Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 12: Secure Communications and Network Attacks.

Similar presentations


Presentation on theme: "Chapter 12: Secure Communications and Network Attacks."— Presentation transcript:

1 Chapter 12: Secure Communications and Network Attacks

2 Network and Protocol Security Mechanisms Secure communications protocols Authentication protocols

3 Secure Communications Protocols SKIP swIPe S-RPC SSL TLS SET

4 Authentication Protocols CHAP PAP EAP

5 Secure Voice Communications Voice over Internet Protocol (VoIP) Social engineering – In person, over the phone, email, IM, social networks PBX fraud and abuse – DISA – Phreakers – Black box, red box, blue box, white box (DTMF)

6 Multimedia Collaboration Remote meeting Instant messaging

7 Manage Email Security Email security goals Understand email security issues Email security solutions

8 Email Security Goals SMTP, POP, IMAP Open relay, closed relay, authenticated relay Nonrepudiation Restrict access Integrity Verify delivery Confidentiality

9 Understand Email Security Issues Lack of encryption Delivery vehicle for malware Lack of source verification Flooding Attachments

10 Email Security Solutions S/MIME MOSS PEM DKIM PGP

11 Remote Access Security Management Remote access and telecommuting Techniques Plan remote access security Dial-up protocols Centralized remote authentication services

12 Remote Access and Telecommuting Techniques Service specific Remote control Screen scraper/scraping Remote node operation

13 Plan Remote Access Security POTS/PTSN, VoIP, VPN Remote connectivity technology Transmission protection Authentication protection Remote user assistance

14 Dial-Up Protocols PPP SLIP

15 Centralized Remote Authentication Services RADIUS TACACS+ – TACACS, XTACACS

16 Virtual Private Network Tunneling How VPNs work Common VPN protocols – PPTP, L2F, LT2P, IPSec Virtual LAN

17 Virtualization Virtual software – Virtual applications – Virtual desktop Virtual networking – Software-defined network (SDN) – Network virtualization – Virtual SAN

18 Network Address Translation Private IP addresses (RFC 1918) – 10.255.255.255 (a full Class A range) – 172.16.0.0–172.31.255.255 (16 Class B ranges) – 192.168.0.0–192.168.255.255 (256 Class C ranges) Stateful NAT Static and dynamic NAT Automatic Private IP Addressing (APIPA) Loopback address

19 Switching Technologies Circuit switching Packet switching Virtual circuits – PVCs – SVCs

20 WAN Technologies WAN connection technologies – Dedicated vs. nondedicated – ISDN: BRI vs. PRI – X.25 – Frame relay – ATM – SMDS – SDLC, HDLC, HSSI Dial-up encapsulation protocols

21 Miscellaneous Security Control Characteristics Transparency Verify integrity Transmission mechanisms

22 Security Boundaries Areas of different security requirements Classifications Physical vs. logical Should be clearly defined

23 Prevent or Mitigate Network Attacks DoS and DDoS Eavesdropping Impersonation/masquerading Replay attacks Modification attacks Address Resolution Protocol spoofing DNS poisoning, spoofing, and hijacking Hyperlink spoofing


Download ppt "Chapter 12: Secure Communications and Network Attacks."

Similar presentations


Ads by Google