970 likes | 1.16k Views
SE571 Security in Computing. Chap 7: Security in Networks. This Chapter Examines…. Threats against networked applications, including denial of service, web site defacements, malicious mobile code, and protocol attacks
E N D
SE571Security in Computing Chap 7: Security in Networks
This Chapter Examines… Threats against networked applications, including denial of service, web site defacements, malicious mobile code, and protocol attacks Controls against network attacks: physical security, policies, procedures, and other technical controls SE571 Security in Computing Dr. Ogara
This Chapter Examines… Firewalls: design, capabilities, limitations Intrusion detection systems Private e-mail: PGP and S/MIME SE571 Security in Computing Dr. Ogara
Research: Top 5 Network Security Threats for 2011 • Users • Managed users • Employees/staff • Managed and unmanaged devices – Laptops, Smartphone • Unmanaged users • Guests • Contractors • Consultants • Business partners • (Source: Bradford Network, 2011) SE571 Security in Computing Dr. Ogara
Research: Top 5 Network Security Threats for 2011 • Mobile device proliferation • Smartphone – different models/different companies • Tablets/iPads • EBook • IP everything – exponential growth in IP devices • Surveillance camera • Card readers (Source: Bradford Network, 2011) SE571 Security in Computing Dr. Ogara
Research: Top 5 Network Security Threats for 2011 • Consumerization of IT • Consumer markets driving IT • Personal devices growing rapidly and must be supported by IT • Virtualization • Server applications in private cloud • Virtual desktop in virtual environment (Source: Bradford Network, 2011) SE571 Security in Computing Dr. Ogara
Research: Consumerization of IT Survey 2011 • Study sponsored by Dell KACE • 741 IT professionals participated • Employees using personal devices (87%) • Email • Calendar • CRM/ERP • Employees using Smartphone (80%) • Employees using personal PCs (69%) https://www.kace.com/resources/Consumerization-of-IT-Survey-2011 SE571 Security in Computing Dr. Ogara
Network Security What are we protecting? Why are we protecting ? What are assets? What are threats? What are the controls? SE571 Security in Computing Dr. Ogara
Network Assets • Network infrastructure • Applications programs • Data SE571 Security in Computing Dr. Ogara
Network Threats • Interception • Eavesdropping • Passive wiretapping • Modification • Active wiretapping • Falsification • Compromise of authenticity • Denial of service SE571 Security in Computing Dr. Ogara
Network Controls • Firewalls • Intrusion detection systems • Secure email SE571 Security in Computing Dr. Ogara
Terminologies Network – a collection of communicating hosts Node – single computing system in a network Link – connection between two hosts Host – single computer in a network A workstation - an end-user computing device, usually designed for a single user at a time SE571 Security in Computing Dr. Ogara
Terminologies Topology - the way a network is configured, in terms of nodes and connections Protocol – standard method for transmitting data and/or establishing communications between different devices Protocol stack – isa layered architecture for communications SE571 Security in Computing Dr. Ogara
Network SE571 Security in Computing Dr. Ogara
Protocols Two popular protocol stacks for implementing networks Open Systems Interconnection (OSI) Transmission Control Protocol and Internet Protocol (TCP/IP) SE571 Security in Computing Dr. Ogara
OSI Model Contains 7 layers Layers represent the different activities that must be performed for actual transmission of a message SE571 Security in Computing Dr. Ogara
OSI Network Model SE571 Security in Computing Dr. Ogara
OSI Protocol Layer Levels SE571 Security in Computing Dr. Ogara
OSI Protocol Layer Levels SE571 Security in Computing Dr. Ogara • What happens when you send message to yourfriend@somewhere.net? • Physical Layer • Data link • Network layer • Router sends message to destination router • Adds 2 headers (source and destination IP address)
OSI Protocol Layer Levels SE571 Security in Computing Dr. Ogara • Data link • Network Interface Card (NIC) provides physical address called MAC (Media Access Control) address • Two more headers added (source computer and router NIC address) • Structure is called frameand contains destination MAC, source MAC and data
OSI Protocol Layer Levels SE571 Security in Computing Dr. Ogara Data link
OSI Protocol Layer Levels SE571 Security in Computing Dr. Ogara • Network layer • Router sends message to destination router • Adds 2 headers (source and destination IP address) to data • These are called packets
TCP/IP Model • Common in most wide area network communications • Defined by protocols not layers although it is seen as 4 layers • Application • Transport • Internet • Physical SE571 Security in Computing Dr. Ogara
TCP/IP Model It denotes two models although used as a single acronym TCP implements a connected communications session on top of the more basic IP transport protocol SE571 Security in Computing Dr. Ogara
TCP/IP Model SE571 Security in Computing Dr. Ogara
