CompTIA Network + Week 11 Outcomes • Network Security • Confiden<ality • Integrity • Availability • Network ABacks • Firewalls • Access Controls Lists • Remote Access Security • Virtual Private Network • Intrusion, Detec<on & Preven<on Network Security • Most if not all networks in use today are dependent on connec<vity with other networks through private connec<ons or increasingly and more prevalent the internet, while this connec<vity allows for flexibility in terms of business transac<ons and business opera<ons connec<ng to the internet increases external (or internal) security breach. • Most of todays networks allows for customer contact and in many instances e-‐ commerce, most corporate networks can be considered large and interconnected with other networks, the devices and applica<ons are also increasing in complexity with large amounts of stored informa<on. • Three primary goals of network security as considered for corporate networks;-‐ • Confiden'ality – keeping informa<on private, access control • Integrity – protec<ng data in transit, not being modified • Availability – Availability of informa<on, ie server, network up<me Confiden<ality • Data or informa<on can be kept confiden(al by restric<ng access to sensi<ve informa<on, this can be achieved by;-‐ • Encryp<on -‐ encrypts traffic across the network – encoding data so informa<on can only be decoded by the intended recipient using a shared key. Most encryp<on algorithms use a key to encrypt and decrypt carrying out mathema<cal calcula<ons. Encryp<on is in two forms symmetric encryp'on and asymmetric encryp'on. • Firewall or Access Control Lists (ACL’s) – seYng or configuring devices to access or deny certain types of traffic, denying or allowing access to specific servers or websites, denying or allowing ability to download or upload data. • Enforcing user creden<als to access informa<on – forcing users to log-‐on to network to access services and servers on the network, individual users or groups can be allocated certain rights based on func<on or job role, applica<ons can also record ac<vi<es ie change to informa<on. Confiden<ality -‐ Symmetric Encryp<on • In symmetric encryp<on, both sender and receiver use the same key by to encrypt the informa<on, symmetric encryp<on is faster than asymmetric encryp<on as keys are locally available, encryp<on methods used are;-‐ • DES – Data Encryp<on (DES) using 56-‐bit key for encryp<on, but note this is considered weak on present networks. • 3DES – Triple DES uses three 56-‐bits DES (168 bits) for encryp<on and is considered strong encryp<on, however implementa<on of 3DES can vary;-‐ • 1) All three 56-‐bit keys are different • 2) Two of the 56-‐bit keys are same • 3) All three 56-‐bit keys are same • AES – Advanced Encryp<on Standard (AES) and considered the preferred method for symmetric encryp<on, AES can be 128, 192 or 256 bit key versions. Shared Session Key Data Encrypted with Shared Session Key between server & client Internet Shared Session Key Confiden<ality -‐ Asymmetric Encryp<on • Asymmetric encryp<on is slower than symmetric but security is higher, asymmetric uses different keys for the sender and receiver of informa<on. Asymmetric encryp<on is generally not used to encrypt large amounts of data but is used during the authen<ca<on or sharing or exchanging keys. • RSA – derived from creators of RSA is used with Public Key Infrastructure (PKI) using digital cer<ficate and cer<ficate authority (CA) for secure communica<on across the internet. Cert Auth Internet Step 1 Step 2 Request for Servers Digital Cer<ficate Servers Digital Cer<ficate (signed by Cer(ficate Authority) Step 3 Server’s Public Extracted from Digital Certificate Step 4 Client Generates Session Key & encrypts with Server’s Public Key Step 5 Step 6 Client Session Key Encrypted with Server’s Public Key Server decrypts clients session key with server’s private key Integrity • Integrity for data sent and received in paramount on any network, viola<on of data integrity can include;-‐ • Modifying or replica<ng corporate web-‐site • Intercep<ng and modifying e-‐commerce transac<ons • Modifying informa<on stored electronically • Using a hash algorithms can provide integrity to data transmiBed and received, the sender runs a hash algorithm on the data and