Download presentation
Presentation is loading. Please wait.
1
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security
2
Security Awareness: Applying Practical Security in Your World, 2e 2 Objectives Explain how a network functions Discuss how to defend against network attacks Describe the types of attacks that are launched against networks and network computers
3
Security Awareness: Applying Practical Security in Your World, 2e 3 How Networks Work Personal computer –Isolated from other computers –Functionality is limited to installed software and hardware directly connected to it Computer network –Allows sharing
4
Security Awareness: Applying Practical Security in Your World, 2e 4
5
5
6
6 Types of Networks Local area network (LAN) –Computers located relatively close to each other Wide area network (WAN) –Connects computers over a larger geographical area than a LAN Wireless local area network (WLAN) –Based on standard that transmits data at fast speeds over a distance of up to 115 meters (375 feet)
7
Security Awareness: Applying Practical Security in Your World, 2e 7
8
8
9
9 Transmitting Network Data Transmission Control Protocol/Internet Protocol (TCP/IP) –Most common set of protocols used on networks IP address –Uniquely identifies computer Packets –Used to transmit data through a computer network
10
Security Awareness: Applying Practical Security in Your World, 2e 10
11
Security Awareness: Applying Practical Security in Your World, 2e 11 Network Devices Network interface card (NIC) –Also called client network adapter –Hardware that connects a computer to a wired network Laptop computers –May use an internal NIC or an external NIC
12
Security Awareness: Applying Practical Security in Your World, 2e 12
13
Security Awareness: Applying Practical Security in Your World, 2e 13
14
Security Awareness: Applying Practical Security in Your World, 2e 14 Network Devices (continued) Access point (AP) –Contains an antenna and a radio transmitter/receiver to send and receive signals –Jack allows it to connect by cable to a standard wired network –Acts as base station for wireless network –Acts as bridge between wireless and wired networks Router –Directs packets towards their destination
15
Security Awareness: Applying Practical Security in Your World, 2e 15
16
Security Awareness: Applying Practical Security in Your World, 2e 16
17
Security Awareness: Applying Practical Security in Your World, 2e 17
18
Security Awareness: Applying Practical Security in Your World, 2e 18 Attacks on Networks Denial of service (DoS) attack –Attempts to make a server or other network device unavailable by flooding it with requests –Variants Smurf attack Distributed denial of service (DDoS) attack
19
Security Awareness: Applying Practical Security in Your World, 2e 19
20
Security Awareness: Applying Practical Security in Your World, 2e 20
21
Security Awareness: Applying Practical Security in Your World, 2e 21 Zombie and Botnets Computers that perform a DDoS and other network attacks –Often normal computers hijacked by attackers to carry out malicious network attacks Zombies –Can be put to work to send spam and messages used in phishing scams –Can act as hosts for fake Web sites
22
Security Awareness: Applying Practical Security in Your World, 2e 22 Man-in-the-Middle Attacks Attacker intercepts messages intended for a valid device Two computers appear to be communicating with each other –However, they are actually sending and receiving data with a computer between them
23
Security Awareness: Applying Practical Security in Your World, 2e 23
24
Security Awareness: Applying Practical Security in Your World, 2e 24 Hijacking and Spoofing Spoofing –Act of pretending to be legitimate owner when in reality you are not Media access control (MAC) address –Permanently recorded on network interface card when manufactured –Computers on network store a table Links IP address with corresponding MAC address
25
Security Awareness: Applying Practical Security in Your World, 2e 25
26
Security Awareness: Applying Practical Security in Your World, 2e 26
27
Security Awareness: Applying Practical Security in Your World, 2e 27 Sniffing Attacker captures packets as they travel through network Sniffer –Hardware or software that performs sniffing Attackers with sniffers –Can capture usernames, passwords, and other secure information without being detected
28
Security Awareness: Applying Practical Security in Your World, 2e 28
29
Security Awareness: Applying Practical Security in Your World, 2e 29
30
Security Awareness: Applying Practical Security in Your World, 2e 30 Network Defenses Primary defenses against network attacks –Devices that can thwart attackers –Designing layout or configuration of a network that will reduce the risk of attacks –Testing network security
31
Security Awareness: Applying Practical Security in Your World, 2e 31 Network Devices Firewalls –Designed to prevent malicious packets from entering network or computers Software firewall –Runs as a program on a local computer to protect it against attacks Hardware firewalls –Separate devices that protect an entire network –Usually located outside network security perimeter as the first line of defense
32
Security Awareness: Applying Practical Security in Your World, 2e 32
33
Security Awareness: Applying Practical Security in Your World, 2e 33 Firewalls Rule base –Foundation of a firewall –Establishes what action firewall should take when it receives a packet –Options Allow, Block, Prompt
34
Security Awareness: Applying Practical Security in Your World, 2e 34 Firewalls (continued) Stateless packet filtering –Looks at each incoming packet and permits or denies it based strictly on the rule base –Attackers can easily bypass the protection Stateful packet filtering –Keeps record of the state of a connection between an internal computer and an external server –Makes decisions based on the connection as well as rule base
35
Security Awareness: Applying Practical Security in Your World, 2e 35
36
Security Awareness: Applying Practical Security in Your World, 2e 36
37
Security Awareness: Applying Practical Security in Your World, 2e 37 Network Address Translation (NAT) Hides IP addresses of network devices from attackers As a packet leaves the network –NAT removes original IP address from sender’s packet and replaces it with an alias
38
Security Awareness: Applying Practical Security in Your World, 2e 38 Network Address Translation (NAT) (continued) NAT software –Maintains table of original address and corresponding alias address Process is reversed when packet is returned to the NAT
39
Security Awareness: Applying Practical Security in Your World, 2e 39
40
Security Awareness: Applying Practical Security in Your World, 2e 40 Intrusion Detection System Establishes and maintains network security for large organizations Monitors activity on the network and what packets are doing Performs specific function when it senses an attack –Such as dropping packets or tracing source of attack
41
Security Awareness: Applying Practical Security in Your World, 2e 41
42
Security Awareness: Applying Practical Security in Your World, 2e 42 Proxy Server Primary goal –To conceal the identity of computers within a protected network Can inspect data packets for viruses and other malicious content Intercepts requests sent to server and replaces original IP address with its own address
43
Security Awareness: Applying Practical Security in Your World, 2e 43
44
Security Awareness: Applying Practical Security in Your World, 2e 44 Network Design Demilitarized zone (DMZ) –Another network that sits outside the secure network perimeter Virtual private network –Creates a secure network connection over a public network
45
Security Awareness: Applying Practical Security in Your World, 2e 45
46
Security Awareness: Applying Practical Security in Your World, 2e 46 Wireless LAN Security Hotspots –Locations where wireless data services are available Advantages of WLANs –Do not restrict users to their desks to access network resources –Ease of installation
47
Security Awareness: Applying Practical Security in Your World, 2e 47 Wireless LAN Security (continued) Security concerns –Access to the wireless network –View wireless transmissions –Weaknesses in wireless security standards
48
Security Awareness: Applying Practical Security in Your World, 2e 48 Summary Purpose of a computer network –To allow computers and devices to share data, programs, and hardware Denial of service attack –Attempts to make a server unavailable by flooding it with requests Man-in-the-middle attack –Intercepts communication between two computers
49
Security Awareness: Applying Practical Security in Your World, 2e 49 Summary (continued) Firewall –Designed to prevent malicious packets from entering the network Demilitarized zone –Another network that sits outside the secure network perimeter Security for wireless LANs –Remains a primary concern for wireless users
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.