Top Banner
Protecting Your Network Chapter 17
54

Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Jan 13, 2016

Download

Documents

Duane Terry
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Protecting Your NetworkProtecting Your Network

Chapter 17

Page 2: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

ObjectivesObjectives• Discuss the common security threats in

network computing• Describe the methods for securing user

accounts• Explain how firewalls, NAT, port

filtering, and packet filtering protect a network from threats

Page 3: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

OverviewOverview

Page 4: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Introduction to Protecting Your Introduction to Protecting Your NetworkNetwork

• What are the threats to networks?– Hackers, etc.– Authorized users with good intentions– Natural disasters– A network threat is anything that can potentially

damage network data, machines, or users• Explore tools and methods for protection

Page 5: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Three Parts to Chapter 17Three Parts to Chapter 17

• Common Threats• Securing User Accounts• Firewalls

Page 6: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Common Threats

Page 7: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Summary of Common Threats– System crashes/other hardware failures– Administrative access-control weaknesses– Malware, such as viruses and worms– Social engineering– Denial of Service attacks– Physical intrusion– Rogue access points

Page 8: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• System crash/hardware failure– Types of failures

• Hard drives crash• Servers lock up• Power fails

– Redundancy in areas prone to failure• Power backup system• Data backups• Hardware redundancy for fault tolerance

Page 9: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Administrative access control– Access control list– Powerful administrative tools– Need to keep tools secure– “Super Accounts”

• Windows Administrator account• Linux and Macintosh OS X root account

Page 10: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Malware– Code designed to do something bad– Virus

• Has two jobs–Replicate

»Makes copies of itself to disks–Activate

»Does something bad

Page 11: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Malware– Worm

• Identical in function to a virus•Replicates exclusively through networks•Sends out copies of itself

Page 12: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Malware– Macro

• Any virus exploiting application macros to replicate and activate

• Exists in any application that has built-in macro language

– Microsoft Excel– Microsoft Word– And more…

Page 13: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Malware– Trojan

• Looks like something harmless• Remote administration tool (RAT)

– Turns infected computer into a server controlled by a remote user

– Captures keystrokes, passwords, files, credit card information, etc.

– Does not replicate

Page 14: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Malware– Rootkit

• A Trojan that hides from all but the most aggressive anti-malware tools

• Example– Sony’s antipiracy scheme on music CDs– Installed on computers as a rootkit– Creates backdoor for hackers

Page 15: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Malware– Adware

• Monitors types of Web sites you frequent• Uses information to generate targeted

advertisements• Often uses pop-up windows for ads• Not overtly evil• Often uses deceptive practices• Considered malware by most

Page 16: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Malware – Spyware

• Sends information about your system or actions over the Internet

• May send keystrokes• May send all contacts in your address book

Page 17: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Dealing with Malware– Anti-malware programs

• Should run on every computer• Should also be on a network appliance• Update regularly

– Training• All users trained to look for suspicious code• All users trained to not run suspicious code

– Procedures describe what to do if users encounter malware

Page 18: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Social Engineering– Manipulating people to gain access

to a network– Many ways to use people to gain

unauthorized information– Telephone scam– Physical entry– Phishing

Page 19: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Denial of Service (DoS)– Attack that brings down a network– Floods network with requests– Smurf attack

• A DoS attack that sends broadcast PINGs• Source IP changed to another system’s address

Page 20: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Distributed Denial of Service (DDoS)– More menacing than a simple Dos– Uses multiple computers under the control of

a single operator– DDoS operators use malware to control

computers used in the attack• Zombie – one controlled computer• Botnet – a group of controlled computers

Page 21: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Prevention– Your computer cannot be controlled until

someone installs malware on it– Anti-malware, training, and procedures will

prevent your computer from becoming a zombie

Page 22: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Physical Intrusion– Protect servers from physical intrusion

• Lock up servers and switches–Server rooms with key-card locks–Log of people entering server rooms–Server in locked in closet at small site

• Never walk away from a server without logging off

• Add a password-protected screensaver

Page 23: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Figure 17.1 Applying a password-protected screensaver

Page 24: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Protecting clients from physical intrusion– Use screensaver passwords– Use paper shredders– Mind work area

• Do not leave passwords on or near desk• If you must write down passwords, keep

in locked drawers

Page 25: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Rogue Access Points– Unauthorized WAPs– Huge problem today– Cheap, easy way to plug into a network– Employees install them for convenience– Rarely installed by bad guys– Bad guys detect unsecured WAPs– Sniffer will find WAPs with SSID

broadcasting turned off

Page 26: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Securing User Accounts

Page 27: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Overview of Securing User Accounts– Internal threats

• Unauthorized access• Data destruction• Other administrative problems

Page 28: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Passwords– Ultimate key to protecting the network– Protect your passwords– Make users choose good passwords– Make users change passwords at

regular intervals– Do not write passwords on anything!

