54
Network Essentials I Chapter 12 Securing a Network

Chapter 12 Securing A Network

Embed Size (px)

Citation preview

Page 1: Chapter 12 Securing A Network

Network Essentials I

Chapter 12Securing a Network

Page 2: Chapter 12 Securing A Network

Information Security EmploymentEmployees with certifications in security are in high

demand

Job outlook for security professionals is exceedingly strong and viable

U.S. Bureau of Labor Statistics indicates job outlook for information security analysts through end of decade expected to grow by 25 %, which is faster than average growth rate.

Security+ Guide to Network Security Fundamentals, Fifth Edition 2

Page 3: Chapter 12 Securing A Network

Cybersecurity Job Potential More than 250,000 cybersecurity jobs “unfilled”

Cybersecurity postings grew 91% from 2010-2014

Demand for positions expected to grow by 53% through 2018

Sample salaries (w/Bachelors Degree) Data Security Analyst - $89-$122K Network Security Administrator - $85-$118K Network Security Architect - $95-$137K

Page 4: Chapter 12 Securing A Network

“Key” Security Certifications Security Foundation Building Block

CompTIA Security +

(ISC)² Premier maintenance, certification body for information security industry

CISSP - Certified Information Systems Security Professional

CSLLP - Certified Secure Software LifeCycle Professional

Page 5: Chapter 12 Securing A Network

CompTIA Security+CompTIA Security+ widely-recognized and highly

respected vendor-neutral credential

Tests knowledge and skills required to:

Identify risks; provide infrastructure, application, operational and information security

Apply security controls to maintain confidentiality, integrity, and availability

identify appropriate technologies and products

Security+ Guide to Network Security Fundamentals, Fifth Edition 5

Page 6: Chapter 12 Securing A Network

Foundation Topics

Security Fundamentals

Defending Against Attacks

Firewalls

VPN

Intrusion Detection and Prevention

Page 7: Chapter 12 Securing A Network

Network Security “Network Security is the process of taking physical and

software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment.” –  Copyright 2015 SANS™ Institute

Page 8: Chapter 12 Securing A Network

Securing a NetworkWhat are the goals of network security and what

sorts of attacks do you need to defend against?

What best practices can be implemented to defend against security threats?

How can firewalls be used to protect an organization’s internal network?

How can VPNs secure traffic over an untrusted network?

What is the difference between intrusion prevention and intrusion detection systems?

Page 9: Chapter 12 Securing A Network

Network Security GoalsThe three primary goals of network security are:

Confidentiality Integrity Availability

This is commonly called the CIA Triad or the “Three Protections”

Page 10: Chapter 12 Securing A Network

Triple AAAThree additional protections that must be extended

over information (AAA):

Authentication: Ensures that the individual is who she claims to be (the authentic or genuine person) and not an imposter

Authorization: Providing permission or approval to specific technology resources

Accounting: Provides tracking of events

Page 11: Chapter 12 Securing A Network

Security Layers Concentric Circle

11

Page 12: Chapter 12 Securing A Network

Security Layers Table

Page 13: Chapter 12 Securing A Network

ConfidentialityOne method for providing confidentiality is through

encryption. Encryption ensures that data can only be decoded by the intended recipient.

Encryption has two basic forms:

Symmetric encryption Asymmetric encryption

Page 14: Chapter 12 Securing A Network

Symmetric EncryptionSymmetric encryption implies that the same key is used by

both the sender and receiver of a packet. Some examples of symmetric algorithms are:

DES (Data Encryption Standard)oDeveloped in the mid 1970so56-bit keyoConsidered weak today

3DES (Triple DES)oUses three 56-bit keys (168-bit total)

AES (Advanced Encryption Standard)oPreferred symmetric encryption standardoAvailable in 128-bit, 192-bit and 256-bit key versions

Page 15: Chapter 12 Securing A Network

Symmetric Encryption Example

Page 16: Chapter 12 Securing A Network

Asymmetric Encryption

Asymmetric encryption uses different keys for the sender and receiver of a packet.

