Title: Networks Security
1Networks - Security
SecureGate Limited
Level 46, Nauru House 80 Collins Street Melbourne
VIC 3000 Phone 03 9662 2890 Fax 03 9654 8487
- Penthouse, Level 13
- 15 London Circuit
- Canberra, ACT 2600
- Phone 02 6262 9220
- Fax 02 6262 9221
2Introduction
- A secure network?
- Network security?
- Cost benefit tradeoffs
- How people interact with technology
- Maintaining a balanced approach
3The Secure Network Physical Layer
- Functionality
- Copper
- Wireless
- Fibre
4The Secure Network Physical Layer
- Problems
- Tapping
- Denial of service (the backhoe maneuver)
- Man in the middle
5The Secure Network Physical Layer
- Possible solutions
- Encryption
- Physical protection
- Monitoring
6The Secure Network IP Layer
- Functionality
- Control protocols
- Basically non authenticated
- Potentially packets can be seen by anyone
7The Secure Network IP Layer
- Connection oriented protocols
- Safer after filtering
- May inspect protocol
- May inspect content
8The Secure Network IP Layer
- Datagram protocols
- Inherently less safe
- But we base entire security infrastructure on DNS
9The Secure Network IP Layer
- Tunnelling protocols
- Bypass filters except when used in gateway mode
- Must keep ordinary and tunneled traffic separate
10The Secure Network IP Layer
- Problems
- Spoofing
- Denial of service (the packet flood maneuver)
- Man in the middle
11The Secure Network IP Layer
- Possible solutions
- Encryption
- Logical protection
- Monitoring
12The Secure Network PKI Layer
- Functionality
- Authentication
- Authorisation
13The Secure Network PKI Layer
- Problems
- Spoofing
- Denial of service (the directory maneuver)
- Identity theft
14The Secure Network PKI Layer
- Possible solutions
- Trust transitivity
- Token protection
- Monitoring
15The Secure Network Encryption management
- At what layer?
- Techniques may differ, but process doesnt
- Is most expensive operation on a secure network
16The Secure Network
- Attacking the end pointsServer end is generally
better protected, so go after the client - At least 40 of home computers attached to high
speed networks are open to the world - Many of them have trusted access into corporate
networks - Home LANs are also of interest in securing a
network
17Network Security
- The Function of evaluation
- Not a silver bullet
- Provides some degree of reassurance that quality
control procedures are in place - Always must identify closely just what has been
evaluated
18Network Security
- Risk assessment
- Needs to address not only the technical aspects
of the network connection - Starts with business need, rather than a
solution. - What business function will the network
connection achieve? - Then determine what sorts of risk business is
willing to take - Then devise the solution
19Network Security
- Protection Profile
- A generic description of the necessary security
enforcing functions in a solution - It defines assumptions, threats, and security
objectives - These are used to derive functional requirements
for the security target
20Network Security
- Security Targets
- The risk assessment and protection profile
jointly drive the security target, which must
include functional requirements for
hardware/software platforms - Must also define the environment in which the
platform will operate
21Network Security
- Policies, Practices, and Procedures
- These are derived from the security target and
protection profile - These enable a platform to operate in the way for
which it was designed - Change control essential for managing security
platform
22Network Security
- Personnel
- Platform operators must be trustworthy so they
must have background investigations - Separation of duties
- Audit trailsExternal system and operations audit
is required
23Cost Benefit Tradeoffs
- Process must examine risks and outcomes
- Must be a continuing event
- Environment is not static
- Nor are desired outcomes
24How people interact with technology
- Want a tool to perform a task
- Security widely seen as obstacle, not promoter
- People are not good sources of randomness
- If the secure way to perform a task is not
easier, it never gets used
25Maintaining a balanced approach
- No use surrounding the kitchen with razor wire
and guard dogs to protect a peanut butter
sandwich - No use building a vault with the back wall
missing - Particularly no use in building a better
mousetrap when chasing hamsters - The only secure computer is an insured computer