also sends the hash digest the recipient receives the data and using the same hash algorithm calculates the digest. A hash algorithm produces hash digest of same length irrespec<ve of size of data, two most common types are ;-‐ • Message Digest (MD5) – 128-‐bit hash digest • Secure Hash Algorithm 1 (SHA-‐1) – 160 bit hash digest • To improve integrity further Hash-‐Based Message Authen>ca>on Code (HMAC) is used this uses an addi<onal secret key in calcula<ng the hash value, an aBacker aBemp<ng modify the informa<on would need to have the secret key. Availability • Availability is measure of up<me for servers, network, applica<on, devices or systems it is measured as a percentage, for instance a server with 99.999% (5 nine’s) availability means the server will have a down<me of 5 minutes per year. • Compromising network availability can consuming resources on the network or aBached devices, We can list network compromise into different aBacks; • Confiden'ality AHack – aBempts to make confiden<al informa<on viewable by the aBacker, ogen a copy of the informa<on is made rather than manipula<ng informa<on. • Integrity AHack – ABempts to alter informa<on by modifying informa<on before it reaches the sender or sever. • Availability AHack – Limits the accessibility of a server or system, consuming system resources such as processor or memory. Confiden<ality ABack 1. Attacker exploits known software vulnerability on web server ie patches not applied to web server and is able to control server. 2. Attacker uses trust relationship between web server and target server to extract customer confidential information. 3. Attacker uses stolen information (credit card details) to make purchases from company B E-commerce server. Company B ECommerce Step 3 Internet Attack er Step 1 Step 2 Web Server Company A Target Server Other Confiden<ality ABacks Method Descrip(on Packet Capture Placing the NIC card in promiscuous mode and using sogware such as Wireshark or a protocol analyser to capture packets and deciphering to capture sensi<ve informa<on Ping Sweep & Port Scan Pining a series of IP address to check response and then to con<nue to access device or server, Port scan a range of UDP and TCP ports to iden<fy which serves are running for exploita<on EMI As copper is the choice for most local connec<on (UTP) intercep<ng the EMI being emiBed can be used for confiden<ality aBacks Wire Tapping Accessing the MDF (main distribu<on frame) to eavesdrop on data cables to capture data packets for analysis Social Engineering Use or leverage other peoples desire to be helpful ie to access the communica<ons room, access to systems. FTP Bounce FTP client has a number of commands for seYng up and managing file transfers one of these commands is the PORT, the standard FTP port number is 21,an aBacker can violate this by using the IP address and an open port number, however most modern FTP servers will not accept a PORT command from a device that specifies a different IP address than the clients IP address. Integrity ABack Integrity attacks attempts to alter (compromise) information being sent. Consider the diagram below, man-in-the-middle has been initiated by the attacker, present similar looking web site ate the bank server, Bank Server attacker is able to carry out fraudulent transaction. TRANSACTION: Deposit £500 in Acc #9876 Attacker Acc #9876 Internet TRANSACTION: Deposit £500 in Acc #1234 Custome r Acc #1234 Method Descrip(on Salami ABack A series of small aBacks resul<ng in larger aBack when combined, ie small fraudulent transac<on on credit cards Data Diddling Changing data before it is stored virus, Trojan horse or worm could intercept keyboard input and modify the informa<on Virus A piece of code that a end user executes Trojan horse A program that appears to for a purpose but performs another task, ie collec<ng informa<on Worm Can infect a system or propagate further without user interven<on Integrity ABack Method Descrip(on Salami ABack A series of small aBacks resul<ng in larger aBack when combined, ie small fraudulent transac<on on credit cards Data Diddling Changing data before it is stored virus, Trojan horse or worm could intercept keyboard input and modify the informa<on Virus A piece of code that a end user executes Trojan horse A program