220 likes | 230 Views
Learn about policy basics, ARP spoofing, man-in-the-middle attacks, encryption, and securing access to data in network administration. Topics covered include symmetric key encryption, password security, and mitigations against ARP spoofing.
E N D
Nov 9 2015 CTC228
Administrative • Required 2nd exam will be next week on Wed Nov 18th • It will be short (around 10 questions) • It will only cover chapters 8 and 9 • We will review on Mon Nov 16th • It will count as a class project • NO SCHOOL WED NOV 11th
Topics • Policy basics • ARP Spoofing and Man-In-The-Middle
Chapter 10: Security Policies * • A policy is a human-language document that describes who can access what. • In order to write it, you need to know: • WHAT you are trying to protect • WHO you are trying to protect it from • Notice we don't mention specifically HOW STUFF WILL BE PROTECTED in the policy • A mechanism is something that enforces a policy
Is it a policy or a mechanism? • 1. All user email accounts must have a good, strong password. • 2. Bank customers are not allowed to withdraw money from other customers' accounts. • 3. Facebook users must re-login every 5 minutes.
Physical Security • Must have it • If adversary can physically access your computer, it is no longer your computer
Securing Access to Data • Identification and Authentication • Login/password • Encryption • Scramble data so that only some can read it • Firewalls • Block traffic to or from certain places
Passwords • Make sure they are long (right now, at least 8 characters) • Make sure they use more than just letters • Make sure they are changed sometimes • However, don't be too aggressive with hard passwords or else users will just write them down on a post-it note.
Encryption • Much network traffic is “in the clear” by default • Encryption scrambles data so that only someone with the “key” can unscramble and read it • Only component kept secret is the key, not the encryption algorithm itself • Two types of encryption: Symmetric and Public Key
Warning • Do any sort of attack over a network can land you in jail or get you kicked out of school.
Arp Spoofing: Lying about your IP address • If you can respond to the ARP request faster than a legitimate host, you can send a falsified (called “spoofed”) reply (sometimes called ARP poisoning) • Will allow you to see all traffic being sent to that host • Can be performed on two victims simultaneously to create a “Man-In-The-Middle” (MITM) scenario
Some Mitigations • Static ARP entries • Not very flexible • Keep bad guys off your internal network • Can be hard to do • Private VLANs • Basically set up each physical port on the switch as its own isolated network • Requires hardware that supports this
Nov 9 Group projects • In groups, answer the following questions and email to rspengler@csudh.edu • Answer each in few paragraphs. • 1. There is a school policy that says all students must do their own homework and cannot share work. Alice completes her homework and stores it on a class computer in her private directory. Bob uses the class computer and notices he is able to read Alice's files. Bob copies Alice's homework into his own directory. Since Bob was able to copy the file, was there a breach of the policy? Why or why not? • Bonus question: Would ARP spoofing work across the Internet? Could a remote attacker create a MITM situation between your home computer and your home router? Why or why not?