Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
42 views37 pages

04-Securing The Network

Uploaded by

Sudar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views37 pages

04-Securing The Network

Uploaded by

Sudar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

TI0067

Information Technology
Security and Risk
Management
Securing the Network
Overview
• In this chapter we examine the foundations of network security
and look at system security issues, such as securing information
flow by appropriate hardware, and software controls. These
include routers, firewalls, intrusion detection systems, network
separation, operating systems and antivirus software.

2
Learning Objectives
• describe the basic features of a network and the risks they face
• explain the operation of firewalls
• outline the use of intrusion detection systems to defend networks
• describe the operation of virtual private networks
• discuss the approaches to inter-network security
• discuss the security issues relating to system software
• explain the use of antivirus software

3
Introduction to Network
Security

4
5
Common Deployment of Network
Segments
user
• contains user workstations

servers
• maintains the corporate production servers for a specific locale (email, file and
application servers)

vendor
• provides access for visiting vendors and is restricted to the Internet only

remote access
• provides an entrance point for employees to gain access remotely and would
contain VPN and remote access server (RAS)

storage
• network attached storage maintained on isolated networks

6
Topology of Computer Networks

token ring

• every computer connects to a physical network cable ring


with two connections

linear bus

• every computer connects to some point in a backbone, which


is terminated at each end

star

• every computer connects to a central point, e.g. hub or switch

7
8
Firewall Types and Techniques
• A firewall is a hardware device or software that filters packets as
they are sent between networks, and it is a necessity for a
business network today. This is one particular case where
hardware can do a better job than software, but there is software
that can perform the task adequately, depending on the situation.
In the case of the Linux operating system, the software firewall
(part of the Linux system) could be complemented by a hardware
firewall for additional security.
• There are three types of firewall:
• packet filters
• circuit level gateways
• application gateways

9
Packet Filters
• Packet filters are constructed so as to examine the header in a
TCP/IP packet and examine the routing information, such as the
packet source and destination address.
• Advantages of using packet-filtering routers are that they are
easier to construct than most other types of firewall configuration.
• The disadvantages of packet filters are that they are vulnerable
since they have a very simple traffic logging mechanism and have
several security-related design weaknesses.

10
Gateways
• Circuit-level gateways transmit requests for internet
connections. Outbound connections from an internal network
intended for the Internet travel to a relay gateway, which reads
the destination address of the request and creates a link to the
target. The gateway then passes information between the internal
connection request and the external target link.
• Application gateways use specially written code for each specific
application. They are able to examine and interpret the data
within the packet, not just the packet header, as in the case of a
circuit-level gateway. A physical application gateway uses proxy
servers, code that represents both clients and servers.

11
Firewall Configurations
Packet filtering
• Based on the packet header information, including the source and destination addresses
and port numbers, the packet filter can pass some packets while blocking others.
Stateful inspection packet filtering
• This method also filters on packet header information. Stateful inspection looks at the
packet to see whether it is the beginning of a session, a continuation of a session or the
termination of a session.
Screened-host
• A screening router or firewall appliance is used to ensure that a host on an external
network can communicate only with a bastion host that is attached to an internal network.
Screened-subnet or demilitarized zone
• This DMZ is connected to the internal network and to an external network through
screening routers or a firewall appliance.
Multi-homed host
• The multi-homed hosts do not route packets directly from one network to another,
although they could be configured to do so.

12
Intrusion Detection Systems
• An intrusion detection system (IDS) reads and interprets log files
from routers, firewalls, servers and other network devices to
deter, detect and deflect unauthorized use or attacks on a system.
• Because attacks can span packets, IDS examines packets in two
different ways. It scans each packet individually looking for
patterns (signatures) that are typical of an attack, and it monitors
the packets as a stream of information, thus identifying attacks
spread across multiple packets.

