Top Banner
Basic Security Architecture
43

Basic Security Architecture. Secure Network Layouts.

Dec 14, 2015

Download

Documents

Keenan Foulke
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Basic Security Architecture. Secure Network Layouts.

Basic Security Architecture

Page 2: Basic Security Architecture. Secure Network Layouts.

Secure Network Layouts

INTERNET

Router

Switch

Server subnet User subnet(s)

Page 3: Basic Security Architecture. Secure Network Layouts.

Secure Network Layouts (2)

INTERNET

Router

Switch

Server subnet User subnet(s)

FIREWALL appliance

Page 4: Basic Security Architecture. Secure Network Layouts.

Secure Network Layouts (3)

INTERNET

Router

Switch

Server subnet User subnet(s)

FIREWALL appliance

FIREWALL appliance

SwitchWeb Server

DMZ

Page 5: Basic Security Architecture. Secure Network Layouts.

Firewall

• Packet filter• Stateful• Application proxy firewalls• Implementation:

– iptables

Page 6: Basic Security Architecture. Secure Network Layouts.

Firewall rules

Page 7: Basic Security Architecture. Secure Network Layouts.

File & Dir permissions

• Chown• Chmod• Chgrp

Page 8: Basic Security Architecture. Secure Network Layouts.

Physical Security

• Dealing with theft and vandalism• Protecting the system console• Managing system failure

– Backup– Power protection

Page 9: Basic Security Architecture. Secure Network Layouts.

Physical Solutions

• Individual computer locks• Room locks and “keys”• Combination locsks• Tokens• Biometrics• Monitoring with cameras

Page 10: Basic Security Architecture. Secure Network Layouts.

Disaster Recovery Drills

• Making test– Power failure– Media failure– Backup failure

Page 11: Basic Security Architecture. Secure Network Layouts.

Information gathering

Page 12: Basic Security Architecture. Secure Network Layouts.

How

• Social Engineering• What is user and

password ?

– Electronic Social engineering: phising

Page 13: Basic Security Architecture. Secure Network Layouts.

Using published information

• Dig• Host• whois

Page 14: Basic Security Architecture. Secure Network Layouts.

Port scanning

• Nmap– Which application

running

Page 15: Basic Security Architecture. Secure Network Layouts.

Network Mapping

• Icmp– Ping– traceroute

Page 16: Basic Security Architecture. Secure Network Layouts.

Limiting Published Information

• Disable unnecessary services and closing port– netstat –nlptu– Xinetd

• Opening ports on the perimeter and proxy serving– edge + personal

firewall

Page 17: Basic Security Architecture. Secure Network Layouts.

Securing from Rootkit, Spoofing, DoS

Page 18: Basic Security Architecture. Secure Network Layouts.

Rootkit

Let hacker to:• Enter a system at any time• Open ports on the computer• Run any software• Become superuser• Use the system for cracking other

computer• Capture username and password• Change log file• Unexplained decreases in available disk

space• Disk activity when no one is using the

system• Changes to system files• Unusual system crashes

Page 19: Basic Security Architecture. Secure Network Layouts.

Spoofprotect

Debian way to protect from spoofing• /etc/network/options

• Spoofprotect=yes

• /etc/init.d/networking restart

Page 20: Basic Security Architecture. Secure Network Layouts.

DoS preventive

• IDS• IPS• Honeypots

• firewall

Page 21: Basic Security Architecture. Secure Network Layouts.

Intrusion Detection Software (IDS)

• Examining system logs (host based)• Examining network traffic (network based)• A Combination of the two• Implementation:

– snort

Page 22: Basic Security Architecture. Secure Network Layouts.

Intrusion Preventions Software (IPS)

• Upgrade application• Active reaction (IDS = passive)• Implementation:

– portsentry

Page 23: Basic Security Architecture. Secure Network Layouts.

Honeypots (http://www.honeynet.org)

Page 24: Basic Security Architecture. Secure Network Layouts.

Securing from Malware

Page 25: Basic Security Architecture. Secure Network Layouts.

Malware

• Virus• Worm• Trojan horse• Spyware

• On email server :– Spamassassin, ClamAV, Amavis

• On Proxy server– Content filter using squidguard

Page 26: Basic Security Architecture. Secure Network Layouts.

Securing user and password

Page 27: Basic Security Architecture. Secure Network Layouts.

User and password

• Password policy• Strong password• Password file security

– /etc/passwd, /etc/shadow• Password audit

– John the ripper• Password management software

– Centralized password– Individual password management

Page 28: Basic Security Architecture. Secure Network Layouts.

Securing Remote Access

Page 29: Basic Security Architecture. Secure Network Layouts.