The most popular implementation of asymmetric encryption is RSA. The RSA algorithm is commonly used with a public key infrastructure (PKI). The PKI system is used to encrypt data between your client and a shopping website, for example.

Page 17: Chapter 12 Securing A Network

Asymmetric Encryption Example

Page 18: Chapter 12 Securing A Network

Integrity

Data integrity ensures that data has not been modified in transit. It might also verify the source originating the traffic.

Examples of integrity violations are: Defacing a corporate webpage Altering an e-commerce transaction Modifying electronically stored financial records

Page 19: Chapter 12 Securing A Network

Integrity

One approach to providing data integrity is through hashing.

1. Sender runs a string of data through an algorithm.oThe result is a hash or hash digest.

2. The data AND the hash are sent to the recipient3. The recipient runs the data through the same algorithm

and obtains a hash.4. The recipient compares the two hashes. If they are the

same, then the data was not modified.

Page 20: Chapter 12 Securing A Network

Availability

Availability measures data’s accessibility.

Examples of how a network’s accessibility can be compromised are:

Crashing a router or switch through improperly formatted data.

Flooding a network with so much traffic that legitimate requests cannot be processed. This is called a denial of service (DoS).

Page 21: Chapter 12 Securing A Network

Categories of Network Attacks

Each of the security goals, confidentiality, integrity and availability, is subject to different attack types.

Confidentiality Attack – Attempts to make confidential data viewable by an attacker.

Integrity Attack – Attempts to alter data.

Availability Attack – Attempts to limit the accessibility and usability of a system.

Page 22: Chapter 12 Securing A Network

Confidentiality Attack Tactics

Some examples of confidentiality attack tactics are:

Packet capture Ping sweep and port scan Dumpster diving Wireless interception Wiretapping Social Engineering

Page 23: Chapter 12 Securing A Network

Confidentiality Attack Example

Page 24: Chapter 12 Securing A Network

Integrity Attack Methods

Some examples of integrity attack methods are:

Man-in-the-middle Salami attack Data diddling Trust relationship exploitation Password attack Botnet Session hijacking

Page 25: Chapter 12 Securing A Network

Integrity Attack Example

Page 26: Chapter 12 Securing A Network

Availability Attack Types

Some types of availability attacks are:

Denial of Service (Dos) TCP SYN Flood Buffer Overflow ICMP Attacks Electrical Disturbances Physical Environment Attacks

Page 27: Chapter 12 Securing A Network

DoS Attack Example

Page 28: Chapter 12 Securing A Network

TCP SYN Flood Attack Example

Page 29: Chapter 12 Securing A Network

Smurf Attack Example

Page 30: Chapter 12 Securing A Network

Electrical Disturbances

An availability attack can be launched by interrupting or interfering with electrical service available to a system. Examples are:

Power Spikes Electrical surges Power faults Blackouts Power sag Brownout

An uninterruptable power supply (UPS) or backup generator can combat these threats.

Page 31: Chapter 12 Securing A Network

Physical Environment Attacks

Computing equipment can be damaged by influencing the physical environment.

Temperature Humidity Gas

These threats can generally be mitigated through physical restrictions and monitoring.

Page 32: Chapter 12 Securing A Network

EC-Council Security Professional You are here: --> CompTIA Network+

This can lead to:

1. Network Security Administrator

2. Ethical Hacking – Certified Ethical Hacker

3. Licensed Penetration Tester

Page 33: Chapter 12 Securing A Network

Certified Ethical Hacker

Page 34: Chapter 12 Securing A Network

Defending Against Attacks

There are several areas that require best practices to successfully defend a network against attacks.

User Training Patching Security Policies Incident Response Vulnerability Scanners Honey Pots and Honey Nets Access Control Lists Remote Access Security

Page 35: Chapter 12 Securing A Network

User Training

Many attacks can be thwarted through user training. Examples of security issues that users should be educated on are:

Social engineering awareness Virus transmission dangers Password security E-mail security

Page 36: Chapter 12 Securing A Network

Patching

A patch is designed to correct a known bug or fix a known vulnerability in an application or program. In general, patches should be implemented as they become available.