Page 29: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Figure 17.2 Windows Server option for requiring a user to change a password

Page 30: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Alternatives to Entering Password– Smart devices

• Credit cards• USB keys, other small devices

– Biometric devices• Fingerprint scanner• Retina scanner• Voice scanner

Page 31: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Authentication Factor– Something used to authenticate

•Ownership factor: something the user has•Knowledge factor: something the user knows•Inherent factor: a part of the user

– Two-factor authentication combines factors

Page 32: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Controlling User Accounts– Contains user name and password– Access to accounts restricted – Least privilege approach = permission to

access only the resources a user needs– Tight control is critical– Disable unused accounts

Page 33: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Controlling User Accounts with Groups– Minimizes administrator’s burden– Add user to one or more groups– Assign permissions to groups– Effective permissions– Be careful of default groups

•Everyone•Guest•Users

Page 34: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Figure 17.3 Giving a group permissions for a folder in Windows

Page 35: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Figure 17.4 Adding a user to a newly created group

Page 36: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Diligence in Managing User Accounts– Administrator often part of human

resources– Create, disable, enable, and delete user

accounts based on employee status– Keep up with employee changes

Page 37: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Inheritance– One set of permissions for a user

explicitly assigned to a folder– Second set of explicit permissions to a

subfolder– Inheritance determines user’s actual

permissions to subfolder and contents

Page 38: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Firewalls

Page 39: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Introduction to Firewalls– Firewalls protect a private network from

external threats– They use a variety of methods– Not necessarily a dedicated device– Placement of firewalls

• Network-based at the edge of a network– a.k.a. a hardware firewall

• Host-based in user’s computers

Page 40: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Firewall Technologies– Hiding IPs

• Network Address Translation (NAT)• Built into most routers

– Port Filtering (a.k.a. port blocking)• Restricts packets based on port numbers

– Packet Filtering (a.k.a. IP filtering)• Blocks packets based on IP address

Page 41: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Figure 17.5 The netstat –n command showing HTTP connections

Page 42: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Figure 17.6 Web-based port filtering interface

Page 43: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Figure 17.7 YaST configuration program

Page 44: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Figure 17.8 Blocking IP addresses

Page 45: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Firewall Technologies– Stateless filtering

• Only checks for IP address and port number – Stateful filtering

• Examines packets as a stream• Detects when a stream is disrupted or

packets corrupted• Layer 7 application proxies

– Best stateful filters– Slower and more expensive than stateless filters

Page 46: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Firewall Technologies– MAC filtering

• Similar to packet filtering• Filters based on MAC address of client• Can be defeated through MAC spoofing

Page 47: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Personal Firewalls– CompTIA calls these host-based firewalls– Not necessary on dial-up connections– Necessary on other Internet connections

•Turn off Windows File and Print Sharing•Enable a personal firewall

– Use in addition to hardware firewall– Windows Firewall, Zone Alarm Pro, etc.– Windows ICS is only a NAT router

Page 48: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Figure 17.9 ZoneAlarm Pro

Page 49: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Windows Firewall– Works with or without ICS– Included with Windows – Default blocks all incoming IP packets

that attempt to initiate a session– If needed, manually open ports– OK for single machine or small network– Honey Pot creates a fake attackable

network that records attempts to hack

Page 50: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Figure 17.10 Enabling Windows Firewall

Page 51: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Figure 17.11 Opening TCP/IP ports in Windows Firewall

Page 52: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Network Zones– Each zone has a level of access to network– Firewall sits between gateway router and

private network– Demilitarized zone (DMZ)

• Lightly protected network between private network and Internet

• Created by two routers– Intranet – firewall-protected private network

Page 53: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

Figure 17.12 A DMZ configuration

Page 54: Protecting Your Network Chapter 17. Objectives Discuss the common security threats in network computing Describe the methods for securing user accounts.

• Securing Remote Access– More employees access network

from home– Cost-effective for workers and employers– Network security challenge– Balance security with ease of access