13
Virtual Private Networks
• A virtual private network (VPN) operates on the public
telecommunication infrastructure, using a tunneling protocol and
security procedures to maintain its privacy. VPNs were developed
to allow private networks to be spread over a large geographic
area without the high expense of leasing private lines. The VPN
allows multiple private networks to be connected over a public
infrastructure.
• When a VPN is implemented between two locations it works in a
very similar manner to the way encrypted data is sent over a wide
area network. To communicate using a VPN, the packets are
encrypted using a point-to-point protocol (PPP), then are sent
over the public network encapsulated with an authorized
protocol. When the packet is received at the destination, data is
decrypted allowing the receiver to access the plaintext.

14
Inter-network Security
• Inter-network security is the process of linking two or more
networks to give functionality but also maintain the integrity of
such networks. It is a difficult balance to achieve, as often one is a
trade-off against the other.
• Inter-network security has the precondition that each network is
already secure independently. The level of security also largely
relies on the users of the networks, but inter-network protection
exists to l1m1t and define the boundaries of its users.
• At any given time, there are three commonly used methods of
maintaining security in an environment that has one or more
independent networks:
• network isolation
• firewalls and perimeter guards
• multilevel security networks.

15
Network Isolation
• Network isolation is one of the most commonly used practices in
the military and defence. Network isolation is the practice of
keeping two or more networks entirely separated, and no
connections are allowed between the two. This keeps each
network of computers entirely distinct from the other, with no
knowledge of each other’s existence. This means that it is
physically impossible for data to transfer between networks.
• The problem with this solution is that network isolation pays a
high price for the security. Isolated networks have no physical
method of transferring data, which limits the use of both
networks. At the price of limiting movement of unauthorized data
between networks, the system stops all movement, even that of
required data. Where an isolated network excels in security, it
lacks in functionality.

16
Firewalls and Perimeter Guards
• The use of firewalls and monitoring software to separate two or
more networks is even more flawed as a system of maintaining
data integrity than isolating networks.
• Firewalls are primarily used to block certain types of traffic, or to
allow traffic only to move into a network as a response, which
makes them ideal as a network perimeter defence. Firewalls are
considered standard as a form of defence on a computing
network, but their use is not considered appropriate as a barrier
within an internal network.

17
Multilevel Secure Networks
• Multilevel secure networks are a modern idea that aims to
maintain the security that an isolated network achieves while
allowing a larger degree of flexibility. It is designed for
environments that have two or more networks, a high-level (or
more secure) network and a low-level one (less secure).
• Within a multilevel secure network, data may be transmitted from
the low-level network to the high-level network but may not
travel from the high-level network to the low-level one, not even
for acknowledgement of data, which prevents any form of data
being leaked from a more secure computing environment into a
less secure one.

18
Network Separation
• Network separation is a security technique used primarily in
military and defence networks as a method of ensuring that those
without authorization do not access classified data. In the use of
separated networks, there is often one ‘insecure’ network: a
network that is often connected to the Internet or acts as an
internal intranet.

19
BIOS and boot loader
• The system’s BIOS essentially controls the behavior of all system
hardware before booting the operating system, when control of
most hardware is delegated to the operating system.
• The system’s BIOS also includes the following options to
strengthen security:

Boot sequence

Virus warning

Security option
20
The Operating System

21
Microsoft Windows 2000
File system security

User accounts

Password security

Account lockout policy

Security audits

User rights assignment policy

Additional security options

Active Directory

22
1. File System Security
• Windows 2000 provides the option of using the FAT32 or NTFS
file systems. FAT32 (32-bit tile allocation table) is the file system
used by Windows 98 and ME. It has no features to control user
access to data and as such is not recommended by Microsoft as a
file system for use in business. NTFS (New Technology file
system) is the file system used by Windows NT-based operating
systems and is the recommended file system in all business
situations, not only for its support for file and folder access
permissions but also because it is required by Windows 2000
Server if Active Directory is to be installed. NTFS is also required
for EFS (Encrypting File System), which is available in Windows
2000 and later

23
2. User Accounts
• Being a multi-user operating system, Windows 2000 gives
administrators the ability to give every user in the organization
their own user account so that users can access computer systems
with their own credentials and everyone from outside is virtually
locked out. A user’s ‘account’ contains information about the user,
particularly three important things:
• the account ‘username’ which is used by the user to tell the system who
they are
• the account ‘password’, which is the access key that the user uses to prove
their identity to the system
• a 37-character security ID (SID), which starts with the character ‘S’ and is
followed by 36 digits, arranged in groups and separated by hyphens. The
SID is unique to a particular user account.

