Computer Network Defense2  Computer Network Defense (CND) …actions taken through the use of computer networks to protect, monitor, analyze, detect,

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS Chapter 11.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
System and Network Security Practices COEN 351 E-Commerce Security.
Intrusion Detection Systems and Practices
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Guide to Computer Network Security
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Host Intrusion Prevention Systems & Beyond
Department Of Computer Engineering
Firewall Slides by John Rouda
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security fundamentals Topic 10 Securing the network perimeter.
Role Of Network IDS in Network Perimeter Defense.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Computer Security Firewalls and Intrusion Prevention Systems.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Critical Security Controls
Click to edit Master subtitle style
Security in Networking
CompTIA Security+ Study Guide (SY0-401)
6.6 Firewalls Packet Filter (=filtering router)
Guide to Computer Network Security
Introduction to Network Security
Designing IIS Security (IIS – Internet Information Service)
Protection Mechanisms in Security Management
Presentation transcript:

Computer Network Defense2

 Computer Network Defense (CND) …actions taken through the use of computer networks to protect, monitor, analyze, detect, and respond to unauthorized activity within information systems and computer networks.  Information Assurance (IA) …measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation.  CND and IA are not the same  Mutually supporting Computer Network Defense Joint Publication

 All authorized use is allowed  All unauthorized use is denied  Pretty simple, right? Computer Network Defense4

 Advantage lies with the offense  Near-impossible to fully achieve both goals  Most secure system is the one not connected to the network  May still be vulnerable, but what does this do to system availability?  Cannot defend against every attack: Zero-day exploits  Some defensive measures may block legitimate traffic  Must balance system usability and security  Goal: minimize risk of operating in a networked environment  Requires robust CND and IA strategies  Defend what we can  Recover from attack / intrusion quickly  Limited resources  Can’t protect everything  Maximize return on investment (ROI) Computer Network Defense5

 "Give users and programs the privileges they need, and no more."  If your network only needs to provide web and name- resolution services to users/hosts outside your network, then employ a firewall that blocks inbound connections to ports other than 80 and 53.  If a file or collection of files is only needed by a specific user or by a particular network service, then that file or those files should only be accessible to the user that needs them, or to the server processes that need them.  Operating system file permissions limit access like this, but this principle should also guide decisions on what information goes on network drives and shared drives. Computer Network Defense6

 Multiple layers of defense are placed throughout an information system  Addresses security vulnerabilities in personnel, technology, and operations  Protection mechanisms cover weaknesses / vulnerabilities of other mechanisms in use  Delay success of attack  Provide time to detect and respond Computer Network Defense7

 Along with “Least Privilege” and “Defense in Depth” principles, if a system administrator is vigilant, they may well recognize the intrusion and be able to kick the attackers off the system before they get to the asset they were really out to attack.  Administrators need to keep their eyes on these logs files in order to recognize that they're under attack. Programs called intrusion detection systems can be used to help this effort by automatically combing log files looking for unusual activity and alarming administrators when it's found. Computer Network Defense8

 Defense requires knowing the nature of the threat  What is the intent of the attack?  Exploitation  Disruption  Destruction  Who is the actor?  State-sponsored  Cyber criminals  Terrorist groups / sympathizers  Disgruntled employees Computer Network Defense9

 What is the threat vector?  Remote Access  Close Access  Ex: WiFi sniffing / injection  Local Access  Insider Threat  Target users of the network (social engineering)  We are our own worst enemy  Intentional actions by insiders  Ex: PVT Manning, Terry Childs  Supply Chain  Design phase  Ordering / delivery  Disposal Computer Network Defense10

 CND hinges on detecting malicious activity  How can we respond if we don’t know we’re being attacked?  How do we know our defenses work?  Applies to all attack phases  Pre-attack  Indications of pending attack: May prevent attack from occurring  During the attack  Stop attack in progress and Limit impact of attack  Post-attack  Forensics  Determine scope of attack  Collect evidence  Identify new malware or techniques  Develop detection techniques  Clean up / recovery: What was affected?  Measure return on investment: Why are we spending money on security? 11

 Management & Monitoring  Network Access Control (NAC)  Firewalls  Demilitarized Zone (DMZ)  Intrusion Detection Systems (IDS)  Intrusion Prevention Systems (IPS)  Proxy Servers  Sandboxing  Virtual Private Networks (VPN) Computer Network Defense12