Page 37: Chapter 12 Securing A Network

Security Policies

Lack of a security policy, or lack of enforcement of an existing policy, is one reason for security breaches. Security policies serve multiple purposes, such as:

Protecting an organization’s assets Making employees aware of their obligations Identifying specific security solutions Acting as a baseline for ongoing security monitoring

A common component of a corporate security policy is the acceptable use policy (AUP).

Page 38: Chapter 12 Securing A Network
Page 39: Chapter 12 Securing A Network

Components of a Security Policy

Page 40: Chapter 12 Securing A Network

Incident Response

How an organization reacts to a security violation is called its incident response. Prosecuting computer crimes can be very difficult. Similar to non-computer crimes, successful prosecution relies on proving three things:

Motive Means Opportunity

Page 41: Chapter 12 Securing A Network

Vulnerability Scanners

Your network should be periodically tested to verify that your network security components are behaving as expected or to detect unknown vulnerabilities. Applications that conduct these tests are called vulnerability scanners.

Two examples are: Nessus Nmap

Page 42: Chapter 12 Securing A Network

Nessus

Page 43: Chapter 12 Securing A Network

Nmap

Page 44: Chapter 12 Securing A Network

Honey Pots and Honey Nets

A honey pot acts as a distracter. A system designated as a honey pot appears to be an attractive target. Attackers then use their resources attacking the honey pot, leaving the real servers alone.

Honey pot - Single machineHoney net - Multiple honey pots

A honey pot/net can also be used to study how attackers conduct their attacks.

Page 45: Chapter 12 Securing A Network

Access Control Lists

An access control list (ACL) is a set of rules, typically applied to router interfaces, that permit or deny traffic.

ACL filtering criteria: Source IP Destination IP Source Port Destination Port Source MAC Destination MAC

Page 46: Chapter 12 Securing A Network

Firewalls

A firewall defines a set or rules defining which types of traffic are permitted or denied through the device. A firewall can be either software or hardware. Many firewalls also perform NAT or PAT.

There are two general categories of firewalls: Packet-filtering firewall:

oPermits or denies traffic based on packet header• Source and destination IP address/port number

o Looks at each packet individually Stateful firewall:

o Inspects traffic as part of a sessionoRecognizes if traffic originated from inside or outside the LAN

Page 47: Chapter 12 Securing A Network

Packet-Filtering Firewall

Page 48: Chapter 12 Securing A Network

Stateful Firewall

Page 49: Chapter 12 Securing A Network

Firewall Zone Example

Page 50: Chapter 12 Securing A Network

Intrusion Detection and Prevention

When an attacker launches an attack against a network, an intrusion detection system (IDS), or intrusion prevention system (IPS) is often able to recognize the attack and respond appropriately.

Incoming data streams are analyzed for attacks using different detection methods, such as:

Signature-based detection Policy-based detection Anomaly-based detection

Page 51: Chapter 12 Securing A Network

IDS versus IPS

Both IDS and IPS devices recognize attacks, but they operate with some differences:

IDS Operates parallel to the network Passive device Monitors all traffic and sends alertsIPS Operates in-line to the network Active device Monitors all traffic, sends alerts and drops or blocks the

offending traffic

Page 52: Chapter 12 Securing A Network

IDS and IPS Network Placement

Page 53: Chapter 12 Securing A Network

Deploying Network-Based and Host-Based SolutionsSensors dedicated as a network-based intrusion

prevention system (NIPS) can work in tandem with a host-based intrusion prevention system (HIPS), which is software installed on a host.

A NIPS device might prevent a DoS attack while a HIPS solution could focus on the protection of applications on a host.

Page 54: Chapter 12 Securing A Network

NIDS, NIPS, and HIPS Deployment Example