Network Security Techniques
-
Upload
vernon-vance -
Category
Documents
-
view
23 -
download
2
description
Transcript of Network Security Techniques
![Page 1: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/1.jpg)
Network Security
Techniquesby
Bruce Roy Millard
Division of Computing Studies
Arizona State University
![Page 2: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/2.jpg)
What is Network Security
• Hardware – computers, routers, etc
• Networks – ethernet, wireless
• Communication
• Intruders
• Mitigation
![Page 3: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/3.jpg)
What is Network Security
Hardware• Workstation
• Servers (and load balancers)
• Printers (and other shared devices)
• Routers/switches/hubs
• Security devices (firewalls, IDS, etc)
![Page 4: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/4.jpg)
What is Network Security
Networks• Connectivity
• Ethernet (cable, DSL, TP, 1Gbps & up)
• Wireless (radio waves, 802.11?, satellite)
• LAN, CAN, MAN, WAN, PAN
• Internet
![Page 5: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/5.jpg)
What is Network Security
Communication• E-mail
• FTP
• HTTP/HTML
• Voice, video, teleconferencing
• SSH/SCP
![Page 6: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/6.jpg)
What is Network Security
Intruders
![Page 7: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/7.jpg)
What is Network Security
Intruders• Eavesdroppers
• Insertion
• Hijacking
• Spoofing
• Denial of Service
• Trojan horse software
• Lurkers (viruses and worms)
![Page 8: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/8.jpg)
What is Network Security
Mitigation
• Prevent
• Avoid
• Detect
• Assess
• React
![Page 9: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/9.jpg)
Security Goals
• Privacy
• Integrity
• Non-repudiation
• Trust relationships – internal & external
• Authentication supports authorization supports fine-grained access control
![Page 10: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/10.jpg)
Security Model(Protection)
• Assets - identify
• Risks - characterize
• Counter-measures - obtain
• Policy – create where no laws exist
![Page 11: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/11.jpg)
Security Methods
• Shields – firewalls, virus scanners
• Selective shields - access control (VPN)
• Protocols – IPsec, SSL/TLS
• Intrusion Detection Systems
• Training & awareness
• Redundancy – backups, encryption, hashes, digests
![Page 12: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/12.jpg)
Prevention(Attempts)
• Firewalls – have holes• Virus Scanners – behind the times• Physical Security• Know Fundamentals – routing, IP, TCP, ARP,
DHCP, applications• Encryption – PGP, SSH, SSL/TLS, Ipsec,
stenography, public key, symetric key• Patches – windowsupdate, up2date, yum
![Page 13: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/13.jpg)
Avoidance
• Firewalls & VPNs – Ipsec, SSL, access control
• Host hardening – personal firewalls, ssh, iptables
• Proxy servers – squid (Web content cache)
• Honeynets/honeypots - redirection
![Page 14: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/14.jpg)
DetectionFeeds Avoidance
• Vulnerability Scanning – netstat, netview, netmon, nmap, Nessus
• Network-based IDS – snort, kismet, ACID, tcpdump, ethereal, windump, netstumbler
• Host-based IDS – TCPwrappers, xinetd, tripwire, logsentry, portsentry
• Web security, Cisco logs+
![Page 15: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/15.jpg)
Exploits
• Password cracking & WEP cracking• Denial of Service• OS typing – null session, xmas tree, . . .• OS configuration – sadmin password, . . .• Application holes – buffer overflow, NFS,
rpc, netbios, BIND, sendmail, CGI,etc
• Dumpsec, pingwar, . . .
![Page 16: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/16.jpg)
URLs of Interest
• http://www.sans.org
• http://www.giac.org
• http://www.isc2.org
• http://www.cissp.com
![Page 17: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/17.jpg)
10 Domains of the CBK
• Security Management Practices • Security Architecture and Models • Access Control Systems & Methodology • Application Development Security • Operations Security • Physical Security • Cryptography • Telecommunications, Network, & Internet Security • Business Continuity Planning • Law, Investigations, & Ethics
![Page 18: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/18.jpg)
NS Applications
• netstat
• tcpview
• netmon
• netstumbler
• windump
• nmap
• ethereal
• snortiquette
![Page 19: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/19.jpg)
www.sans.org/top20(vulnerabilities)
• Top Vulnerabilities to Windows Systems• W1 Web Servers & Services • W2 Workstation Service • W3 Windows Remote Access Services • W4 Microsoft SQL Server (MSSQL) • W5 Windows Authentication • W6 Web Browsers • W7 File-Sharing Applications • W8 LSAS Exposures • W9 Mail Client
• W10 Instant Messaging
![Page 20: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/20.jpg)
www.sans.org/top20(vulnerabilities)
• Top Vulnerabilities to UNIX Systems• U1 BIND Domain Name System • U2 Web Server • U3 Authentication • U4 Version Control Systems • U5 Mail Transport Service • U6 Simple Network Management Protocol (SNMP) • U7 Open Secure Sockets Layer (SSL) • U8 Misconfiguration of Enterprise Services NIS/NFS • U9 Databases • U10 Kernel
![Page 21: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/21.jpg)
![Page 22: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/22.jpg)
![Page 23: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/23.jpg)
![Page 24: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/24.jpg)
![Page 25: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/25.jpg)
![Page 26: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/26.jpg)
![Page 27: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/27.jpg)
![Page 28: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/28.jpg)
![Page 29: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/29.jpg)
![Page 30: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/30.jpg)
![Page 31: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/31.jpg)
![Page 32: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/32.jpg)
![Page 33: Network Security Techniques](https://reader035.fdocuments.us/reader035/viewer/2022070402/568137c0550346895d9f5f8a/html5/thumbnails/33.jpg)