Security in Networks— Their design, development, usage… Barbara Endicott-Popovsky CSSE592/491 In collaboration with: Deborah Frincke, Ph.D. Director, Center.

Slides:



Advertisements
Similar presentations
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Advertisements

Security and Systems. Three tenets of security Confidentiality Integrity Availability.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security+ Guide to Network Security Fundamentals
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Firewalls and Intrusion Detection Systems
IS Network and Telecommunications Risks
7.3 Network Security Controls 1Network Security / G.Steffen.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Chapter 2 Networking Overview. Figure 2.1 Generic protocol layers move data between systems.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Chapter Threats in Networks Network Security / G. Steffen.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Chapter 7 Security in Networks. Figure 7-1 Simple View of Network.
Securing Information Systems
Week 10 - Wednesday.  What did we talk about last time?  Network basics.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
FIREWALL Mạng máy tính nâng cao-V1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Internet Security facilities for secure communication.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Got Security? Information Assurance Considerations for Your Research, Course Projects, and Everyday Life James Cannady, Ph.D. Assistant Professor.
C8- Securing Information Systems
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Software Security Testing Vinay Srinivasan cell:
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Securing Wired Local Area Networks(LANs)
Chapter 4 Application Level Security in Cellular Networks.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
ACM 511 Introduction to Computer Networks. Computer Networks.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Security in Computing Security in Networks. I.Threats in networks A. Vulnerabilities 1.Anonymity 2.Shared resources 3.Size (many points of attack) 4.Complexity.
Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Security in Networks Single point of failure Resillence or fault tolerance CS model.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
CSCE Farkas1 CSCE 522 Network Security. Reading Pfleeger and Pfleeger: Chapter 6 CSCE Farkas2.
Security in network Outline Threats in network Network security controls Firewalls Intrusion detection system Secure Networks and Cryptography Example.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
CHAPTER 6 Security in Networks 1. Objectives  differentiate the security needs in the network and in single,stand alone application and environment 
Week 9 - Wednesday.  What did we talk about last time?  Network basics.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Securing Interconnect Networks By: Bryan Roberts.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
AGENDA:  I.The Basics  II. Threats  III. Controls  IV.Tools Source: Pfleeger & Pfleeger.
What Makes a Network Vulnerable?
Threats in Networks Jagdish S. Gangolly School of Business
Advanced Computer Networks
Session 20 INST 346 Technologies, Infrastructure and Architecture
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Security in Networks— Their design, development, usage… Barbara Endicott-Popovsky CSSE592/491 In collaboration with: Deborah Frincke, Ph.D. Director, Center for Secure and Dependable Systems University of Idaho

 Both broad survey and focused  Chapters 1-2 lay groundwork  Chapters 3 –7 Software Chapter 7 –Contrast to standalone environments –Threats –Controls –Tools: Firewalls, Intrusion detection, Secure  Chapter 9 Privacy, ethics, the law  Chapter 10 Cryptography – the how Text Book

In this section of the course we will look at…  Networks— their design, development, usage The Basics Threats Controls Tools Firewalls Intrusion Detection Secure Source: Pfleeger & Pfleeger

Agenda  I.The Basics  II. Threats  III. Controls  IV.Tools Source: Pfleeger & Pfleeger

 Terms Topology Media Analog/digital Protocols LAN/WAN Internet Distributed System API’s I. The Basics Source: Pfleeger & Pfleeger

ISO/OSI Model Source: Pfleeger & Pfleeger OSI Layer NameActivity 7Application User-level data 6Presentation Standardized data appearance 5Session Logical connection among parts 4Transport Flow control 3Network Routing 2Data Link Reliable data deliver6y 1Physical Actual communication across physical medium

TCP/IP vs. OSI Source: Pfleeger & Pfleeger OSI Layer NameActivity 7Application User-level data 6Presentation Standardized data appearance 5Session Logical connection among parts 4Transport Flow control 3Network Routing 2Data Link Reliable data deliver6y 1Physical Actual communication across physical medium

TCP/IP Source: Pfleeger & Pfleeger LayerActionResponsibilities Application Prepare messagesUser interaction, addressing Transport Convert messages to packets Sequencing, reliability, error connection Internet Convert messages to datagrams Flow control, routing Physical Transmit datagrams as bits Data communication

Issues  ISO/OSI: Slows things down  TCP/IP: More efficient Open  Results: TCP/IP used over Internet Introduces security issues Source: Pfleeger & Pfleeger NOTE: Study this part of the Chapter

