310 likes | 509 Views
Defining Network Security. Security is prevention of unwanted information transfer What are the components? ...Physical Security …Operational Security …Human Factors …Protocols. Areas for Protection. Privacy Data Integrity Authentication/Access Control Denial of Service.
E N D
Defining Network Security Securityis prevention of unwanted information transfer • What are the components? • ...Physical Security • …Operational Security • …Human Factors • …Protocols
Areas for Protection • Privacy • Data Integrity • Authentication/Access Control • Denial of Service
Regulations and Standards • Computer Crime Laws • Encryption • Government as “Big Brother”
Security Threat, Value and Cost Tradeoffs • Identify the Threats • Set a Value on Information • Add up the Costs (to secure) Cost < Value * Threat
Threats • Hackers/Crackers (“Joyriders”) • Criminals (Thieves) • Rogue Programs (Viruses, Worms) • Internal Personnel • System Failures
Network Threats • IP Address spoofing attacks • TCP SYN Flood attacks • Random port scanning of internal systems • Snooping of network traffic • SMTP Buffer overrun attacks
Network Threats (cont.) • SMTP backdoor command attacks • Information leakage attacks via finger, echo, ping, and traceroute commands • Attacks via download of Java and ActiveX scripts • TCP Session Hijacking • TCP Sequence Number Prediction Attacks
Security Tools Threat, Value and Cost Tradeoffs • Operations Security • Host Security • Firewalls • Cryptography: Encryption/Authentication • Monitoring/Audit Trails
Host Security • Security versus Performance & Functionality • Unix, Windows NT, MVS, etc • PCs • “Security Through Obscurity” L
Host Security (cont) • Programs • Configuration • Regression Testing
Network Security • Traffic Control • Not a replacement for Host-based mechanisms • Firewalls and Monitoring, Encryption • Choke Points & Performance
Access Control • Host-based: • Passwords, etc. • Directory Rights • Access Control Lists • Superusers L • Network-based: • Address Based • Filters • Encryption • Path Selection
Network Security and Privacy • Protecting data from being read by unauthorized persons. • Preventing unauthorized persons from inserting and deleting messages. • Verifying the sender of each message. • Allowing electronic signatures on documents.
FIREWALLS • Prevent against attacks • Access Control • Authentication • Logging • Notifications
Types of Firewalls • Packet Filters • Network Layer • Stateful Packet Filters • Network Level • Circuit-Level Gateways • Session Level • Application Gateways • Application Level Application Presentation Session Transport Network Data Link Physical
Packet Level • Sometimes part of router • TAMU “Drawbridge” ROTW Drawbridge Router Campus
Circuit Level • Dedicated Host • Socket Interfaces Local FW ROTW
Application Level • Needs a dedicated host • Special Software most everywhere Firewall telnet ROTW
INTERNET Firewall Installation Issues FTP DNS Web Mail Router
Firewall Installation Issues • DNS Problems • Web Server • FTP Server • Mail Server • Mobile Users • Performance
Address Transparency • Need to make some addresses visible to external hosts. • Firewall lets external hosts connect as if firewall was not there. • Firewall still performs authentication
Internet Network Address Translation 10.0.0.0 128.194.103.0 Gateway Firewall
ftpd TCP IP Data Link Hardware A GW Datagram A B Datagram Network Address Translation Host B: External Host Gateway Host Host A: Internal Host gw control ftp proxy ftp TCP TCP IP IP Data Link Data Link Hardware Hardware
IP Packet Handling • Disables IP Packet Forwarding • Cannot function as a insecure router • eg. ping packets will not be passed • Fail Safe rather than Fail Open • Only access is through proxies
INTERNET DNSd DNS Proxy Security External DNS Server Eagle Gateway eagle.xyz.com finance.xyz.com sales.xyz.com marketing.xyz.com
Decapsulate Encapsulate Hello Hello Authenticate Authenticate Hello Hello Decrypt Encrypt Hello Hello !@@%* !@@%* !@@%* Virtual Private Tunnels INTERNET Creates a “ Virtual Private Network “
VPN Secure Tunnels • Two types of Tunnels supported • SwIPe and IPsec tunnels • Encryption • DES, triple DES and RC2 • Secret key used for used for authenticatio and encryption • Trusted hosts are allowed to use the tunnel on both ends
INTERNET Designing DMZ’s DMZ Screening Router Web FTP Company Intranet Mail
INTERNET Firewall Design Project San Jose File Server Mail Server Wide Area Router Dallas Internet Router Raptor Eagle Raptor Remote Hawk Console
Monitoring • Many tools exist for capturing network traffic. • Other tools can analyze captured traffic for “bad” things. • Few tools are real-time.
Summary • Security must be comprehensive to be effective. • Remember threat, value, cost when implementing a system. • Security is achievable, but never 100%. • Make your system fault tolerant.