Top Banner
Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen
33

Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Dec 29, 2015

Download

Documents

Abner Holt
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Network Security

Group Members

Jason VaughanAnna Libman

Daliah StephanJames Doliente

Alan Yuen

Page 2: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Content

• Types of attackers• Attacks requiring protection• IT response to intrusions• Wireless network security• VPN• Hardware firewall• Software firewall

Page 3: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Types of attackers• Wizard Internet Hackers

– Highly capable attackers

• Amateurs • Criminals

– Theft of credit card numbers, trade secrets, and other sensitive information

– Sell the information or attempt extortion to prevent the release of the information

– Industrial and government espionage spies

• Employees

– Dangerous because of internal knowledge and access

• Information Warfare and Cyber terrorism

– Massive attack by a government or terrorist group against a country’s IT infrastructure

Page 4: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Attacks requiring protection• Hacking Servers - Attractive because of the data they store

• Hacking Clients - Attractive because of their data or as a way to attack other systems by using the hacked client as an attack platform

• Denial-of-Service (DoS) Attacks

– Make the system unavailable (crash it or make it run very slowly) by sending one message or a stream of messages. Loss of availability

• Scanning Attacks– Attacker sends messages to select victims and attack methods

– Examines data that responses reveal• IP addresses of potential victims• Host’s operating system, version number, etc.

• Malicious Content– Viruses - Infect files; propagate by executing infected program -

Payloads may be destructive

– Illegal content: pornography, sexual or racial harassment

– Spam (unsolicited commercial e-mail)

Page 5: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

IT Response to Intrusion

• Inspect systems to determine damage

• Remove hostile or destructive code

• Reload necessary operating system software

• Restore configurations

• Restore and test operations

• Patch system to reduce vulnerability

• Inspect files to determine damage

• Restore files from backup if necessary

• Confirm with users that data is restored

Page 6: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Wireless network security

• Attackers can lurk outside your premises.• The range of an access point often

extends further than your own household.• A passer-by or neighbor could be within

connection range. • By default, security on 802.11 WLAN NICs

and access points is turned off, making external attacks possible.

Page 7: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Ways to Protect Wireless Network

• Disable SSID Broadcasting.

• Use (WEP) Encryption.

• Control Access by MAC & IP Addresses.

• Minimize the Range of your Access Point.

Page 8: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Disable SSID Broadcasting

• Access points send out a SSID that can be detected by wireless clients.

• SSID identifies the name of the network and essentially invites wireless cards within range to join the network.

• Unless the other person knows your network name, your wireless network is practically invisible when SSID broadcasting is disabled.

• When you disable broadcasting, you must configure each wireless client with the exact name of the network.

Page 9: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Disable SSID Broadcasting

Page 10: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Use (WEP) Encryption

• Most access points offer at least 64-bit WEP key encryption, and some offer 128-bit encryption.

• Wired Equivalent Privacy (WEP) can be penetrated by determined hackers.

• WEP will prevent casual "packet sniffers" from intercepting wireless data packets floating around on your network.

• WEP wraps data packets using obscure ciphering algorithms based on an electronic key, a series of alphanumerical or hexadecimal characters.

• The receiving system must have a matching key in order to decipher the data packet.

Page 11: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Use WEP Encryption

Page 12: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Control Access by MAC & IP Addresses

• Each network adapter has a MAC address that uniquely identifies that device on the network.

• Most access points allow you to limit which MAC addresses can access the network.

• If DHCP services are enabled, you may also restrict access based on IP addressing.

• You can limit the number of simultaneous DHCP clients to match the number of systems you use on your network.

• Configure each client manually with a static (permanent) IP address and allow access only for those particular addresses.

Page 13: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Control Access by MAC & IP Addresses

Page 14: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Minimize the range of your Access Point

• Place the access point in a central location. • Minimize coverage outside of your property.

• Optimal spot is normally near the center of your property and near ground level.

Page 15: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

New Security Technology

• Wi-Fi Protected Access (WPA) – New wireless network security

protocol, IEEE 802.11i – Will boost security and allow for

easier configuration.– Overcomes limitations of WEP.

Page 16: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

VPN

• Virtual Private Network:

Definition: a way to simulate a private network over a public network (Internet).

