Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Security Aspect of Social Engineering Justin Steele.

Similar presentations


Presentation on theme: "The Security Aspect of Social Engineering Justin Steele."— Presentation transcript:

1

2 The Security Aspect of Social Engineering Justin Steele

3 Firewalls

4 Definitions Firewall - “a host that mediates access to a network, allowing and disallowing certain types of access on the basis of a configured security policy.” Firewall - “a host that mediates access to a network, allowing and disallowing certain types of access on the basis of a configured security policy.” DMZ – “a portion of the network separates a purely internal network from an external network.” DMZ – “a portion of the network separates a purely internal network from an external network.” Proxy – “an intermediate agent or server that acts on behalf of an endpoint without allowing a direct connection between the two endpoints.” Proxy – “an intermediate agent or server that acts on behalf of an endpoint without allowing a direct connection between the two endpoints.” Bastion Host – “a system identified as a critical strong point in the network’s security.” Bastion Host – “a system identified as a critical strong point in the network’s security.”

5 Design Goals All traffic between the internal and external network must go through the firewall. All traffic between the internal and external network must go through the firewall. Only authorized traffic is allowed to pass through. Only authorized traffic is allowed to pass through. The firewall itself is immune to penetration. The firewall itself is immune to penetration. Small and simple enough for rigorous analysis Small and simple enough for rigorous analysis

6 Control Techniques Service Control – determines the types of services allowed. Service Control – determines the types of services allowed. Direction Control – determines the direction in which services may be initiated. Direction Control – determines the direction in which services may be initiated. User Control – determines which activities are allowed based on the user. User Control – determines which activities are allowed based on the user. Behavior Control – determines how services are used. Behavior Control – determines how services are used.

7 Types of Firewalls Filtering Firewall – performs access control based packet header attributes, such as destination and source addresses, ports, and other various options. (Routers) Filtering Firewall – performs access control based packet header attributes, such as destination and source addresses, ports, and other various options. (Routers) Protects against IP address spoofing, source routing attacks, and tiny fragment attacks. Protects against IP address spoofing, source routing attacks, and tiny fragment attacks. Stateful Inspection Firewall – tightens security by keeping track of outbound connections. Only allows incoming traffic to high-numbered ports for packets that conform to the entries in the directory. Stateful Inspection Firewall – tightens security by keeping track of outbound connections. Only allows incoming traffic to high-numbered ports for packets that conform to the entries in the directory.

8 Types of Firewalls Continued Proxy Firewall – uses proxies to perform access control. This type of firewall can base control on the contents of packets and messages, as well as on attributes of the packet headers. (Application Proxy, Application-Level Gateway, Guard) Proxy Firewall – uses proxies to perform access control. This type of firewall can base control on the contents of packets and messages, as well as on attributes of the packet headers. (Application Proxy, Application-Level Gateway, Guard) Circuit-Level Gateway – Like a proxy firewall, but once connections are established it does not examine contents. Just determines what connections are allowed. Circuit-Level Gateway – Like a proxy firewall, but once connections are established it does not examine contents. Just determines what connections are allowed. Personal Firewall – application that runs on workstations to block unwanted traffic. Personal Firewall – application that runs on workstations to block unwanted traffic.

9 Limitations A firewall can not protect against attacks that bypass the firewall. A firewall can not protect against attacks that bypass the firewall. A firewall does not protect against internal threats. A firewall does not protect against internal threats. The firewall does not protect against virus- infected files. The firewall does not protect against virus- infected files.

10 Network Setups

11

12 How a Firewall Can Protect Against a SYN Flood Intermediate Hosts Intermediate Hosts The SYN Flood is handled before it reaches the firewall. The SYN Flood is handled before it reaches the firewall. Examples - Cisco Routers and Synkill Examples - Cisco Routers and Synkill TCP State and Memory Allocations TCP State and Memory Allocations Make availability of space more likely. Make availability of space more likely. Examples – SYN Cookies and adaptive time-out Examples – SYN Cookies and adaptive time-out

13 References Bishop, M. (2003). Computer Security, Art and Science. Boston: Addison Wesley. Bishop, M. (2003). Computer Security, Art and Science. Boston: Addison Wesley. Campus Firewall, Frequently Asked Questions. Retrieved March 30 th, 2003, from http://netman.cis.mcmaster.ca/firewallfaq.htm Campus Firewall, Frequently Asked Questions. Retrieved March 30 th, 2003, from http://netman.cis.mcmaster.ca/firewallfaq.htm Pfleeger, C., & Pfleeger, S. (2003). Security in Computing. New Jersey: Prentice Hall. Pfleeger, C., & Pfleeger, S. (2003). Security in Computing. New Jersey: Prentice Hall. Stallings, W. (2003). Network Security Essentials, Applications and Standards. New Jersey: Prentice Hall. Stallings, W. (2003). Network Security Essentials, Applications and Standards. New Jersey: Prentice Hall.

14


Download ppt "The Security Aspect of Social Engineering Justin Steele."

Similar presentations


Ads by Google