Data Communications Chapter 7 Network Security
Data Communications Chapter 7 Network Security
Chapter 7
Network Security
BITS College
COMPTIA Network+ study book (Mike Harwood, Drew Bird. Chapter 8 and
9Page 215 to 270 )
CompTIA Network+ Chapter 14 (by Tamara Dean , page 519… )
Computer and Information Security Handbook (John R. Vacca)
Basic IT Security
Information security deals with the matters of policy, strategy, and
processes that are necessary to establish the overall security posture of an
organization
It is a measures and controls that ensure confidentiality, integrity, and
availability of information system assets or resources.
Basic IT Security
A hacker, in the original sense of the word, is someone who masters the inner
workings of computer hardware and software in an effort to better understand
them. To be called a hacker used to be a compliment, reflecting extraordinary
computer skills. Those who use their computer skills to destroy data or
systems are technically considered crackers.
Risks Associated with Internet Access …
Common Internet-related security issues include the following:
o A firewall may not be adequate protection, if it is configured improperly or
not be configured correctly to perform even its simplest function—preventing
unauthorized packets from entering the LAN from outside.
o When a user Telnets or FTPs to your site over the Internet, his user ID and
password are transmitted in plain text—that is, unencrypted. Anyone
monitoring the network.
o Hackers may obtain information about your user ID from newsgroups, mailing
lists, or forms you have filled out on the Web.
o While users remain logged on to Internet chat sessions, they may be vulnerable
to other Internet users who might send commands to their machines that cause
the screen to fill with garbage characters and require them to terminate their
chat sessions. This type of attack is called flashing.
o After gaining access to your system through the Internet, a hacker may launch
denialof-service attack
Security Policy
Network security breaches can be initiated from within an organization,
and many take advantage of human errors.
To minimize this risk, communicating with and managing the users in your
organization via a thoroughly planned security policy is important.
A security policy identifies your security goals, risks, levels of authority,
designated security coordinator and team members, responsibilities for
each team member, and responsibilities for each employee.
Typical goals for security policies are as follows:
o Ensure that authorized users have appropriate access to the resources they
need.
o Prevent unauthorized users from gaining access to the network, systems,
programs, or data.
o Protect sensitive data from unauthorized access, both from within and from
outside the organization.
o Prevent accidental damage to hardware or software. Prevent intentional
damage to hardware or software.
o Create an environment in which the network and systems can withstand and, if
necessary, quickly respond to and recover from any type of threat.
o Communicate each employee's responsibilities with respect to maintaining data
integrity and system security.
Security in Network Design
The two important Elements of Network security strategy are the
use of proxy and firewall system.
Firewall
A firewall is a specialized device, or a computer installed with specialized
software, that selectively filters or blocks traffic between networks.
A firewall typically involves a combination of hardware and software and
may reside between two interconnected private networks such as between
a private network and a public network.
A firewall system acts as a protective layer to network access by
controlling the traffic that passes between the interfaces on the system.
Packet filtering firewalls
The most common form of firewall is a packet-filtering firewall, which
examines the header of every packet of data that it receives to determine
whether that type of packet is authorized to continue to its destination. IT
deals with Packets at Datalink and Network layers of the OSI model.
The following are some of the criteria by wich packet filtering can be
implemented:
o IP addressing: allow or deny IP addresses
o Port Number:
o Protocol ID:
o MAC address:
Circuit Level Firewall
Circuit level firewalls are similar in operation to packet-filtering firewalls,
but they operate at the transport and session layer of the OSI model.
The biggest difference is that at this level the firewall validates TCU and
UDP session before opening the connection, or the circuit ,through the
firewall.
Application Gateway Firewalls
The application gateway firewall is the most functional of all the firewall
types. As its name suggests, the application gateway firewall functionality
is implemented through an application. It can implement sophisticated
rules and closely control traffic that passes through. Features of these
firewalls can include user authentication system and capability to control
which systems an outside user can access on the internal network.
Proxy Servers
Proxy server allow you centralize access to the Internet and therefore provide a way to
control and monitor network access.
One approach to enhancing the security of the Network and Transport layers provided by
firewalls is to combine a packet-filtering firewall with a proxy service.
A proxy service is a software application on a network host that acts as an intermediary
between the external and internal networks, screening all incoming and outgoing traffic.
The network host that runs the proxy service is known as a proxy server.
Proxy servers manage security at the Application layer of the OSI Model..
Proxy server.
A proxy server is like a computer on the web that redirects your web
browsing activity. A proxy server acts as a gateway between you and the
internet. It’s like a middle agent server that sits between end users from
the websites they browse. A Proxy server provides security, functionality
and privacy depending on your needs and company policy.
o Squid Proxy : Server is a caching proxy that supports protocols like HTTP,
HTTPS and FTP.
o Priory: is a regular or non caching web proxy with advanced filtering
capabilities for ensuring privacy.
o SwiperProxy: a fast, open source web proxy that is easy to run, administer, and
customize. It is built on efficient Python code that helps it optimally run its
self contained minimalist webserver.
Firewall and Proxy servers
Often, firewall and proxy server features are combined in one device. In
other words, you might purchase a firewall and be able to configure it not
only to block certain types of traffic from entering your network, but also
to modify the addresses in the packets leaving your network.
Threats and vulnerabilities
Threat is any incident that negatively affect an asset, while attack is an
offensive maneuver.
A vulnerability is a weakness in a system, week implementation that could
be exploited.
Asset : any device or data that is valuable to organization (HW, SW,
information, infrastructure)
o Access to the data must be controlled (protection)
o access to the computer facility must be controlled ( authentication)
o Sensitive data must be secured ( file security)
o Data must be securely transmitted across network ( network security)
Threats and vulnerabilities
Network attack can be classified as passive and active
o passive : eavesdropping
o active: modification of data or falsification: reply, masquerade, dos,
modification of message, man-in-the-midl
Common Threats - Virus
malware (malicious software) designed to inflict damage,