24
3. Password Security
• In all of the Windows NT operating systems (including Windows 2000), user
authentication has required the use of a username and password; the
password essentially being the key to the user’s account.
• Windows 2000’s security policy controls provide the following options to
help ensure that a user’s password is secure:
• ‘Enforce password history.’ This option allows administrators to specify the number of
passwords that the system remembers so that passwords cannot be reused.
• ‘Maximum password age.’ The maximum number of days before the system forces the user to
change the password.
• ‘Minimum password length.’ The required minimum number of characters in a user’s
password.
• ‘Password must meet complexity requirements.’ If this policy is on, the password must meet
the following requirements: not contain all or part of the user’s account name; be at least six
characters in length; and contain characters from at least three of the following four
categories:
• English uppercase characters (A to Z)
• English lowercase characters (a to z)
• base 10 digits (0 through to 9)
• Non-alphanumeric characters (e.g. *, l, $, #, %)

25
4. Account Lockout Policy
• Just as an automatic teller machine captures a card after three
incorrect PIN entry attemps. Windows 2000 can deactivate a
user’s account after a specified number of incorrect password
entry attempts.
• Account lockout duration.’ The length of time an account is locked out
after the number of incorrect password entry attempts reaches the
threshold. If this is set to 0, then the account remains locked out
indefinitely until an administrator unlocks it.
• ‘Account lockout threshold.’ The number of invalid password attempts
before the account is locked out.
• ‘Reset account lockout counter after ...' The length of time before the
recorded number of invalid password entry attempts is reset to zero.

26
5. Security Audits
• Security audits are essentially logs of every action that the user performs and
actions that the computer itself can automatically perform. By default, the
systems logs can be accessed only by administrators. Windows 2000 allows
administrators to audit the following activities:
• account logon events: when a user logs on or off in which the computer maintaining the audit
is the computer that validates the username and password
• account management: when a user accounts are modified
• directory service access: any object accessed in Windows 2000’s Active Directory
• account logon events: when a user logs on or off, or makes a network connection
• object access: when a user accesses an ‘object’ on the system (e.g. requiring the use of
services)
• policy change: when the audit policy is modified
• privilege use: when a user makes use of any special privileges
• process tracking: when a user interacts with a process
• System events: when the system performs an activity that would normally be placed in the
event log. Auditing system events can also be used in conjunction with the security option
‘Shut down the system immediately if unable to write an event to the security log’ to prevent
DOS attacks, which would normally fill up the security log rather quickly.

27
6. User Rights Assignment Policy
• The user rights assignment policy options allow administrators to
specify which users have the rights to perform more specific
actions, other than those allowed by the group to which a
particular user belongs. Changes made to these options control
whether any particular user can:
• access the system over the network using their username and password
• act as part of the operating system, giving the user the ability to perform
almost any action on the system, as if they were using a Windows 95-
based system
• locally log on to the system
• shut down or restart the system (locally or remotely)
• perform maintenance on hard drive volumes
• install, uninstall and update device drivers
• adjust memory usage
• change the system clock
• take ownership of files.
28
7. Additional Security Options
• The security policy controls also provide a set of security options
not covered elsewhere. These options include:
• Renaming the administrator or guest accounts (which can also be done
from within the ‘Local users and groups’ controls for stand-alone servers
and workstations or from within ‘Active Directory users and computers’
for domain controllers and domain members). Renaming the
administrator account provides the opportunity to create a ‘dummy’
account called ‘administrator’ (with no access rights), which can then be
monitored for any suspicious activity.
• preventing users from accessing the system over the network
• forcing the user s log off or disconnection when their permitted logon
hours expire
• preventing the system from being shut down without having to log on
• preventing the username of the last user on the system being displayed in
the ‘username’ box when the next user logs on
• whether the ‘Everyone’ access permission applies to anonymous users
• preventing the installation of drivers that have not been digitally signed
29
8. Active Directory
• Active Directory is the name given to the directory service in
Windows 2000 that is installed when the server is ‘promoted' to a
domain controller.
• Active Directory contains a feature called ‘operations masters’.
This feature allows a Windows 2000 server running the directory
service to delegate roles to other. Using this feature, it is possible
to create several domain controllers, each responsible for
performing different tasks.

