Introduction To Network Security - Part 1
Introduction To Network Security - Part 1
1 of 5
Home
http://www.firewall.cx/general-topics-reviews/security-articles/267-n...
Networking Topics
News
Cisco KnowledgeBase
Linux Tutorials
Recommendations
Hot Downloads
Recommended Websites
Microsoft KB
Security Articles
search...
Firewall.cx Newsletter
Home
Downloads
Search
Site Related
Written by Administrator
Name
Article Index
Introduction To Network Security - Part 1
***************
Firewall.cx Forums
All Pages
Community Forums
Tweet
Facebook Fans
Introduction
Firewall.cx
Like
2,016
Like
Send
Hacker or Cracker?
Download Your Free
Network Scanner
There is a very well worn out arguement against using the incorrect use of the word 'hacker' to denote a computer criminal -- the correct term
is a 'cracker' or when referring to people who have automated tools and very little real knowledge, 'script kiddie'. Hackers are actually just
very adept programmers (the term came from 'hacking the code' where a programmer would quickly program fixes to problems he faced).
While many feel that this distinction has been lost due to the media portraying hackers as computer criminals, we will stick to the original
definitions through these articles more than anything to avoid the inevitable flame mail we will get if we don't !
On to the Cool Stuff!
This introduction is broadly broken down into the following parts :
System Login
Username
Password
Remember Me
Recommended Downloads
-
Web Security
Server AntiSpam
Network Scanner
IDS Security Manager
Web-Proxy Monitor
FTP / TFTP Servers
Cisco VPN Client
Network Fax Server
The script kiddie can later use this vast collection of 'owned' systems to launch a denial of service (DoS) attacks, or just cover his tracks by
hopping from one system to another in order to hide his real IP address.
This technique of proxying attacks through many systems is quite common, as it makes it very difficult for law enforcement to back trace the
route of the attack, especially if the attacker relays it through systems in different geographic locations.
It is very feasible -- in fact quite likely -- that your machine will be in the target range of such a scan, and if you haven't taken adequate
precautions, it will be owned.
The other threat comes from computer worms that have recently been the subject of a lot of media attention. Essentially a worm is just an
25/09/2013 7:47
2 of 5
More Articles
A Networked World:
New IT Security
Challenges
Introduction To
Network Security Part 2
Host-Based IDS vs
Network-Based IDS
(Part 2 - Comparative
Analysis)
Host-Based IDS vs
Network-Based IDS
(Part 1)
Combat Intruders with
LANguard S.E.L.M
What you Need to
Know About Intrusion
Detection Systems
Keeping IDS In-House
What Are IDSes & Why
Are They Worth
Having?
Web Monitoring for
Employee Productivity
Enhancement
Security Threats: A
Guide for Small &
Medium Businesses
http://www.firewall.cx/general-topics-reviews/security-articles/267-n...
exploit with a propagation mechanism. It works in a manner similar to how the script kiddie's automated tool works -- it scans ranges of IP
addresses, infects vulnerable machines, and then uses those to scan further.
Thus the rate of infection increases geometrically as each infected system starts looking for new victims. In theory a worm could be written
with such a refined scanning algorithm, that it could infect 100% of all vulnerable machines within ten minutes. This leaves hardly any time for
response.
Another threat comes in the form of viruses, most often these may be propagated by email and use some crude form of social engineering
(such as using the subject line "I love you" or "Re: The documents you asked for") to trick people into opening them. No form of network level
protection can guard against these attacks.
The effects of the virus may be mundane (simply spreading to people in your address book) to devastating (deleting critical system files). A
couple of years ago there was an email virus that emailed confidential documents from the popular Windows "My Documents" folder to
everyone in the victims address book.
So while you per se may not be high profile enough to warrant a systematic attack, you are what I like to call a bystander victim.. someone
who got attacked simply because you could be attacked, and you were there to be attacked.
