1.48k likes | 1.52k Views
Security Network Architecture & Design. Domain Objectives. Discuss the concepts of network security Understand security risks Provide the business context for network security. Availability. Information Security. Confidentiality. Integrity. Information Security TRIAD. Domain Agenda.
E N D
Domain Objectives • Discuss the concepts of network security • Understand security risks • Provide the business context for network security
Availability Information Security Confidentiality Integrity Information Security TRIAD
Domain Agenda • Basic Concepts • OSI Framework
Network & Telecommunications • Network Security • Network Structures • Transmission Methods • Transport Formats • Security Measures • Network Security is the cornerstone for business operations
Network Models • Models • OSI Reference Model • TCP/IP Model
Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer OSI Reference Model • Layer 1: Physical Layer • Layer 2: Data Link Layer • Layer 3: Network Layer • Layer 4: Transport Layer • Layer 5: Session Layer • Layer 6: Presentation Layer • Layer 7: Application Layer
OSI Reference Model • Encapsulation • Layering
OSI Model Layer 1: Physical Layer • Bits are converted into signals • All signal processing • Physical Topologies Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer
OSI Model Layer 2: Data Link Layer • Connects layer 1 and 3 • Converts information • Transmits frames to devices • Link Layer encryption Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Physical Layer Physical Layer
OSI Model Layer 3: Network Layer • Moves information between two hosts that are not physically connected • Uses logical addressing • Internet Protocol (IP) Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Physical Layer Physical Layer
OSI Model Layer 4: Transport Layer • End-to-end Transport between Peer Hosts • Connection Oriented and Connectionless Protocols Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Physical Layer Physical Layer
OSI Model Layer 5: Session Layer • Manages logical persistent connection • Three Modes • Full Duplex • Half Duplex • Simplex Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Physical Layer Physical Layer
OSI Model Layer 6: Presentation Layer • Ensures a common format to data • Services for encryption and compression Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Physical Layer Physical Layer
OSI Model Layer 7: Application Layer • The application layer is not the application • Performs communication between peer applications • Least control of network security Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Physical Layer Physical Layer
TCP/IP Model • Originated by the U.S. Department of Defense • Functions like the OSI Model • Supports the TCP/IP Protocol • Application layer is unique
Application Layer Application Layer Presentation Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Data Link Layer Data Link Layer Physical Layer Physical Layer TCP/IP Model
Application Layer Transport Layer Network Layer Data Link Layer Physical Layer TCP/IP Protocol Stack Application TCP, UDP IP, IGMP, ICMP ARP, Hardware Interface, PPP Network Connection
Network Security and Risks • Network is the key asset in many organizations • Network Attacks
Network-based Attacks • Network as a Channel for Attacks • Network as the Target of Attack
Network as a Bastion of Defense • Security controls built around social, organizational, procedural and technical activities • Based on the organization's security policy
Network Security Objectives and Attacks • Business Risk versus Security Solutions • Attacks Scenarios • Network Entry Point - in Both Directions • Outside-in • Inside-out
Methodology of an Attack • Attack Trees • Path of Least Resistance Methodology of an Attack 1 2 3 4 Target Acquisition Target Analysis Target Access Target Appropriation
Target Acquisition 1 • Attacks start by intelligence gathering • Means of intelligence gathering • Countermeasures • Limit information on a network • Distract an attacker
Target Analysis 2 • Analyze identified target for security weaknesses • Tools available • Target analysis
Target Access 3 • Obtain access to the system • Manage user privileges • Monitor access
Target Appropriation 4 • Escalate privileges • Attacker may seek sustained control of the system • Countermeasures against privilege escalation
Network Security Tools • Tools automate processes • Network security is more than just technical implementations
Network Scanners • Discovery Scanning • Compliance Scanning • Vulnerability Scanning
Domain Agenda • Basic Concepts • OSI Framework • Layer 1: Physical Layer
Layer 1: Physical Layer • Basic Concepts • Communications Technology • Network Topology • Technology and Implementation
Communication Technology • Analog and Digital Communications • Digital communication brings quantitative and qualitative enhancements
Analog Communication • Analog signals use electronic properties • Transmitted on wires or with wireless devices
Digital Communication • Uses two electronic states • Can be transmitted over most media • Integrity of digital communication less difficult
Layer 1: Physical Layer • Basic Concepts • Communications Technology • Network Topology • Technology and Implementation
Network Topology • Even small networks are complex • Network topology and layout affects scalability and security • Wireless networks have a topology
Bus • LAN with a central cable to which all nodes connect • Advantages • Scalable • Permits node failure • Disadvantages • Bus failure
Tree • Devices connect to a branch on the network • Advantages • Scalable • Permits node failure • Disadvantages • Failures will split the network
Ring • Closed-loop Topology • Advantages • Deterministic • Disadvantages • Single Point of Failure
Mesh • All nodes are connected with each other • Advantages • Redundancy • Disadvantages • Expensive • Complex • Scalability
Star • All of the nodes connected to a central device • Advantages • Permits node/cable failure • Scalable • Disadvantages • Single point of failure
Security Perimeter • The first line of defense between trusted and un-trusted networks • No direct physical connection between trusted and untrusted networks • Security perimeter most widely used implementation of network partitioning
Layer 1: Physical Layer • Basic Concepts • Communications Technology • Network Topology • Technology and Implementation
Technology and Implementation • Physical networks employ a wide variety of cabling technologies and components • Wireless networks use frequency ranges and encryption/authentication
Cable • Cable Selection Considerations • Throughput • Distance between Devices • Data Sensitivity • Environment Cable Twisted Pair Coaxial Cable Fiber Optics Patch Panels Modems
Twisted Pair • One of the Simplest and Cheapest Cabling Technologies • Unshielded (UTP) or Shielded (STP)
Coaxial Cable (Coax) • Conducting wire is thicker than twisted pair • Bandwidth • Length • Expensive and physically stiff
Fiber Optics • Three Components • Light Source • Optical Fiber Cable • Light Detector • Advantages • Disadvantages
Patch Panels • Provides physical cross-connect point for devices • Alternative to directly connecting devices • Centralized management