Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security.

Similar presentations


Presentation on theme: "Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security."— Presentation transcript:

1 Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security

2 Security+ Guide to Network Security Fundamentals, Fourth Edition Objectives List the different types of network security devices and explain how they can be used Define network address translation and network access control Explain how to enhance security through network design 2

3 Security Through Network Devices Not all applications designed, written with security in mind –Network must provide protection Networks with weak security invite attackers Aspects of building a secure network –Network devices –Network technologies –Design of the network itself Security+ Guide to Network Security Fundamentals, Fourth Edition3

4 Standard Network Devices Security features found in network hardware –Provide basic level of security Open systems interconnection (OSI) model –Network devices classified based on function –Standards released in 1978, revised in 1983, still used today –Illustrates: How network device prepares data for delivery How data is handled once received Security+ Guide to Network Security Fundamentals, Fourth Edition4

5 Standard Network Devices (cont’d.) OSI model breaks networking steps into seven layers –Each layer has different networking tasks –Each layer cooperates with adjacent layers Security+ Guide to Network Security Fundamentals, Fourth Edition5

6 6 Table 6-1 OSI reference model

7 Standard Network Devices (cont’d.) Hubs –Connect multiple Ethernet devices together: To function as a single network segment –Use twisted-pair copper or fiber-optic cables –Work at Layer 1 of the OSI model –Do not read data passing through them –Ignorant of data source and destination –Rarely used today because of inherent security vulnerability Security+ Guide to Network Security Fundamentals, Fourth Edition7

8 Standard Network Devices (cont’d.) Switches –Network switch connects network segments –Operate at Data Link Layer (Layer 2) –Determine which device is connected to each port –Can forward frames sent to that specific device Or broadcast to all devices –Use MAC address to identify devices –Provide better security than hubs Security+ Guide to Network Security Fundamentals, Fourth Edition8

9 Standard Network Devices (cont’d.) Network administrator should be able to monitor network traffic –Helps identify and troubleshoot network problems Traffic monitoring methods –Port mirroring –Network tap (test access point) Separate device installed between two network devices Security+ Guide to Network Security Fundamentals, Fourth Edition9

10 10 Figure 6-1 Port mirroring © Cengage Learning 2012

11 Security+ Guide to Network Security Fundamentals, Fourth Edition11 Figure 6-2 Network tap © Cengage Learning 2012

12 Security+ Guide to Network Security Fundamentals, Fourth Edition12 Table 6-2 Protecting the switch

13 Standard Network Devices (cont’d.) Routers –Forward packets across computer networks –Operate at Network Layer (Layer 3) –Can be set to filter out specific types of network traffic Load balancers –Help evenly distribute work across a network –Allocate requests among multiple devices Security+ Guide to Network Security Fundamentals, Fourth Edition13

14 Standard Network Devices (cont’d.) Advantages of load-balancing technology –Reduces probability of overloading a single server –Optimizes bandwidth of network computers –Reduces network downtime Load balancing is achieved through software or hardware device (load balancer) Security+ Guide to Network Security Fundamentals, Fourth Edition14

15 Standard Network Devices (cont’d.) Security advantages of load balancing –Can stop attacks directed at a server or application –Can detect and prevent denial-of-service attacks –Some can deny attackers information about the network Hide HTTP error pages Remove server identification headers from HTTP responses Security+ Guide to Network Security Fundamentals, Fourth Edition15

16 Network Security Hardware Specifically designed security hardware devices –Greater protection than standard networking devices Firewalls –Hardware-based network firewall inspects packets –Can either accept or deny packet entry –Usually located outside network security perimeter Security+ Guide to Network Security Fundamentals, Fourth Edition16

17 Security+ Guide to Network Security Fundamentals, Fourth Edition17 Figure 6-3 Firewall location © Cengage Learning 2012

18 Network Security Hardware (cont’d.) Firewall actions on a packet –Allow (let packet pass through) –Block (drop packet) –Prompt (ask what action to take) Rule-based firewall settings –Set of individual instructions to control actions Settings-based firewall –Allows administrator to create parameters Security+ Guide to Network Security Fundamentals, Fourth Edition18

19 Security+ Guide to Network Security Fundamentals, Fourth Edition19 Table 6-3 Rule for Web page transmission

20 Network Security Hardware (cont’d.) Methods of firewall packet filtering –Stateless packet filtering Inspects incoming packet and permits or denies based on conditions set by administrator –Stateful packet filtering Keeps record of state of connection Makes decisions based on connection and conditions Security+ Guide to Network Security Fundamentals, Fourth Edition20

21 Network Security Hardware (cont’d.) Web application firewall –Looks deeply into packets that carry HTTP traffic Web browsers FTP Telnet –Can block specific sites or specific known attacks –Can block XSS and SQL injection attacks Security+ Guide to Network Security Fundamentals, Fourth Edition21

22 Network Security Hardware (cont’d.) Proxies –Devices that substitute for primary devices Proxy server –Computer or application that intercepts and processes user requests –If a previous request has been fulfilled: Copy of the Web page may reside in proxy server’s cache –If not, proxy server requests item from external Web server using its own IP address Security+ Guide to Network Security Fundamentals, Fourth Edition22