that appears to for a purpose but performs another task, ie collec<ng informa<on Worm Can infect a system or propagate further without user interven<on Password aBack ABempts to capture user password, though Trojan horse, Packet Capture – using applica<on such a Wireshark, Key Logger – using a device to log, store , and send key strokes, Brute force – <res password combina<ons Botnet A program that is installed on a computer through a Trojan Horse and then controlled remotely. Session High jacking High jacking a TCP session intercep<ng the three way TCP handshake process Availability ABack Availability attacks tries to limit usability of the system consuming system resources such as processor and over loading memory, for example a Denial of Service (DoS) attack floods the target system with data requests consuming system resources and rendering the server as unusable. Distributed Denial of Service (DDoS) uses multiple systems to compromise the target server. Target Server Internet Attacker with spoofed IP address to conceal identity Flood of requests TCP SYN Flood – initiates multiple TCP sessions by sending SYN segments using spoofed IP address but never completes the 3-way handshake, eventually compromising server connection SYN from spoofed 10.1.2.3 SYN from spoofed 171.16.2.3 Internet SYN & ACK to 10.1.2.3 SYN & ACK to 172.16.2.3 Targe t Serve r Availability ABack Availability attacks also attempt to compromise memory buffer causing buffer overflow and can lead to program crash as memory storage spills into other parts of the system. A form of network attack is ICMP attack where continuous pings are sent to target server flooding the buffers, another form of ICMP ping of death is where the attacker spoofs the destination address (target server) and sends a ping request to a sub-net, devices on the subnet reply to the spoofed address rendering the server unable to communicate. Availability ABack • On a physical level an aBacker can render a network or servers unusable by interfering with electrical supply feeds causing;-‐ • Power Fault – electrical outage • Electrical surges – excess power for extended periods, damaging equipment • Power Spikes – excess power for brief period, damaging equipment • Brownout – extended reduc<on in voltage or power • Power Sag – brief reduc<on in power • Blackout – extended reduc<on in power rendering equipment to be inoperable • To combat electrical power issues Uninterrup<ble Power Supplies (UPS) are used, other physical environments crea<ng cause for concerns are room temprature, humidity and gas used to protect the room. Availability ABack -‐ Mi<ga<on Availability attacks start with basics, availability attacks need user intervention to be successful, so educating users to follow good practices are important such as never giving out passwords or storing them, using a range of letters upper, lowers case and numbers, forcing password change regularly, not opening e-mail attachments from unknown sources. Applying patches to operating systems and applications and having a Acceptable User Policy (AUP) is considered good practice Incident Response Technical Policy Du<es of IT staff for ;-‐ Servers E-‐Mail Wireless networks Remote access End User Policy User AUP Consequences for non-‐compliance Governing Policy Issues address by policy Security concepts Compliance to policies Consequences for non-‐compliance Relevance to work environment Reac<on to security viola<on considering ; -‐ • Mo<ve • Means • Opportunity Documenta(on Standards OS, applica<ons, configura<ons Guidelines – Mandatory prac<ces Procedures – configura<on guides Vulnerability Scanners Once a network has been installed, configured & tested, the network is periodically tested for vulnerabilities or weakness using applications such as Nessus or Nmap. Nessus – a comprehensive vulnerability scanner which is developed by Tenable Network Security. Can perform audit on a system without any agents being installed, can perform;• System configuration for compliance to organisational policies • Perform continuous scanning • Configure to run once, daily, weekly or monthly basis Firewalls • All corporate networks will have some form of protec<on between the internal network and external networks, this can include Internet or other