 Configuration management  Know what’s on your network  Similar systems (workstations, servers, etc.) share similar configuration  Remove unnecessary accounts and services  Changes to baseline require approval  All changes tracked  Use standardized protocols and centralized systems for management  SNMP, Software and Anti-virus Management Servers  Centralized logging  Logs from multiple systems collected in a single place  Allows for centralized monitoring and response Computer Network Defense13

 System that control network access based on defined policies  Permit, deny, or limit access based on  User identity  Control access based on who’s logged into the system  Required operating system / application updates installed  Anti-malware installed / up-to-date  Malware detected on system  System meets security policies  Can deny access if an authorized system violates policies  Usually provide a mechanism for remediation  Can rely on agent software installed on system Computer Network Defense14

 Device or software application designed to permit or deny network traffic based upon a set of rules  Protects networks from unauthorized access  Permits legitimate communications to pass  Log traffic that violates rules  Many routers contain firewall components  Many firewalls can perform basic routing  Help prevent DDoS attacks by dropping attackers packets Computer Network Defense15

 Packet Filter  Filter based on  source/destination addresses (MAC or IP)  source / destinations ports  protocols (TCP, UDP, ICMP, GRE, …)  Stateful Inspection  Examine each packet in relation to other packets in series  Determine if traffic is a new connection, existing connection, terminated connection, or invalid  Application Layer  “Deep Inspection”  Understands application-layer protocols  HTTP, FTP, DNS, …  Determine if protocol is being misused or contains malicious payloads Computer Network Defense16

 Physical or logical sub-network that exposes external services to an untrusted network  External services more vulnerable to attack  Segregate external services from internal networks  Often referred to as a perimeter network  DMZ hosts are often bastion hosts  Designed / configured to withstand attacks  Generally host a single application  Other services removed or limited  Limit implied trusts  Different usernames/passwords from internal servers  Separate or no domain membership  Can be special purpose device Computer Network Defense17

 Device or software application that monitors network and/or system activities for malicious activities or policy violations  Notifies when violations detected  Two detection techniques:  Signature-based  Compare traffic to preconfigured / predetermined attack patterns (signatures)  Alert on match  Statistical Anomaly  Determine normal network activity  Bandwidth  Ports / protocols used  Alert on anomalous traffic  Must establish baseline Computer Network Defense19

Computer Network Defense20

 IDS system that attempts to block / stop activity in addition to reporting  Must be positioned in-line with network traffic  IPS actions:  Send an alarm  Drop the malicious packets  Reset the connection  Blocking traffic from the offender Computer Network Defense21

 Network  Independent platform that identifies intrusions by examining network traffic  Connect via hub, switch, port mirroring, or network tap  Typically located at network choke points  Host-based  Agent on a host that identifies intrusions  Analyzes  System calls  Application logs  File-system modifications (binaries, password files, capability databases, access control lists, etc.)  Other host activities and state Computer Network Defense22

 Server that acts as an intermediary for requests from clients seeking resources from a server  Client connects to proxy and requests some service  Proxy connects to relevant server and requests service  Proxy forwards response to client  Purpose  Keep machines behind it anonymous  Speed up access to resources (caching)  Apply access policy to network services or content  Block undesired sites  Log / audit usage: Internet sites visited  Scan content for malware before delivery  Scan outbound content: Data leak protection Computer Network Defense23

 Principle of least privilege  Only the level of privilege necessary to carry out legitimate function  Many services run with elevated privileges  Hackers attempt to exploit these services to gain access with the service’s level of privilege  Change ownership of the service  Create an account with lower privileges  Run the service using this account Computer Network Defense24

 Mechanism to provide remote networks or individual users secure access to an organization's network  Host / remote network “appear” physically connected to organization’s network  Often encrypted  Mechanisms used  IPsec (part of IPV6, widely used with IPV4)  SSL/TLS tunneling  Dial-up protocols (PPTP, L2TP, SSTP)  SSH tunneling  More secure than opening access through firewall Computer Network Defense25

 Zero Day attacks occurs on or before the first or "zeroth" day of developer awareness, meaning the developer has not had any opportunity to distribute a security fix to users of the software.zeroth  Very difficult to defend against since everything about them is unknown to the defender  A hardened system is one which all unnecessary services (ports) are disabled, and all patches and updates have been installed. Computer Network Defense26

Computer Network Defense27