990 likes | 1.3k Views
Network Security and Firewalls. Lesson 1: What Is Security. Objectives. Define security Explain the need for network security Identify resources that need security Identify the two general security threat types List security standards and organizations. What Is Security?. LANs WANs VPNs
E N D
Objectives • Define security • Explain the need for network security • Identify resources that need security • Identify the two general security threat types • List security standards and organizations
What Is Security? • LANs • WANs • VPNs • Network perimeters
Hacker Statistics • One of every five Internet sites has experienced a security breach • Losses due to security breaches are estimated at $10 billion each year • Intrusions have increased an estimated 50 percent in the past year
What Is the Risk? • Categorizing attacks • Countering attacks systematically
The Myth of 100-Percent Security • Security as balance • Security policies
Attributes of anEffective Security Matrix • Allows access control • Easy to use • Appropriate cost of ownership • Flexible and scalable • Superior alarming and reporting
What You AreTrying to Protect • End user resources • Network resources • Server resources • Information storage resources
Who Is the Threat? • Casual attackers • Determined attackers • Spies
Security Standards • Security services • Authentication • Access control • Data confidentiality • Data integrity • Nonrepudiation • Security mechanisms • The Orange Book
Summary • Define security • Explain the need for network security • Identify resources that need security • Identify the two general security threat types • List security standards and organizations
Objectives • Formulate the basics of an effective security policy • Identify the key user authentication methods • Explain the need for access control methods • Describe the function of an access control list
Objectives (cont’d) • List the three main encryption methods used in internetworking • Explain the need for auditing
Elements of Security Audit Administration Encryption Access Control User Authentication Corporate Security Policy
The Security Policy • Classify systems • Prioritize resources • Assign risk factors • Define acceptable and unacceptable activities • Define measures to apply to resources • Define education standards • Assign policy administration
Encryption • Encryption categories • Symmetric • Asymmetric • Hash • Encryption strength
Authentication • Authentication methods • Proving what you know • Showing what you have • Demonstrating who you are • Identifying where you are
SpecificAuthentication Techniques • Kerberos • One-time passwords
Access Control • Access Control List • Objects • Execution Control List • Sandboxing
Auditing • Passive auditing • Active auditing
Security Tradeoffsand Drawbacks • Increased complexity • Slower system response time
Summary • Formulate the basics of an effective security policy • Identify the key user authentication methods • Explain the need for access control methods • Describe the function of an access control list
Summary (cont’d) • List the three main encryption methods used in internetworking • Explain the need for auditing
Objectives • Create a trust relationship using public-key cryptography • List specific forms of symmetric, asymmetric, and hash encryption • Deploy PGP in Windows 2000 and Linux
Creating Trust Relationships • Manually • Automatically
Rounds, Parallelizationand Strong Encryption • Round • Discrete part of the encryption process • Parallelization • Use of multiple processes, processors or machines to work on cracking one encryption algorithm • Strong encryption • Use of any key longer than 128 bits
Symmetric-KeyEncryption • One key is used to encrypt and decrypt messages
Data encryption standard Triple DES Symmetric algorithms created by the RSA Security Corporation International Data Encryption Algorithm Blowfish and Twofish Skipjack MARS Rijndael and Serpent Advanced Encryption Standard SymmetricAlgorithms
Asymmetric Encryption • Asymmetric-key encryption elements • RSA • DSA • Diffie-Hellman
Hash Encryption • Signing • Hash algorithms • MD2, MD4, and MD5 • Secure hash algorithm
AppliedEncryption Processes • E-mail • PGP and GPG • S-MIME • Encrypting drives • Web server encryption
Summary • Create a trust relationship using public-key cryptography • List specific forms of symmetric, asymmetric, and hash encryption • Deploy PGP in Windows 2000 and Linux
Objectives • Describe specific types of security attacks • Recognize specific attack incidents
Brute-Force andDictionary Attacks • Brute-force attack • Repeated access attempts • Dictionary attack • Customized version of brute-force attack
System Bugs and Back Doors • Buffer overflow • Trojans and root kits
Social Engineeringand Nondirect Attacks • Call and ask for the password • Fraudulent e-mail • DOS and DDOS attacks • Spoofing • Trojans • Information leakage • Hijacking and man-in-the-middle attacks
Summary • Describe specific types of security attacks • Recognize specific attack incidents
Objectives • Describe the universal guidelines and principles for effective network security • Use universal guidelines to create effective specific solutions
Be paranoid Have a security policy No system stands alone Minimize the damage Deploy companywide enforcement Provide training Integrate security strategies Place equipment according to needs Identify security business issues Consider physical security CommonSecurity Principles
Summary • Describe the universal guidelines and principles for effective network security • Use universal guidelines to create effective specific solutions
Objectives • List the protocols that pass through a firewall • Identify potential threats at different layers of the TCP/IP stack
TCP/IP andNetwork Security • The Internet and TCP/IP were not designed around strong security principles
The TCP/IP Suite andthe OSI Reference Model • Physical layer • Network layer • Transport layer • Application layer • Presentation layer • Session layer • Data link layer
TCP/IPPacket Construction Application Message: e-mail, FTP, Telnet TCP Segment Header Body IP Datagram Header Body Ethernet Frames Header Body Trailer