As broadband and always-on Internet connections become commonplace, even hackers are targetting the IP ranges where they know they will
find cable modem customers. They do this because they know they will find unprotected always-on systems here that can be used as a base
for launching other attacks.
This person is often a network administrator, but invariably in the chaotic throes of day-to-day administration (yes we all dread user support
calls ! :) the security of the organisation gets compromised -- for example, an admin who needs to deliver 10 machines to a new department
may not password protect the administrator account, just because it saves him some time and lets him meet a deadline. In short, an
organisation is either serious about security issues or does not bother with them at all.
While the notion of 24/7 security may seem paranoid to some people, one has to understand that in a lot of cases a company is not specifically
targetted by an attacker. The company's network just happen to be one that the attacker knows how to break into and thus they get
targetted. This is often the case in attacks where company ftp or webservers have been used to host illegal material.
The attackers don't care what the company does - they just know that this is a system accessible from the Internet where they can store large
amounts of warez (pirated software), music, movies, or pornography. This is actually a much larger problem than most people are aware of
because in many cases, the attackers are very good at hiding the illegal data. Its only when the bandwidth bill has to be paid that someone
realises that something is amiss.
Firewalls
By far the most common security measure these days is a firewall. A lot of confusion surrounds the concept of a firewall, but it can basically be
defined as any perimiter device that permits or denies traffic based on a set of rules configured by the administrator. Thus a firewall may be as
simple as a router with access-lists, or as complex as a set of modules distributed through the network controlled from one central location.
The firewall protects everything 'behind' it from everything in front of it. Usually the 'front' of the firewall is its Internet facing side, and the
'behind' is the internal network. The way firewalls are designed to suit different types of networks is called the firewall topology.
Here is the link to a detailed explanation of different firewall topologies : Firewall.cx Firewall Topologies
You also get what are known as 'personal firewalls' such as Zonealarm, Sygate Personal Firewall , Tiny Personal Firewall , Symantec Endpoint
Security etc.
These are packages that are meant for individual desktops and are fairly easy to use. The first thing they do is make the machine invisible to
pings and other network probes. Most of them also let you choose what programs are allowed to access the Internet, therefore you can allow
your browser and mail client, but if you see some suspicious program trying to access the network, you can disallow it. This is a form of
'egress filtering' or outbound traffic filtering and provides very good protection against trojan horse programs and worms.
However firewalls are no cure all solution to network security woes. A firewall is only as good as its rule set and there are many ways an
attacker can find common misconfigurations and errors in the rules. For example, say the firewall blocks all traffic except traffic originating
from port 53 (DNS) so that everyone can resolve names, the attacker could then use this rule to his advantage. By changing the source port of
his attack or scan to port 53, the firewall will allow all of his traffic through because it assumes it is DNS traffic.
Bypassing firewalls is a whole study in itself and one which is very interesting especially to those with a passion for networking as it normally
involves misusing the way TCP and IP are supposed to work. That said, firewalls today are becoming very sophisticated and a well installed
firewall can severely thwart a would-be attackers plans.
It is important to remember the firewall does not look into the data section of the packet, thus if you have a webserver that is vulnerable to a
CGI exploit and the firewall is set to allow traffic to it, there is no way the firewall can stop an attacker from attacking the webserver because
it does not look at the data inside the packet. This would be the job of an intrusion detection system (covered further on).
Anti-Virus Systems
Everyone is familiar with the desktop version of anti virus packages like Norton Antivirus and Mcafee. The way these operate is fairly simple -when researchers find a new virus, they figure out some unique characteristic it has (maybe a registry key it creates or a file it replaces) and
25/09/2013 7:47
3 of 5
http://www.firewall.cx/general-topics-reviews/security-articles/267-n...
R E L A T E D A R T IC L E S
The New GFI EventsManager 2013 - Active Network and Server Monitoring
GFI EventsManager 7 Review
Why Anti-Virus Software is NOT Enough
Finding More Information
GFI WebMonitor 2012 Internet Web Proxy Review
25/09/2013 7:47