Top Banner
Ensuring Network Security Physical Security • Ciphering • Authentication • Integrity • Firewalls Data Security – Passwords – Auditing • Sniffing • Viruses
49

Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Ensuring Network Security

• Physical Security• Ciphering• Authentication• Integrity• Firewalls • Data Security

– Passwords– Auditing

• Sniffing• Viruses

Page 2: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Physical Security

• Access to hardware– Locked Doors– Locked Cabinets

• Access to the system console– Screen Passwords– Locked keyboards (removing keyboard)

• Access to network wiring/switches/routers

Page 3: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Physical Environment

• Power source

• Noise sources

• Air conditioning (temperature control)

• Dust and smoke

• Water problems (flood possible?)

Page 4: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Network Security

• Confidentiality

• Authentication

• Message integrity and nonrepudiation (modification, deletion, or insertion)

• Availability and access control

Page 5: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Cryptography/Ciphers

• Simple cipher

– ABCDEFGHIJKLMNOPQRSTUVWXYZ– MNOPQRSTUVWXYZABCDEFGHIJKL– “Secret Message” crypted “EQODQF YQEEMSQ”

• Better cipher– ABCDEFGHIJKLMNOPQRSTUVWXYZ

– FGHIJKLMNOPQRSTUVWXYZABCDE C1(k=5)

– TUVWXYZABCDEFGHIJKLMNOPQRS C2(K=19)

– Crypt Codes C1,C2,C1,C2,etc.

– “Secret Message” = “XXHKJM RXXLFZJ”

Page 6: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Decrypting

• Simplest– Use the frequency of characters– E 12.88 N 6.94 R 5.97 C 2.75 G 1.87– V 0.99 Q 0.11 T 9.31 I 6.92 D 4.07– M 2.56 P 1.85 K 0.61 Z 0.06 A 8.03– S 6.36 L 4.00 F 2.53 Y 1.73 X 0.22 – O 7.62 H 6.00U 2.83 W 2.06 B 1.60– J 0.13 

• Find the most commonly used character and insert it into the sentence.

Page 7: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Downsides

• The encryption systems are too simple (easy to crack)

• The keys must be distributed to the users

• Ciphers don’t change with time (same each day until news keys are distributed)

• Faster computing provides faster cracking algorithms.

Page 8: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Encryption

• DES (Digital Encryption Standard)• AES (Advanced Encryption Standard)• Secure Shells• Secure Web Pages• Pretty Good Privacy

– Private Keys– Publics– Signatures

Page 9: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

DES/AES

• Data Encryption Standard

• Advanced Encryption Standard

Page 10: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

How safe is encryption?

• 4 character password (alphabetic characters only) cracking time (maybe a minute on a 450mhz computer)

• 40 bit key (can be cracked in 24hours on a parallel computing system)

• 128 bit key (probably not able to be cracked in a millennium)

Page 11: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Pretty Good Privacy

• Encryption of keys– 40 bit– 128 bit

• Creating your authenticated signature

• Your key ring

• Submitting your public key to a database

• Email and PGP

Page 12: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

PGP System

PGPEncryption

User 1

International Database

PGPDecryption

Private keyPublic keys

Message can be entirely encrypted or Just the signature can be encrypted.

User 2

Key RingKey Ring

Data

Page 13: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Authentication

• Simple: “I am Alice”, Bob believes the message

– It is very easy to lie!

• Next: Alice is on a “known” IP address, Bob believes Alice because the message header contains the address.

– Address SPOOFING

• Better: Alice gives Bob her password

– Hacker records the conversation and plays it back (playback attack)

• Best: Public Key/Private Key– “Man in the middle attack”

Page 14: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Man in the middle Attack

Page 15: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Integrity

• Digital Signatures

Page 16: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Key Distribution and Certification

• Trusted intermediary

• Key Distribution Center (KDC)– Repository of public keys

• Certification Authority (CA)– Certificate creation and authentication

Page 17: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Firewalls

• Purpose• Disadvantages

– Slowdown of packets– Inconvenient for users

• Advantages– Slows down hacking attempts– Limits incoming traffic– Overcomes IP number limitations (NAT)

Page 18: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Firewalls (cont.)

• Setup– IPTABLES– ZoneAlarm– Addressing– Name Service

• Proxies– E-mail– Web– FTP

Page 19: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Types of attacks

• Packet Sniffing• Spoofing

– Stealing and copying IP addresses

• Denial of Service (DOS)– Syn flooding

• Distributed Denial of Services (DDOS)– Numerous hosts operating concurrently

• Hijacking

Page 20: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Sniffers

• Sniffer, Snoop, Tcpdump, Ethereal

• Promiscuous mode

• Many protocols

• Interpretation

Page 21: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Data Security

• Share Level Security vs. User Level Security• Proper passwords

– Length

– Uncommon names

– Use of non alphanumeric characters

– Controlled access (Screen/Keyboard Locks)

• Use of a Routed vs. Flat network architecture• Audit use of the system

Page 22: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Security Planning

• Unauthorized access

• Electronic Tampering

• Theft

• Intentional damage

• Unintentional damage

Page 23: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Auditing

• Check for System Logs for:– Logon attempts– Connection to resources– Connection termination– Directory creation, modification, or deletion– Server events and modifications– Password changes

Page 24: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Microsoft Gotchas

• Microsoft operating systems have a tendency to store passwords on the local hard disk in the Windows registry to save time when logging in to remote services. This can be quite dangerous!