Remote access

• Telnet vs SSH• VPN

– Ipsec• Freeswan• Racoon

– CIPE– PPTP– OpenVPN

Page 30: Basic Security Architecture. Secure Network Layouts.

Wireless Security

• Signal bleed & insertion attack• Signal bleed & interception attack• SSID vulnerabilities• DoS• Battery Exhaustion attacks - bluetooth

Page 31: Basic Security Architecture. Secure Network Layouts.

Securing Wireless-LAN

Page 32: Basic Security Architecture. Secure Network Layouts.

802.11x security

• WEP – Wired Equivalency Privacy• 802.11i security and WPA – Wifi Protected

Access• 801.11 authentication • EAP (Extensible Authentication Protocol)• Cisco LEAP/PEAP authentication• Bluetooth security – use mode3

Page 33: Basic Security Architecture. Secure Network Layouts.

Hands on for Wireless Security• Limit signal bleed• WEP• Location of Access Point• No default SSID• Accept only SSID• Mac filtering

• Audit• DHCP• Honeypot• DMZ wireless

Page 34: Basic Security Architecture. Secure Network Layouts.

Securing Network using Encryption

Page 35: Basic Security Architecture. Secure Network Layouts.

Encryption

• Single key – shared key– DES, 3DES, AES, RC4 …

• Two-key encryption schemes – Public key– PGP

• Implementation– HTTPS

Page 36: Basic Security Architecture. Secure Network Layouts.

EEPIS-ITS secure network

Page 37: Basic Security Architecture. Secure Network Layouts.

INTERNET

FIREWALL

E-MAIL

FILESERVER EIS

WWWDOMAIN NOC

MULTILAYERSWITCH

ROUTER-GTW

Traffic MonitoringCACTIHttp://noc.eepis-its.edu

EEPISHOTSPOT

PROXY LECTURER, EMPLOYEE

STUDENTS Internal ServerEEPIS-INFORMATION SYSTEM (EIS http://eis.eepis-its.edu)Http://fileserver.eepis-its.edu

DMZ

E-Mail serverHTTPS, SPAM (Spamassassin), Virus Scanner (ClamAV)

PROXY (Squid)All access to Internet must through Proxy

FIREWALL-IDSLinux bridge, iptables shorewall, snort, portsentry, acidlab

CISCO RouterUsing acl, block malware from outside

L3 SwitchBlock malware on physical port from inside network

All Server in DMZManage using SSH, Secure Webmin

SQL Database (MySQL)Access only from localhost (127.0.0.1)

EEPISHOTSPOTAccess from wifi, signal only in EEPIS campusAuthentication from Proxy

Managable SwitchsBlock unwanted user from port, manage from WEB

Page 38: Basic Security Architecture. Secure Network Layouts.

Router-GTW

• Cisco 3600 series• Encrypted password• Using “acl”

Page 39: Basic Security Architecture. Secure Network Layouts.

Linux Firewall-IDS

• Bridge mode– Iface br0 inet static

• Address xxx.xxx.xxx.xxx• Netmask yyy.yyy.yyy.yyy• Bridge_ports all

• Apt-get install snort-mysql webmin-snort snort-rules-default acidlab acidlab-mysql

• Apt-get install shorewall webmin-shorewall• Apt-get install portsentry

Page 40: Basic Security Architecture. Secure Network Layouts.

Multilayer switch• Cisco 3550

CSC303-1#sh access-listsExtended IP access list 100 permit ip 10.252.0.0 0.0.255.255 202.154.187.0

0.0.0.15 (298 matches) deny tcp any 10.252.0.0 0.0.255.255 eq 445 (1005

matches)Extended IP access list CMP-NAT-ACL Dynamic Cluster-HSRP deny ip any any Dynamic Cluster-NAT permit ip any any permit ip host 10.67.168.128 any permit ip host 10.68.187.128 any

Page 41: Basic Security Architecture. Secure Network Layouts.

NOC for traffic monitoring

Page 42: Basic Security Architecture. Secure Network Layouts.

E-Mail

ClamAV

VirtualMAP

Open relayRBLSPF

User AUser BUser C

Spamasassin

Courierimap

AmavisSmtp

Parsing

SmtpPostfix

Quarantine

http 80

Securehttps443

Pop beforesmtp

Pop 3courier

ok

Outlook/

Squirrelmail

ok

maildir

Y Y

N

DNSSERVER

secure

insecure

reject

N

DIAGRAM ALUR POSTFIX

Page 43: Basic Security Architecture. Secure Network Layouts.

Policy

• No one can access server using shell• Access mail using secure webmail• Use proxy to access internet• No NAT• 1 password in 1 server for many applications