30
Linux

Boot loader

Passwords

Limiting use of the ‘root’ account

Services

Firewall
31
1. Boot Loader
• Password protecting the Linux boot loader prevents unauthorized
access to single-user mode (whereby the user becomes the ‘root'
user) and prevents the loading of any other operating system (if
running a dual-boot system), which might be less secure. Also, if
GRUB is the boot loader, password protection prevents
unauthorized access to the GRUB console, where configuration
options can be changed. Securing each of these boot loaders
requires root access.

32
2. Passwords
• For best password security, Linux will automatically select MD5
and shadow passwords during installation. MD5 is a more secure
encryption method, which also allows non-alphanumeric
characters in password. If this option is deselected, Linux uses
DES encryption, which allows only alpha-numeric characters and
56-bit encryption. Password shadowing is important for security;
otherwise password hashes are left in the password file, which is
readable to everyone and susceptible to a brute force attack off-
site. If password shadowing is enabled, the password hashes are
kept in the password shadow file, which can be read only by the
root user.

33
3. Limiting Use of The ‘root’ Account
• By default, the user ‘root’ can only access a Linux system locally.
The file/etc/securetty controls that computers the root account
can be used on. If this file is empty, the root user cannot log on at
all (except through SSH). If this file does not exist, the root user
can log on from anywhere, which is potentially unsafe. Further
options exist that are designed to limit the use of the root account,
such as changing the root shell and preventing SSH logins.

34
4. Services
• For security, most network services in Linux are turned off by default.
Some exceptions include ‘lpd’ (print server), ‘portmap’ (required),
‘xinetd', ‘sendmail’ and ‘sshd’ (secure shell - replacement for telnet).
• Sendmail is an inherently insecure message transfer agent and can be
susceptible to a number of attacks. However, there are some options
that can be used to secure it:
• The sendmail configuration can be modified to specify a limited number of
concurrent connections, child services, and header and message size. These are not
set by default and leave the sendmail service open to a DOS attack.
• The mail spool directory can be stored on a non-NFS volume to protect privacy and
security of email messages from other users.
• If the sendmail service is running on a machine that does HOI require users to
access a shell, then shell access can be denied.
• Use of the third-party port scanner tool ‘nmap’ can be used to monitor open ports,
and any suspicious open ports can then be investigated. An open port running a
service indicated as ‘unknown', although not always sinister, still deserves some
attention.

35
5. Firewall
• The security level configuration tool and the GNOME Lokkit are
GUI-based tools that create ‘iptables’ rules. ‘iptables’ is the
interface for the ‘netfilter’ subsystem of Linux, which provides
packet filtering options. Command line use of ‘iptables’ provides
access to such functions as IP masquerading, NAT and IP bans,
and can also be used to control network access to specified
services. This can be used to secure the ‘portmap’ service and
other RPC services with weak security mechanisms.

36
Antivirus Software
• Viruses are malicious (or just annoying) pieces of software that
append themselves to legitimate files, programs or emails, waiting
to be activated by an unsuspecting user.
• Once a malignant virus is activated, its goal is usually to destroy as
much data as it can in a short space of time. Hardware fails here
mainly because new viruses are discovered every day. Although
hardware can be designed to pick up existing viruses, in a few
days the hardware device will long be out of date. Making
hardware ‘updatable’ also presents a problem, as a virus could be
designed to attack the programmable circuits and render the unit
useless.

37

You might also like