Page 25: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Flat Network

User 1:129.123.7.56

User 2:129.123.3.88

User 3:129.123.6.123

Hub

Monitor seessome traffic from

all 3 users

Internet

Page 26: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Routed Network

Router

Monitor can’t see traffic other than it’s own subnet

User 1:Subnet 7 User 2:Subnet 3

User 3:Subnet 6

Monitor onSubnet 1

Internet

Page 27: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Login Security

• Usernames/Passwords may be in plain text over the network

• Email security– Netscape/Eudora leave configuration files on

each PC.– Webmail is an IMAP interface to a mail server

• can use SSL for security

Page 28: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Secure Shell (SSH)

• Use of encryption based on keys/certificates

• Block undesired hosts from accessing

• All data on the wire is encrypted

• Can be used for interactive communication and copying files

Page 29: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Secure Web Sites

• SSL/TLS– Secure Sockets Layer, Transport Layer Security

• Keys/Cookies– New key/encryption code for each access

• Encryption of data over the wire

• Keep track of trusted hosts that access the site.

Page 30: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

SSL Handshake

Page 31: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

IPsec

• This is Network Layer confidentiality

• Authentication Header (AH)

• Encapsulation Security Protocol (ESP)

• Security Parameter Index (SPI)

• Security association (SA)

• Internet Key Exchange (IKE)

Page 32: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

IPsec Headers

ESP Headers

Page 33: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Viruses/Trojans/Macros

• Viruses spread by:– Removable media– downloaded files– Email

• Viruses are removed by:– Deleting the affected file– Running a virus scanning/cleaning program

Page 34: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Companion Viruses

• Looks like a real program (WORD.EXE)

• Make replace a logon program and grab usernames/passwords

• Usually renames the actual executable and calls that executable from the bogus program.

Page 35: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Macro Viruses

• The virus infects the Macro definitions of a program (like Microsoft Word) and then infects every document created by the original program.

• These viruses are difficult to detect because they haven’t infected an executable program.

Page 36: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Polymorphic Viruses

• These change appearance every time they replicate. They may even change each time the computer is rebooted.

• Since they change frequently, virus checkers have a hard time determining a pattern or fingerprint of the virus.

Page 37: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Stealth Virus

• These hide from detection

• They may use hidden files or may modify the operating system so a standard directory scan doesn’t show the virus file.

• They also return false information to virus checkers.

Page 38: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Trojans

• Trojan Horses– Look like a benign game or program– After a period of time they execute the virus

• Some may be cleaned with virus protection software.

• Some masquerade as Windows programs and removal will crash the system

Page 39: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Back Doors

• Provide access to system through published, unused, or unpublished ports.

• Sometimes are put there by programmers, engineers, or hackers

• They are hard to protect against unless you can find their access port and firewall protect against it.

Page 40: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Virus Consequences

• Can’t boot

• Data is scrambled or unreadable

• Erratic or slow operation of the computer

• Computer is used as a distribution agent

• Excessive disk activity

• Disk drive is erased or data is lost.

• Disk is reformatted

Page 41: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Virus Protection

• Test each disk write for a particular pattern unique to the virus

• Test for writes to the disk boot block

• Test for code that might access PC hardware

• Scan files for virus patterns

Page 42: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

D.O.S. Attacks

• Denial of Service

• Flood of useless packets/data

• Hard/Impossible? To track

• Can a firewall protect the network?

Page 43: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

D.D.O.S. Attacks

• Distributed Denial of Service

• Many servers running in parallel

• Hard/Impossible? To track

• Good example of distributed computing

• How do we stop it?

Page 44: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Email Virus

• Use innocent email messages as the transport.

• Grab address book entries to spread

• Infect critical windows programs

• The user doesn’t know he is infecting others

• Can be prevented by using email front end scanners and filtering outgoing mail.

Page 45: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Backups

• What kind of backup system should we use?• Even a fault tolerant disk system can fail!• Always back up• Rotate several copies of backups in case one tape

is unreadable• Check the backups to see if they are readable• Store the tapes or removable media in a safe place

Page 46: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Backup Strategy

• Full Backup

• Incremental Backup

• Copy

• Daily Copy

• Logging– Date, tape-set number, type, which computer

Page 47: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Disaster Recovery

• Prevention– What can I control?– What is the best method?– Keep updating your prevention methods– Keep up on maintenance– Training!

Page 48: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Disaster Preparation

• Plan ahead

• Use fault tolerance equipment

• Maintain backups

• Test your preparation plan!

Page 49: Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.

Network Security

Remember Homework 4 on the Web page!