networks. • A firewall has a set for defined rules for types of traffic allowed and disallowed, these firewall scan be;-‐ • Sogware Based – Generally a computer running firewall sogware with more than one NIC, with good GUI interface fro configura<on • Hardware Based – a router can be configured as a firewall but requires a lot more work in terms of crea<ng filters Router based Firewall Serial 1/0/1 Internet HTTP request Access-list 100 deny any any ! Interface Serial 1/0/1 Ip access-group 100 in Packet-Filtering Firewall HTTP reply Firewalls – State full • State full firewall inspects traffic leaving the inside netwrok and allows the traffic to return using unique sessions but only ini<ated from the internal network. Traffic or aBempts form the internet are blocked. Telnet Session allowed Telnet Session allowed State Full Firewall Internet Telnet Session ini(ated from internet State Full Firewall Firewall with DMZ • Most applica<on based firewalls are built around a Demilitarised Zone (DMZ) separa<ng internal network with the external network – effec<vely add a “no mans lands” in between the internal and external network. All traffic allowed EMail Serv er Only return traffic allowed Web Serv er All traffic allowed E-‐Mail, Web & return traffic allowed Internet Internal Zone Demilitarised Zone External Zone Access Control Lists • Access Control Lists (ACL) are list of rules that a system or netwrok device such as a router will execute and take ac<on. For instance a router can filter traffic based on the source to des<na<on IP address and or the port address ie HTTP, FTP or other well defined ports. Web Serve r Unix Host 10.1.1.0 /24 Serial 1/0/1 192.168.1.0 /24 Internet HTTP Telnet Source Dest Add Mask Port Access-list 100 permit tcp any 10.1.1.0 0.0.0.255 eq www Access-list 100 permit tcp any 10.1.1.0 0.0.0.255 eq telnet ! ! Interface Serial 1/0/1 Ip access-group 100 in ACL No. Data Flow Other • Remote A ccess S ecurity ACL can be used to limit traffic at a very granular level, however todays organisa<on have systems in place for staff to work remotely accessing servers on the main site, various security methods are used Method Descrip(on RAS Microsog Remote Access Server RDP Remote Desktop Protocol (Microsog) PPPoE Point-‐to-‐Point over Ethernet protocol for ADSL (PPPoE encapsulates PPP frames within Ethernet frames) PPP Point-‐to-‐Point-‐ Protocol ICA Citrix systems propriety protocol for common applica<on control SSH Secure Shell protocol for security Kerberos Authen<ca<on protocol for client-‐sever (does not use username & password) AAA Authen<ca<on, Authorisa<on & Accoun<ng used with RADIUS & TACACS servers RADIUS Remote Authen<ca<on Dial In Users Service uses UDP to communicate with AAA server TACACS+ Terminal Access Control Access-‐Control System, Csco propriety protocol that encrypts data NAC Network Admission Control permit or deny access to netwrok based on device characteris<cs IEEE 802.1X A standard used for wireless or wired system to permit or deny LAN access to a network CHAP Challenge Handshake Authen<ca<on Protocol using three way handshake Single, Two-‐Factor & Mul<factor authen<ca<on Single sign-‐on authen<cates user only once Two-‐Factor requires two types of authen<ca<on password & biometric check Mul<factor authen<ca<on similar to two factor with two or more authen<ca<on Virtual Private Network -‐ VPN • VPN’s allows secure communica<on for remote workers, encryp<ng informa<on over the network, generally the internet is used for connec<on to corporate netwrok and therefore addi<onal security is necessary. • VPN’s can be categorised into site-‐to-‐site and client-‐to-‐site Remote VPN VPN Concentrato r Branch Office A Remote VPN Internet Branch Office B Head Offic e Remote VPN Branch Office C Site-to-site VPN client on PC VPN Concentrato r Home Worker Internet Hotel Head Offic e VPN client on PC Mobile Worker Client-to-site VPN IPsec • Site-‐to-‐Site VPN using IPsec to secure data over untrusted internet using 5 steps Internet Step 1 – Client send traffic to server router defines traffic as interes(ng ini(a(ng Ipsec tunnel Step 2 – IKE Phase 1 tunnel , the two routers nego(ate to form a ISAKMP tunnel Step 3 – IKE Phase 2 tunnel –IPSec tunnel Step 4 – Interes(ng traffic flows through protected IPsec tunnel Step 