Top Banner
Chapter 13 Network Security
32

Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

Dec 25, 2015

Download

Documents

Giles Stone
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

Chapter 13

Network Security

Page 2: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

2

Contents

• Definition of information security• Role of network security• Vulnerabilities, threats and controls• Network security controls for outgoing

information• Network security controls for incoming

information

Page 3: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

3

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Definition

• Network security is a component of information security

• Information security provides to information, the required levels of

Page 4: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

4

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Information security components

• Confidentiality means preserving authorized restrictions on information to protect personal privacy and proprietary information

• Integrity is to guard against improper modification or destruction of information, and ensures authenticity of information

• Availability is to ensure timely and reliable use of information

Page 5: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

5

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Why information security matters

• US economy increasingly reliant on services and information processing

• Most corporate information now stored only on computer systems

• Workflows increasingly dependent upon information systems

Page 6: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

6

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

General information security model

IT system

Information assets

Security

controls

Threat

Blocked threat

Thr

eat b

ecom

es s

ucce

ssfu

l atta

ck

Vulnerability

Threat

Page 7: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

7

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Information security model components

• Vulnerabilities– Weaknesses in an information system that could

be exploited. E.g. running insecure services• Threats

– Capabilities, intentions, and attack methods of adversaries to cause harm to information. E.g. SQL injection

• Controls

Page 8: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

8

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Definition

• Network security is the provision of information security in the presence of dangers created by computer networks

• Incoming data may hack into systems to read data, modify data or to disable systems

• Outgoing data may be read (confidentiality), modified (integrity) or simply blocked (availability)

Page 9: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

9

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Why network security matters

• Large parts of nation’s infrastructure connected to the network

• Damage can be very expensive– Hackers used weak wireless network security to

steal information on over 40 million credit cards from T J Maxx

– Company provisioned $480 million to settle claims

Page 10: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

10

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Network security controls by category

Category Incoming information

Outgoing information

Confidentiality Patching, authentication and authorization

Encryption

Integrity Firewalls Digital signatures

Availability Virus protection, end user training

Redundancy

Page 11: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

11

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Patching

• Software is very complex

• Developers issue updates when vulnerabilities become known

• Timely application of patches prevents many exploits

Page 12: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

12

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Authentication and authorization

• Authentication is the verification of claimed identity

• Authorization grants rights to users to read, write and manipulate specific information

Page 13: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

http://www.microsoft.com/protect/fraud/passwords/create.aspx

13

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Good passwords

• Good passwords prevent intruders from being able to guess passwords.

• Recommendations from Microsoft:– Include characters other than just the alphabets– Actual names or words should be avoided– Passwords should be longer than 5 characters– Passwords should be changed regularly

Page 14: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

14

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Firewalls

• Computer that lies between two networks and regulates traffic between networks – Protects internal network from electronic attacks

originating from external network

Firewall

Local network

Inte

rne

t

Page 15: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

15

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Firewalls

• Examine every packet entering or leaving the network

• Administrators can specify which packets can pass the firewall

Page 16: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

16

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Firewalls

• First steps– Block insecure services (eg. telnet, ftp)– Block blacklisted networks– Allow access to trusted services

– Allow access to safe services

Page 17: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

17

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Firewalls – common configuration

• Public services are located in de-militarized zone

• Internal network blocked to outside world

Internet

DMZ

Internal network

www

DNS

email

Page 18: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

18

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Anti-virus programs

• Viruses and worms are programs that cause harm to computers

• Of all threats, viruses cause the greatest financial losses to organizations

• Modern viruses attack most targets within minutes of being launched

• Patching eliminates many targets for worms• Anti-virus programs should be constantly updated

Page 19: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

19

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

End user training

• Important component of all security efforts

• Suspicious looking email may carry a virus

• Be very careful with email attachments

• Only provide usernames and passwords on trusted web sites

Page 20: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

20

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Encryption

• Rendering information unintelligible in a way so that it may later be restored to intelligible form– Readable information is called plaintext– Encrypted information is called ciphertext