TCP Protocol Records and checks correct sequencing of packets Retransmits missing or faulty packets Provides a stream of correct data in proper order to the invoking application Problem - retransmissions of faulty or missing packets take time and induce overhead SE571 Security in Computing Dr. Ogara
TCP Packet • Data structure • Includes a sequence number, an acknowledgment number for connecting the packets of a communication session, flags, and source and destination port numbers Port - unique channel number by which computers can route their respective packets to each of them SE571 Security in Computing Dr. Ogara
Internet Services SE571 Security in Computing Dr. Ogara
Local Area Networks (LAN) • Covers a small distance typically within a single building • Connects several small computers, such as personal computers, as well as printers and perhaps some dedicated file storage devices SE571 Security in Computing Dr. Ogara
Local Area Networks (LAN) SE571 Security in Computing Dr. Ogara
Wide Area Networks (WAN) • Single control – usually controlled by one organization • Covers a significant distance • Physically exposed Examples, campus area networks, metropolitan area networks SE571 Security in Computing Dr. Ogara
What Makes a Network Vulnerable? • Anonymity • Anonymous attackers • Many points of attack—both targets and origins • Less rigorous security • Sharing • Complexity of system • Unknown perimeter - untrustedhosts in networks SE571 Security in Computing Dr. Ogara
Why do people attack networks • Fame or recognition • Money and espionage • Organized crime • Advance an ideology SE571 Security in Computing Dr. Ogara
Network Vulnerabilities, Targets and Controls • What are the targets? • What are the vulnerabilities? • What are the controls? SE571 Security in Computing Dr. Ogara
Vulnerabilities that target precursors to attack • Port scan • Gives external picture – open doors • Standard ports or services running? • Social engineering • Use of social skills and personal interaction to get someone to reveal security-relevant information • Reconnaissance • OS and application fingerprinting SE571 Security in Computing Dr. Ogara
Control of vulnerabilities • Firewall • “Hardened” (self-defensive) applications • Programs that reply with only what is necessary • Intrusion detection system • Run few services as possible SE571 Security in Computing Dr. Ogara
Control of vulnerabilities • Education, user awareness • Policies and procedures • Systems in which two people must agree to perform certain security-critical functions SE571 Security in Computing Dr. Ogara
Network vulnerabilities that target authentication failures • Impersonation • Guessing • Eavesdropping • Session hijacking • Spoofing • Man-in-the-middle attack SE571 Security in Computing Dr. Ogara
Control of vulnerabilities • Strong, one-time authentication • Virtual private network • Encrypted authentication channel • Education, user awareness • Virtual private network • Protocol analysis SE571 Security in Computing Dr. Ogara
Network vulnerabilities that target programming flaws • Buffer overflow • Addressing errors • Parameter modification, time-of-check to time-of-use errors • Server-side include • Cookies • Malicious active code: Java, ActiveX • Malicious code: virus, worm, Trojan horse SE571 Security in Computing Dr. Ogara
Control of vulnerabilities • Programming controls • Intrusion detection system • Personal firewall • Two-way authentication • Controlled execution environment • Signed code SE571 Security in Computing Dr. Ogara
Network vulnerabilities that target confidentiality • Protocol flaw • Malicious code: virus, worm, Trojan horse • Eavesdropping • Passive wiretap • Misdelivery • Exposure within network • Traffic flow analysis • Cookie SE571 Security in Computing Dr. Ogara
Control of vulnerabilities Firewall Encryption Intrusion detection system Controlled execution environment Programming controls SE571 Security in Computing Dr. Ogara
Network vulnerabilities that target integrity • Protocol flaw • Impersonation • Active wiretap • Falsification of message • Noise • Website defacement • DNS attack SE571 Security in Computing Dr. Ogara
Control of vulnerabilities Firewall Encryption Intrusion detection system Controlled execution environment Audit Protocol analysis Strong authentication Error detection code Honey pot SE571 Security in Computing Dr. Ogara
Network vulnerabilities that target availability • Protocol flaw • Transmission of component failure • DNS attack • Traffic redirection • Distributed denial of service • Connection flooding SE571 Security in Computing Dr. Ogara
Control of vulnerabilities Encryption Firewall Intrusion detection system Honey pot SE571 Security in Computing Dr. Ogara
Encryption • Most important and versatile tool for network security expert • Important • Privacy • Authenticity • Integrity • Limited access to data • Not a silver bullet • Protects encrypted data only SE571 Security in Computing Dr. Ogara
Encryption • Can be applied in two ways • Link encryption • End-to-end encryption SE571 Security in Computing Dr. Ogara
Link Encryption Data is encrypted before the system places them on the physical communications link Encryption takes place in layer 1 or 2 of the OSI model Encryption protects message during transit Message is plaintext inside the hosts SE571 Security in Computing Dr. Ogara