5 – If no interes(ng traffic is detected IPsec is deleted and tunnel is torn down VPN Security • As VPN’s use the untrusted internet a primary concern is security for informa<on. • Although different VPN technologies like L2TP and L2F are used Ipsec offers strong security features for VPN traffic. Ipsec operates at Layer 3 of the OSI model and is transparent to applica<ons or upper layers of the OSI model. • Ipsec uses a number of protocols to provide features like Internet Key Exchange (IKE) providing encryp<on between authen<cated devices, this encryp<on key is periodically changed during the data exchange. Method Descrip(on Main Method Main method uses 3 exchanges of informa<on between Ipsec devices – ini>ator & responder. #1 Exchange – responder selects a proposal from ini<ator #2 Exchange – Establishes secure shared key over the internet #3 Exchange – ISAKMP (Internet Security Associa>on & Key Management Protocol) is established, secure session is used to nego<ate Ipsec session Aggressive Mode Quicker to set-‐up achieving same result as main mode, Ini<ator sends 1st packet containing all informa<on to set up Ipsec, Responder sends 2nd packet containing security parameters to authen<cate session, 3rd packet finalises authen<ca<on of ISAKMP session. Quick Mode Mode nego<ates parameters (security associa<on) for Ipsec session and nego<a<on occurs using ISAKMP Other VPN Technologies • Whilst IPsec VPN’s are popular for connec<ng remote clients to corporate netwrok other VPN protocols are in use. Protocol Descrip(on SSL Secure Socket Layer encrypts data at Layers 5-‐7 of the OSI model but over the years has been largely replaced by TLS (see below) however SSL has been enhanced to version 3.3 that is more compa<ble to TLS. Both protocols provide secure browsing using the Hypertext Transfer Protocol Secure (HTTPS) L2TP Layer 2 Tunnelling Protocol is an early version of VPN but lacks encryp<on security features, but can be used with another protocol that provides encryp<on L2F Layer 2 Forwarding a Cisco propriety protocol for point to point communica<on, like L2TP lacks encryp<on security features PPTP Point to Point Tunnelling Protocol an older VPN protocol supported for Microsog Windows, but like L2TP & L2F lacks encryp<on security features TLS Transport Layer Security has largely replaces earlier version of SSL and increasingly is the choice for websites using HTTPs Intrusion Detec<on & Preven<on • Intrusion detec<on systems (IDS) and Intrusion Preven<on Systems (IPS) are placed within the network to detect and prevent aBacks and respond appropriately. ABacks are recognisable by comparing data streams against a database of well-‐ known aBacks signatures. Attacker Ac(ve IPS Deployment – IPS system in line with traffic and considered ac<ve Internet Firewall System IPS Corporat e Network Attacker Passive IPS Deployment – IDS system not in line with traffic, detec<ng offending traffic sending updates to management sta<on Internet Firewall Corporat e Network Intrusion Detec<on & Preven<on • Although it would seem IPS systems would be preferable, the use of both systems complement one another providing improved protec<on. • IDS and IPS devices are categorised based on how offending traffic is detected Detec(on Descrip(on Signature based Primary method used to detect and prevent IDS or IPS using signature based detec<on Policy based In this type of detec<on a policy is wriBen for which networks can communicate Anomaly based Final approach is anomaly based but this is prone to false detec<on as normal condi<on can be difficult to measure and define so two op<ons are used;-‐ Sta's'cal Anomaly Detec'on -‐ monitors traffic paBern over a period of <me to dynamically build a baseline, and using this baseline for alarm triggers. Non-‐Sta's'cal Anomaly Detec'on – Allows administrator to define what traffic paBerns are allowed for instance download service packs, but this can lead to false alarms. Rather than single IDS or IPS being deployed mul<ple IDS and IPS are deployed detect and defend internal network devices and systems Mul<ple Intrusion Detec<on & Preven<on Network Management station Network IPS Firewall Internet Violations notified Network IPS protecting servers Network IDS WEB HIPS E-Mail HIPS DNS HIPS
© Copyright 2026 Paperzz