Chapter 5
Chapter 5
Transmission Control -Most common protocol suite used for local area networks and the Internet
Protocol/Internet Protocol
(TCP/IP) -Comprises several protocols that all function together
IP -Protocol that functions primarily at Open Systems Interconnection (OSI) Network Layer (Layer 3)
Simple Network Management Protocol Domain Name System (DNS) File transfer Protocol
(SNMP)
A TCP/IP protocol that maps IP addresses
-Used to manage network equipment and to their symbolic name -TCP/IP protocol used for transferring files
is supported by most network equipment
manufacturers -The DNS database is organized as a -File transfer protocol (FTP) – an unsecure
hierarchy protocol used to connect to an FTP server
-Allows administrators to remotely
monitor, manage, and configure network -Database consists of the name of a site -Methods for using FTP on local host computer
devices and a corresponding IP number • From a command prompt
• Using a web browser
-Functions by exchanging management -The database is distributed to many • Using an FTP client
information between network devices different servers on the Internet
• To prevent bottlenecking and to -Using FTP behind a firewall can present
-Each SNMP-managed device has an ensure efficiency challenges
agent or a service • FTP uses two ports
-DNS is often the focus of attacks • Port 21 is the FTP control part
-Listens for and executes commands • Port 20 is the data port
-DNS poisoning substitutes fraudulent IP • FTP active mode
Agents are password protected address
• Client’s firewall may sometimes drop
• Password is known as a packets on Port 20 (the data channel
community string -Can be done in local host table or external
connection)
DNS server
• FTP passive mode
Security vulnerabilities were present in S
• The client sends a PASV command to
M N P versions 1 and 2 -Can be thwarted by using Domain Name
the command channel and the server
• Version 3 uses usernames and System Security Extensions (DNSSEC)
responds with the TCP port number to
passwords along with
use to establish the data channel
encryption to address -DNSSEC adds additional resource records
vulnerabilities and message header information which can
-FTP vulnerabilities
be used to verify the requested data has not
been altered in transmission • Does not use encryption
• Files transferred using FTP are
-Attacker asks the valid DNS for a zone vulnerable to man-in-the-middle attacks
transfer
-Secure transmission options over FTP
-A zone transfer allows attacker access to • Secure sockets layer (FTPS) encrypts
network, hardware, and operating system commands
information
• Uses SSL or TLS to encrypt commands
sent over the control port (port 21); data
port may not be encrypted
Aggregation switch -used to combine multiple network connections into a single link
-Should be located between routers and servers where they can detect and stop attacks directed at a
server or application
Correlation engine -aggregates and correlates content from different sources to uncover an attack
-Should be in the protected internal network using data collected from the logs of different hardware
devices
DDoS mitigator -a hardware device that identifies and blocks real-time distributed denial of service (DDoS) attacks
-Should be in the network where they can monitor the largest stream of data
Analyzing security data
Security logs Can reveal types of attacks that are being directed at the network and if attacks were
successful
Event logs -Document any unsuccessful events and the most significant successful events
• Logs can provide documentation that the organization is complying with laws and regulatory requirements
Data from security devices – Almost every hardware device designed for security can generate logs
-DEP events and those from similar software can be logged along with the level of severity
Removable media control Removable media control is a tool that can be used to Removable media can introduce malware into a
restrict which removable media can be attached to a system and be used to steal valuable
system information
Advanced malware Often a third-party service, advanced malware Advanced malware management tools often
management management tools monitor a network for any unusual use experience-based techniques such as
activity heuristic monitoring to determine if a threat
exists
1. Cloud computing
On-premises model
-Enterprises in the past purchased all the hardware and software necessary to run the organization
-Resulted in spiraling costs
Hosted services
-Servers, storage, and the supporting networking infrastructure are shared by multiple enterprises over a remote network connection
Cloud computing
-A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources
-It is a pay-per-use computing model
• Customers pay for only the resources they need
• Types of clouds
o Public cloud
o Community cloud
o Private cloud
o Hybrid cloud
-Four service models in cloud computing:
Software as a Service (SaaS) = Vendor provides access to the vendor’s software applications running on a cloud infrastructure
Platform as a Service (PaaS) =Consumers install and run their own specialized applications on the cloud computing network
Infrastructure as a Service (IaaS)=Vendor allows customers to deploy and run their own software, including OS s and applications
Security as a Service (SECaaS)= All security services are delivered from the cloud to the enterprise
-Virtualizes parts of the physical network so that it can be more quickly and easily reconfigured
-Accomplished by separating the control plane from the data plane
-A means of managing and presenting computer resources without regard to physical layout or location
Host virtualization
-Holds only the necessary OS components that are needed for that specific application to run
-Reduces the necessary hard drive storage space and RAM needed
-Allows for containers to start more quickly because the OS does not have to be started
Advantages :
-New virtual server machines can be made available (host availability) and resources can easily be expanded or contracted as needed
(host elasticity)
-Can reduce costs as Fewer physical computers must be purchased and maintained
-Can provided uninterrupted server access to users as it Supports live migration which allows a virtual machine to be moved to a
different physical computer with no impact to users
-Test latest security updates by downloading on a virtual machine before installing on production computers
-A snapshot of a particular state of a virtual machine can be saved for later use
-Testing the existing security configuration (security control testing) can be performed using a simulated network environment
-A suspicious program can be loaded into an isolated virtual machine and executed (sandboxing)
- If malware, only the virtual machine will be impacted
-Not all hypervisors have the necessary security controls to keep out attackers
-Existing security tools were designed for single physical servers
-VMs must be protected from both outside networks and other V M s on the same physical computer
-VMs may be able to “escape” from the contained environment and directly interact with the host OS
-Important to have virtual machine escape protection
-Virtual machine sprawl
- The widespread proliferation of V M s without proper oversight or management