II. Threats  Vulnerabilities  Attackers  Threats Precursors In transit Protocol flaws Impersonation Spoofing Message Confidentiality / Integrity threats Web Site Defacement Denial of Service (DOS) Distributed Denial of Service (DDOS) Active or Mobile Code Threats Complex Attacks Source: Pfleeger & Pfleeger

Vulnerabilities  Anonymity  Many points of attacks—targets and origins  Sharing  Complexity of system  Unknown perimeter  Unknown path Source: Pfleeger & Pfleeger

Attackers  Kiddiescripters  Industrial spies  Information warfare  Cyber terrorists  “Hactivists”  Wardrivers, etc. Profile—see Mittnick Source: Pfleeger & Pfleeger

Threat Spectrum Source: Deb Frincke

From CSI/FBI Report % detected computer security breaches 80% acknowledged financial losses 44% (223) were willing / able to quantify losses: $455M Most serious losses: theft of proprietary information and fraud 26 respondents: $170M 25 respondents: $115M 74% cited Internet connection as a frequent point of attack 33% cited internal systems as a frequent point of attack 34% reported intrusions to law enforcement. (up from 16%-1996) Source: Deb Frincke

More from CSI/FBI 2002  40% detected external penetration  40% detected DOS attacks.  78% detected employee abuse of Internet  85% detected computer viruses.  38% suffered unauthorized access on Web sites  21% didn’t know.  12% reported theft of information.  6% reported financial fraud (up from 3% ). Source: Deb Frincke

Threats: Precursors  Port Scan  Social Engineering  Reconnaissance  OS Fingerprinting  Bulletin Boards / Chats  Available Documentation Source: Pfleeger & Pfleeger

Threats: In Transit  Packet Sniffing  Eavesdropping  Wiretapping  Microwaves  Satellites  Fiber  Wireless Source: Pfleeger & Pfleeger

Threats: Protocol Flaws Source: Pfleeger & Pfleeger  Public protocols  Flaws public  Human errors

Threats: Impersonation Source: Pfleeger & Pfleeger  Guessing  Stealing  Wiretapping  Eavesdropping  Avoid authentication  Nonexistent authentication  Known authentication  Trusted authentication  Delegation  MSN Passport

Threats: Spoofing Source: Pfleeger & Pfleeger  Masquerade  Session hijacking  Man-in-the Middle attack

Threats: Message Confidentiality/Integrity Source: Pfleeger & Pfleeger  Misdelivery  Exposure  Traffic flow analysis  Falsification of messages  Noise

Threats: Web Site Defacement Source: Pfleeger & Pfleeger  Buffer overflows  Dot-Dot and address problems  Server-Side include

Threats: Denial of Service (DOS) Source: Pfleeger & Pfleeger  Transmission failure  Connection flooding  Echo-chargen  Ping of death  Smurf attack  Syn flood  Traffic redirection  DNS attack  BIND Service

Threats: Distributed Denial of Service (DDOS) Source: Pfleeger & Pfleeger  Trojan horses planted  Zombies attack

Threats: Active/Mobile Code (Code Pushed to the Client) Source: Pfleeger & Pfleeger  Cookies  Per-session  Persistent  Scripts  Active code  Hostile applet  Auto Exec by type

Threats: Complex Attacks Source: Pfleeger & Pfleeger  Script Kiddies  Building Blocks

III. Controls  Design  Architecture Segmentation Redundancy Single points of failure  Encryptions Link encryption End-to-end encryption VPN’s PKI and Certificates SSH and SSL encryption IPSec Signed code Encrypted Source: Pfleeger & Pfleeger

Controls (cont’d.)  Content Integrity Error correcting codes Cryptographic Checksum  Strong Authentication One-time password Challenge-Response systems Digital distributed authentication Kerberos  Access controls ACL’s on routers Firewalls  Alarms and Alerts  Honeypots  Traffic Flow Security Onion routing Source: Pfleeger & Pfleeger

IV. Tools  Firewalls  Intrusion Detection Systems  Secure Source: Pfleeger & Pfleeger

Firewalls  Packet filtering gateway  Stateful inspection firewall  Application proxy gateway  Guard  Personal firewalls Source: Pfleeger & Pfleeger

Intrusion Detection Systems  Signature-based IDS  Heuristic IDS  Stealth mode Source: Pfleeger & Pfleeger

IDS Characteristics  Goals Detect all attacks Little performance impacts  Alarm response Monitor and collect data Protect Call administrator  Limitations Avoidance strategies Sensitivity Only as good as the process/people Source: Pfleeger & Pfleeger

Secure  Designs Confidentiality—encryption Message integrity checks  Examples PGP S/MIME Source: Pfleeger & Pfleeger