23 Security+ Guide to Network Security Fundamentals, Fourth Edition23 Figure 6-4 Proxy server © Cengage Learning 2012

24 Security+ Guide to Network Security Fundamentals, Fourth Edition24 Figure 6-5 Configuring access to proxy servers © Cengage Learning 2012

25 Network Security Hardware (cont’d.) Proxy server advantages –Increased speed (requests served from the cache) –Reduced costs (cache reduces bandwidth required) –Improved management Block specific Web pages or sites –Stronger security Intercept malware Hide client system’s IP address from the open Internet Security+ Guide to Network Security Fundamentals, Fourth Edition25

26 Network Security Hardware (cont’d.) Reverse proxy –Does not serve clients –Routes incoming requests to correct server –Reverse proxy’s IP address is visible to outside users Internal server’s IP address hidden Security+ Guide to Network Security Fundamentals, Fourth Edition26

27 Security+ Guide to Network Security Fundamentals, Fourth Edition27 Figure 6-6 Reverse proxy © Cengage Learning 2012

28 Network Security Hardware (cont’d.) Spam filters –Enterprise-wide spam filters block spam before it reaches the host Email systems use two protocols –Simple Mail Transfer Protocol (SMTP) Handles outgoing mail –Post Office Protocol (POP) Handles incoming mail Security+ Guide to Network Security Fundamentals, Fourth Edition28

29 Network Security Hardware (cont’d.) Spam filters installed with the SMTP server –Filter configured to listen on port 25 –Pass non-spam e-mail to SMTP server listening on another port –Method prevents SMTP server from notifying spammer of failed message delivery Security+ Guide to Network Security Fundamentals, Fourth Edition29

30 Security+ Guide to Network Security Fundamentals, Fourth Edition30 Figure 6-7 Spam filter with SMTP server © Cengage Learning 2012

31 Network Security Hardware (cont’d.) Spam filters installed on the POP3 server –All spam must first pass through SMTP server and be delivered to user’s mailbox –Can result in increased costs Storage, transmission, backup, deletion Third-party entity contracted to filter spam –All email directed to third-party’s remote spam filter –E-mail cleansed before being redirected to organization Security+ Guide to Network Security Fundamentals, Fourth Edition31

32 Security+ Guide to Network Security Fundamentals, Fourth Edition32 Figure 6-8 Spam filter on POP3 server © Cengage Learning 2012

33 Network Security Hardware (cont’d.) Virtual private network (VPN) –Uses unsecured network as if it were secure –All data transmitted between remote device and network is encrypted Types of VPNs –Remote-access User to LAN connection –Site-to-site Multiple sites can connect to other sites over the Internet Security+ Guide to Network Security Fundamentals, Fourth Edition33

34 Network Security Hardware (cont’d.) Endpoints –Used in communicating VPN transmissions –May be software on local computer –May be VPN concentrator (hardware device) –May be integrated into another networking device VPNs can be software-based or hardware-based –Hardware-based generally have better security –Software-based have more flexibility in managing network traffic Security+ Guide to Network Security Fundamentals, Fourth Edition34

35 Network Security Hardware (cont’d.) Internet content filters –Monitor Internet traffic –Block access to preselected Web sites and files –Unapproved sites identified by URL or matching keywords Security+ Guide to Network Security Fundamentals, Fourth Edition35

36 Security+ Guide to Network Security Fundamentals, Fourth Edition36 Table 6-4 Internet content filter features

37 Network Security Hardware (cont’d.) Web security gateways –Can block malicious content in real time –Block content through application level filtering Examples of blocked Web traffic –ActiveX objects –Adware, spyware –Peer to peer file sharing –Script exploits Security+ Guide to Network Security Fundamentals, Fourth Edition37

38 Network Security Hardware (cont’d.) Passive and active security can be used in a network –Active measures provide higher level of security Passive measures –Firewall –Internet content filter Intrusion detection system (IDS) –Active security measure –Can detect attack as it occurs Security+ Guide to Network Security Fundamentals, Fourth Edition38

39 Network Security Hardware (cont’d.) Monitoring methodologies –Anomaly-based monitoring Compares current detected behavior with baseline –Signature-based monitoring Looks for well-known attack signature patterns –Behavior-based monitoring Detects abnormal actions by processes or programs Alerts user who decides whether to allow or block activity –Heuristic monitoring Uses experience-based techniques Security+ Guide to Network Security Fundamentals, Fourth Edition39

40 Security+ Guide to Network Security Fundamentals, Fourth Edition40 Table 6-5 Methodology comparisons to trap port-scanning application

41 Network Security Hardware (cont’d.) Host intrusion detection system (HIDS) –Software-based application that can detect attack as it occurs –Installed on each system needing protection –Monitors system calls and file system access –Can recognize unauthorized Registry modification –Monitors all input and output communications Detects anomalous activity Security+ Guide to Network Security Fundamentals, Fourth Edition41