Allow creation of a secure, private network over a public network such as the Internet.

IPSec is the mostly used protocols for VPN. IPSec technology is based on modern

cryptographic technologies, making very strong data authentication and privacy guarantees possible.

Page 17: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

VPN (Cont.)

• Advantages of VPN:

Lower cost Remote access Platform independent Can be used both as extranet and intranet

Page 18: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

VPN (Cont.)

• Disadvantages of VPN:

Inconsistent remote access performance due to changes in Internet connectivity.

No entrance into the network if the Internet connection is broken.

Page 19: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

VPN (Cont.)

SBC Network

Focal'sWAN

CISCOSYSTEMS

CISCOSYSTEMS

CISCOSYSTEMS

CISCOSYSTEMS

CISCOSYSTEMS

Gateway

Houston

Chicago

Atlanta

New YorkInternet

CorporateOffice

CISCOSYSTEMSInternet Router

Firewall 1

192.168.20.0

PBX

192.168.20.1

10.10.10.254

OTM ServerCall Accounting

Call PilotVoice Mail

30.18.20.0

192.194.1.1192.194.2.1192.194.4.1192.194.5.1

1.2

2.2

4.2

5.2

192.158.1.1

192.168.21.1

192.158.2.1192.168.22.1

192.158.4.1192.168.24.1

192.158.5.1192.168.25.1

29 20

200

??

RAS Microsoft NT

User

PRI23v 1D

VPN

Page 20: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Hardware Firewall

• What is it?• What it does.• An example.• Firewall use.• What it protects you from.

Page 21: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Hardware Firewall (Cont.)

• What is it?

It is just a software firewall running on a dedicated piece of hardware or specialized device.

Basically, it is a barrier to keep destructive forces away from your property.

You can use a firewall to protect your home network and family from offensive Web sites and potential hackers.

Page 22: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Hardware Firewall (Cont.)

• What it does !

It is a hardware device that filters the information coming through the Internet connection into your private network or computer system.

An incoming packet of information is flagged by the filters, it is not allowed through.

Page 23: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Hardware Firewall (Cont.)

• An example !

Page 24: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Hardware Firewall (Cont.)

• Firewalls use:

Firewalls use one or more of three methods to control traffic flowing in and out of the network:

– Packet filtering – Proxy service– State-full inspection

Page 25: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Hardware Firewall (Cont.)

• Packet filtering - Packets are analyzed against a set of filters.

• Proxy service - Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa.

• State-full inspection – It compares certain key parts of the packet to a database of trusted information. Information traveling from inside to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics.

Page 26: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Hardware Firewall (Cont.)• What it protects you from:

– Remote logins– Application backdoors– SMTP session hijacking– E-mail Addresses– Spam– Denial of service– E-mail bombs E-mail sent 1000’s of times till mailbox is full Macros Viruses

Page 27: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Software Firewall• What it is?

– Also called Application Level Firewalls– It is firewall that operate at the Application

Layer of the OSI– They filter packets at the network layer – It Operating between the Datalink Layer and

the Network Layer – It monitor the communication type (TCP, UDP,

ICMP, etc.) as well as the origination of the packet, destination port of the packet, and application (program) the packet is coming from or headed to.

Page 28: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Software Firewall (Cont.)• How does software firewall

works ?

Page 29: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Software Firewall (Cont.)

• Benefit of using application firewalls:

– allow direct connection between client and host– ability to report to intrusion detection software – equipped with a certain level of logic– Make intelligent decisions– configured to check for a known Vulnerability– large amount of logging

Page 30: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Software Firewall (Cont.)

• Benefit of application firewalls (Cont.)

easier to track when a potential vulnerability

happens protect against new vulnerabilities before they

are found and exploited ability to "understand" applications specific

information structure Incoming or outgoing packets cannot access

services for which there is no proxy

Page 31: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Software Firewall (Cont.)

• Disadvantage of Firewall:

slow down network access dramatically more susceptible to distributed denial of service

(DDOS) attacks. not transparent to end users require manual configuration of each client

computer

Page 32: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Top Picks Personal Firewalls

• Norton Personal Firewall • ZoneAlarm Free/Plus/Pro

Page 33: Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.

Conclusion