• Involves 2 components: Algorithm and key– Algorithm is the process to create ciphertext– Key controls operations of algorithm

• 2 broad types: symmetric key, asymmetric key

Page 21: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

21

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Encryption

Enemy 2

BobAlice

Enemy 1

EncryptionHello (plain text)

→IFMMP (cipher text)

DecryptionIFMMP (cipher text)

→Hello (plain text)

Page 22: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

22

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Symmetric key encryption

• Same key used for encryption and decryption– Example

• cat → dbu• Encrypted character = plaintext character + 1• Decrypted character = encrypted character – (+1)• dog → ?

• Current standard: Advanced Encryption Standard (AES)

• Major problem: How do you exchange the key?

Page 23: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

23

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Asymmetric key encryption

• Key exchange over network is unsafe in symmetric key encryption– Enemies can read key when it is transmitted

• Asymmetric key encryption uses one key for encryption and another key for decryption– Encryption key made public

• Most asymmetric key encryption algorithms use modulus operation– e.g. 21 mod 10 = 1

Page 24: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Asymmetric key encryption example

Example based on Network Security: Private Communication in a Public World (2E), by Charlie Kaufman, Radia Perlman and Mike Speciner

0 1 2 3 4 5 6 7 8 90 0 0 0 0 0 0 0 0 0 01 0 1 2 3 4 5 6 7 8 92 0 2 4 6 8 0 2 4 6 83 0 3 6 9 2 5 8 1 4 74 0 4 8 2 6 0 4 8 2 65 0 5 0 5 0 5 0 5 0 56 0 6 2 8 4 0 6 2 8 47 0 7 4 1 8 5 2 9 6 38 0 8 6 4 2 0 8 6 4 29 0 9 8 7 6 5 4 3 2 1

Plain text

Ciphertext=

plaintext * 3 mod 10

Page 25: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

25

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Asymmetric key example

• Decryption can be done as– Plaintext = ciphertext * 7 mod 10– e.g. 9 * 7 mod 10 = 63 mod 10 = 3

• Thus, encryption key = (3, 10); decryption key = (7, 10) in the example

• In real world, choose very large numbers– 1,024 – 2,048 bits

• Popular algorithm is RSA

Page 26: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

26

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Digital signature

• Used to verify integrity• If sender encrypts information with own

private key, reader can decrypt with sender’s public key– If enemy modifies information en route,

decryption will fail

– Generally, send encrypted message digest

Page 27: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

27

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Confidentiality and integrity with asymmetric key encryption

Enemy 2

BobAlice

Decryption

Use Bob’s private key to decrypt and

read message

Encryption

Use Bob’s public key to encrypt

message before sending

Integrity check

Use Alice’s public key to decrypt

digest. Compare with locally

computed digest

Integrity

Compute digest. Encrypt digest with Alice’s private key

before sending

Enemy 1

Page 28: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

28

Inbound confidentialityIntroduction Inbound

integrityInbound

availabilityOutbound

confidentialityOutbound integrity

Outbound availability

Redundancy

• Surplus capacity to improve availability

• Commonly used for network services such as DNS, web, email

• Example of network redundancy shown in figure

Page 29: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

Summary

• Network security is a component of an organization’s overall information security effort

• Network security controls mitigate risks from threats in network

• Network security controls defend data leaving the organization and hacking attempts emerging from outside the organization

Page 30: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

Case study – T J Maxx

• Between 2003 and 2007, Albert Gonzalez and his collaborators exploited weaknesses in T J Maxx’ implementation of wireless technology to steal information on over 40 million credit cards– Gonzalez was an informer

• For the US Secret Service

• Settlements exceeded $65 mn

Page 31: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

Hands-on exercise

• Wireshark– Monitoring SSL transaction in Wireshark

Page 32: Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.

Network design

• Use of security technologies– Firewalls– VPN– Encryption