6) Attacking computers programmed not to reply to the server’s response Server “holds the line open” for each request (See Figure 5-7) and eventually runs out of resources as more requests are received Security Awareness: Applying Practical Security in Your World

Denial of Service (DoS) (continued) Security Awareness: Applying Practical Security in Your World

Denial of Service (DoS) (continued) Security Awareness: Applying Practical Security in Your World

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS)  Variant of a DoS that uses many computers to attack a target Hacker finds a handler Special software is loaded on the handler and it searches for zombies Software is loaded on the zombies without the user’s knowledge Eventually that hacker instructs all zombies to flood a particular server Security Awareness: Applying Practical Security in Your World

Man-in-the-Middle Man-in-the-Middle  Two computers are tricked into thinking they are communicating with each other when there is actually a hidden third party between them (See Figure 5-8) Communications can be monitored or modified Security Awareness: Applying Practical Security in Your World

Man-in-the-Middle (continued) Security Awareness: Applying Practical Security in Your World

Spoofing Spoofing  Pretending to be the legitimate owner IP Address Spoofing  False IP address inserted into packets ARP Spoofing  ARP table changed to redirect packets (See Figure 5-10) ARP table  Address Resolution Protocol table stores list of MAC addresses and corresponding IP addresses (See Figure 5-9) MAC Address*  Media Access Control address is the hardware address of the Network Interface Card (NIC) Security Awareness: Applying Practical Security in Your World

Spoofing (continued) Security Awareness: Applying Practical Security in Your World

Spoofing (continued) Security Awareness: Applying Practical Security in Your World

Network Defenses Three groups of networks defenses: Devices Configurations Countermeasures Security Awareness: Applying Practical Security in Your World

Devices Firewalls  Designed to prevent malicious packets from entering Typically outside the security perimeter (See Figure 5-11) Software based  Runs as a local program to protect one computer (personal firewall) or as a program on a separate computer (network firewall) to protect the network Hardware based  separate devices that protect the entire network (network firewalls) Security Awareness: Applying Practical Security in Your World

Devices (continued) Security Awareness: Applying Practical Security in Your World

Devices (continued) Firewall rule base  AKA Access control list (ACL)  Establishes what action the firewall should take when it receives a packet Allow Block Prompt Should reflect the organization's security policy Security Awareness: Applying Practical Security in Your World

Devices (continued) Stateless packet filtering  Allows or denies packets based strictly on the rule base Stateful packet filtering  Keeps a record of the state of a connection Makes decisions based on the rule base and the connection Security Awareness: Applying Practical Security in Your World

Devices (continued) Intrusion Detection System (IDS)  Examines the activity on a network Goal is to detect intrusions and take action Two types of IDS: Host-based IDS  Installed on a server or other computers (sometimes all) Monitors traffic to and from that particular computer Network-based IDS  Located behind the firewall and monitors all network traffic (See Figure 5-12) Security Awareness: Applying Practical Security in Your World

Devices (continued) Security Awareness: Applying Practical Security in Your World

Devices (continued) Network Address Translation (NAT) Systems  Hides the IP address of network devices Located just behind the firewall (See Figure 5-13) NAT device uses an alias IP address in place of the sending machine’s real one (See Figure 5-14) “You cannot attack what you can’t see” Security Awareness: Applying Practical Security in Your World

Devices (continued) Security Awareness: Applying Practical Security in Your World

Devices (continued) Security Awareness: Applying Practical Security in Your World

Devices (continued) Proxy Server  Operates similar to NAT, but also examines packets to look for malicious content Replaces the protected computer’s IP address with the proxy server’s address Protected computers never have a direct connection outside the network The proxy server intercepts requests (See Figure 5-15) Acts “on behalf of” the requesting client Security Awareness: Applying Practical Security in Your World

Devices (continued) Security Awareness: Applying Practical Security in Your World

Network Design The key to effective network design is a single point of entry into a network  Difficult to maintain Employees or others may bypass security by installing unauthorized entry points (See Figure 5-16) Common design tools: Demilitarized Zones (DMZ) Virtual Private Networks (VPNs) Security Awareness: Applying Practical Security in Your World

Network Design (continued) Security Awareness: Applying Practical Security in Your World

Network Design (continued) Demilitarized Zones (DMZ)  Another network that sits outside the secure network perimeter Outside users can access the DMZ, but not the secure network (See Figure 5-17) Some DMZs use two firewalls (See Figure 5-18) This prevents outside users from even accessing the internal firewall  Provides an additional layer of security Security Awareness: Applying Practical Security in Your World

Network Design (continued) Security Awareness: Applying Practical Security in Your World

Network Design (continued) Security Awareness: Applying Practical Security in Your World

Network Design (continued) Virtual Private Networks (VPNs)  A secure network connection over a public network (See Figure 5-19) Allows mobile users to securely access information Sets up a unique connection called a tunnel Security Awareness: Applying Practical Security in Your World

Network Design (continued) Security Awareness: Applying Practical Security in Your World

Network Design (continued) Advantages of VPNs: Low cost Flexibility Security Standards Security Awareness: Applying Practical Security in Your World

Network Design (continued) Honeypots  Computer located in a DMZ and loaded with files and software that appear to be authentic, but are actually imitations (See Figure 5-21) Intentionally configured with security holes Goals: Direct attacker’s attention away from real targets Examine the techniques used by hackers Security Awareness: Applying Practical Security in Your World

Network Design (continued) Security Awareness: Applying Practical Security in Your World

Components of a WLAN Wireless network interface card (WNIC)  Card inserted into the wireless device that sends and receives signals from the access point Access point (AP)  Acts as the base station and is connected to the wired network Multiple access points allow ease of roaming (See Figure 5-22) Security Awareness: Applying Practical Security in Your World

Components of a WLAN (continued) Security Awareness: Applying Practical Security in Your World

Security in a WLAN WLANs include a different set of security issues Steps to secure: Turn off broadcast information MAC address filtering WEP encryption Password protect the access point Physically secure the access point Use enhanced WLAN security standards whenever possible Security Awareness: Applying Practical Security in Your World

Summary A computer network allows users to share hardware, programs and data. Two types of computer networks are: Local area network (LAN)  computers all close together Wide area network (WAN)  Computers geographically dispersed On most networks, each computer or device must be assigned a unique address called the IP address. Security Awareness: Applying Practical Security in Your World

Summary (continued) Hackers attacks network perimeters in several ways: Denial of Service (DoS) Distributed Denial of Service (DDoS) Man-in-the-Middle Spoofing Security Awareness: Applying Practical Security in Your World

Summary (continued) There are devices that can be installed to make the network perimeter more secure. Firewalls Hardware or software based Intrusion-detection system (IDS) Host-based or network-based Network Address Translation (NAT) Proxy server Security Awareness: Applying Practical Security in Your World

Summary (continued) Network security can be enhanced by its design. Single point of entry is best, but hard to maintain Technologies frequently used to enhance secure network design: Demilitarized zones (DMZ) Virtual private networks (VPNs) Honeypots Security Awareness: Applying Practical Security in Your World

Summary (continued) Wireless local area networks are becoming increasingly common. Two basic components: Wireless network interface card (WNIC) Access point (AP) Securing a WLAN requires additional steps beyond those required for a wired network. Security Awareness: Applying Practical Security in Your World