42 Network Security Hardware (cont’d.) Disadvantages of HIDS –Cannot monitor network traffic that does not reach local system –All log data is stored locally –Resource-intensive and can slow system Security+ Guide to Network Security Fundamentals, Fourth Edition42

43 Network Security Hardware (cont’d.) Network intrusion detection system (NIDS) –Watches for attacks on the network –NIDS sensors installed on firewalls and routers: Gather information and report back to central device –Passive NIDS will sound an alarm –Active NIDS will sound alarm and take action Actions may include filtering out intruder’s IP address or terminating TCP session Security+ Guide to Network Security Fundamentals, Fourth Edition43

44 Security+ Guide to Network Security Fundamentals, Fourth Edition44 Table 6-6 NIDS evaluation techniques

45 Network Security Hardware (cont’d.) Network intrusion prevention system (NIPS) –Similar to active NIDS –Monitors network traffic to immediately block a malicious attack –NIPS sensors located in line on firewall itself Security+ Guide to Network Security Fundamentals, Fourth Edition45

46 Network Security Hardware (cont’d.) All-in-one network security appliances –One integrated device replaces multiple security devices Recent trend: –Combining multipurpose security appliances with traditional device such as a router –Advantage of approach Network devices already process all packets Switch that contains anti-malware software can inspect all packets Security+ Guide to Network Security Fundamentals, Fourth Edition46

47 Security Through Network Technologies Internet routers normally drop packet with a private address Network address translation (NAT) –Allows private IP addresses to be used on the public Internet –Replaces private IP address with public address Port address translation (PAT) –Variation of NAT Outgoing packets given same IP address but different TCP port number Security+ Guide to Network Security Fundamentals, Fourth Edition47

48 Security+ Guide to Network Security Fundamentals, Fourth Edition48 Table 6-7 Private IP addresses Figure 6-9 Network address translation (NAT) © Cengage Learning 2012

49 Security Through Network Technologies (cont’d.) Advantages of NAT –Masks IP addresses of internal devices –Allows multiple devices to share smaller number of public IP addresses Network access control –Examines current state of system or network device: Before allowing network connection –Device must meet set of criteria If not met, NAC allows connection to quarantine network until deficiencies corrected Security+ Guide to Network Security Fundamentals, Fourth Edition49

50 Security+ Guide to Network Security Fundamentals, Fourth Edition50 Figure 6-10 Network access control framework © Cengage Learning 2012

51 Security Through Network Design Elements Elements of a secure network design –Demilitarized zones –Subnetting –Virtual LANs –Remote access Security+ Guide to Network Security Fundamentals, Fourth Edition51

52 Demilitarized Zone (DMZ) Separate network located outside secure network perimeter Untrusted outside users can access DMZ but not secure network Security+ Guide to Network Security Fundamentals, Fourth Edition52

53 Security+ Guide to Network Security Fundamentals, Fourth Edition53 Figure 6-11 DMZ with one firewall © Cengage Learning 2012

54 Security+ Guide to Network Security Fundamentals, Fourth Edition54 Figure 6-12 DMZ with two firewalls © Cengage Learning 2012

55 Subnetting IP address may be split anywhere within its 32 bits Network can be divided into three parts –Network –Subnet –Host Each network can contain several subnets Each subnet can contain multiple hosts Security+ Guide to Network Security Fundamentals, Fourth Edition55

56 Subnetting (cont’d.) Improves network security by isolating groups of hosts Allows administrators to hide internal network layout Security+ Guide to Network Security Fundamentals, Fourth Edition56

57 Security+ Guide to Network Security Fundamentals, Fourth Edition57 Table 6-8 Advantages of subnetting

58 Security+ Guide to Network Security Fundamentals, Fourth Edition58 Figure 6-13 Subnets © Cengage Learning 2012

59 Virtual LANs (VLAN) Allow scattered users to be logically grouped together: –Even if attached to different switches Can isolate sensitive data to VLAN members Communication on a VLAN –If connected to same switch, switch handles packet transfer –Special “tagging” protocol used for communicating between switches Security+ Guide to Network Security Fundamentals, Fourth Edition59

60 Remote Access Working away from the office commonplace today –Telecommuters –Traveling sales representatives –Traveling workers Strong security for remote workers must be maintained –Transmissions are routed through networks not managed by the organization Provides same functionality as local users –Through VPN or dial-up connection Security+ Guide to Network Security Fundamentals, Fourth Edition60

61 Summary Standard network security devices provide a degree of security –Hubs, switches, router, load balancer Hardware devices specifically designed for security give higher protection level –Hardware-based firewall, Web application firewall Proxy server intercepts and processes user requests Virtual private network uses unsecured public network and encryption to provide security Security+ Guide to Network Security Fundamentals, Fourth Edition61

62 Summary (cont’d.) Intrusion detection system designed to detect attack as it occurs Network technologies can help secure a network –Network address translation –Network access control Methods for designing a secure network –Demilitarized zones –Virtual LANs Security+ Guide to Network Security Fundamentals, Fourth Edition62


Download ppt "Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security."

Similar presentations


Ads by Google