Title: Network Security
1Chapter 13
2Objectives
- Understand the many processes involved with the
development of a comprehensive security policy
and security architecture - Understand the importance of a well-developed and
implemented security policy and associated people
processes to effective security technology
implementation
3Business Impact
- Impact on business when network security is
violated by on-line thieves ? - According to federal law enforcement estimates in
USA, more than 10 billion worth of data is
stolen annually in the US only - In a single incident, 60,000 credit and calling
card numbers were stolen - 50 of computer crimes are committed by a
companys current or ex-employee
4Security Policy DevelopmentLife Cycle
5Identification of Business-related security issues
- Security requirement assessment
- What do we have to lose?
- What do we have worth stealing?
- Where are the security holes in our business
processes? - How much can we afford to lose?
- How much can we afford to spend on network
security?
6Analysis of Risks, Threats, Vulnerabilities
- Information asset evaluation what do you have
thats worth protecting ? - Network architecture documentation What is the
current state of your network? - How many unauthorized modems are dialing in ?
- Identify all assets, threats and vulnerabilities
- Determine risks and create protective measures
7Architecture and Process Design
- Logical design of security architecture and
associated processes - What must be the required functionality of the
implemented technology ? - What business processes implemented and monitored
by people must complement this security
architecture ?
8Security Technology and Process Implementation
- Choose security technology based on logical
design requirements - Implement all security technology with
complementary people process - Increase overall awareness of network security
and implement training - Design ongoing education process for all
employees including senior management
9Audit Impact of Security Technology and Processes
- Ensure that implemented policy and technology are
meeting initial goals - Institute a method to identify exceptions to
security policy standards and deal with these
exceptions swiftly
10Evaluate effectiveness of Current Architecture
and Processes
- Based on results of ongoing audits, evaluate
effectiveness of current policy and architecture
of meeting high-level goals - Adjust policy and architecture as required and
renew the cycle
11Security Requirements Assessment (SRA)
- Proper SRA implies that appropriate security
processes and technology have been applied for
any given user groups access to/from any
potential corporate information resource
12Scope Definition and Feasibility Studies
- Before proceeding blindly with a security policy
development project, it is important to properly
define the scope or limitations of the project. - The feasibility study provides and opportunity to
gain vital information on the difficulty of the
security policy development process as well as
the assets (human and financial) required to
maintain such a process. - One of the key issues is deciding on the balance
between security and productivity
13Security vs. Productivity Balance
14Data/Information Classification
- Unclassified/Public
- Info. having no restrictions as to storage,
transmission, or distribution - Sensitive
- Info. whose release could not cause damage to
corporation but could cause potential
embarrassment or measurable harm to individuals,
e.g. salaries benefits of employees - Confidential
- Info. whose release could cause measurable damage
to the corporation, e.g. corporate strategic
plans, contracts
15Data/Information Classification
- Secret
- Info. whose release could cause serious damage to
a corporation. Trade secrets or engineering
diagrams are two examples - Top secret
- Info. whose release could cause grave or
permanent damage. Release of such information
could literally put a company out of business.
Secret formulas for key products would be
considered top secret.
16Assets, Threats, Vulnerabilities, and Risks
- How to define the balance between security and
productivity? - Identify assets
- Identify threats
- Identify vulnerabilities
- Consider the risks
- Identify risk domains
- Take protective measures
17Assets
- Corporate property of some value that require
varying degrees of protection - Network security
- Corporate data
- Network hardware
- Software
- Media to transport data
18Threats
- Processes or people that pose a potential danger
to identified assets. - Intentional or unintentional, natural, or
man-made. - Network related threats include
- Hackers
- Fires
- Floods
- Power failures
- Equipment failures
- Dishonest employees
- Incompetent employees
19Vulnerabilities
- Manner or path by which threats are able to
attack assets. - Can be thought of as weak links in overall
security architecture and should be identified
for every potential threat/asset combination - Vulnerabilities that have been identified can be
blocked
20Risks
- Probability of a particular threat successfully
attacking a particular asset in a given amount of
time via particular vulnerability - After identifying vulnerabilities, the questions
are - How should a network analyst proceed in
developing defenses to these vulnerabilities? - Which vulnerabilities should be dealt with first?
- How can a network analyst determine an objective
means to prioritize vulnerabilities? - By considering the risk, network analysts are
able to quantify the relative importance of
threats and vulnerabilities.
21(No Transcript)
22Protective measures
- There might exist multiple vulnerabilities
(paths) between a given asset and a given threat - ? multiple protective measures need to be
established between given threat/asset
combinations - Major categories of protective measures
- Virus protection
- Firewalls
- Authentication
- Encryption
- Intrusion Detection
23Virus Protection
- A comprehensive virus protection plan must
combine policy, people, processes, and technology
to be effective. - Most common microcomputer security breach
- 90 of the organizations surveyed with 500 or
more PCs experience at least one virus incident
per month - Complete recovery from a virus infections costs
and average of 8300 and 44 hours over a period
of 22 working days. - In Jan 1998, there were over 16,000 known
viruses, with as many as 200 new viruses
appearing per month
24Virus Categories
- Virus symptoms, methods of infection, and
outbreak mechanisms can vary widely, but all
viruses share a few common behaviors. - Most viruses work by infecting other legitimate
programs and causing them to become destructive
or disrupt the system in some other manner. - Most viruses use some type of replication method
to get the virus to spread and infect other
programs, systems, or networks - Most viruses need some sort of trigger or
activation mechanism to set them off. Viruses may
remain dormant and undetected for long periods
25Virus Categories
- Two main types
- Time bombs
- Logic bombs
- File infectors
- System/boot infectors
- Multipartite viruses
- Hostile applets
- E-mail viruses
- Cluster/File system viruses
26Antivirus Strategies (AS)
- Effective AS must include
- Policy
- Procedures
- Technology
27Antivirus Strategies (AS) Policies and
procedures
- Identify virus infection vulnerabilities and
design protective measures - Install virus scanning software at all points of
attacks - All diskettes must be scanned at a stand-alone
scanning PC before being loaded onto network
attached clients or servers - All consultants and third party contractors be
prohibited from attaching notebook computer to
the corporate network without scanning
28Antivirus Strategies (AS) Policies and
procedures
- All vendors must run demos on their own equipment
- Shareware/downloaded software should be
prohibited or controlled and scanned - All diagnostic and reference diskettes must be
scanned before use - Write protect all diskettes with .exe, .com files
- Create a master boot record that disables write
to hard drive when booting from a diskettes etc.
29Antivirus Technology
- Viruses can attack
- Locally or remotely attached client platforms
- Server platforms
- Entrance to the corporate network via the
Internet - At each entrance point, viruses must be detected
and removed
30Antivirus Technology
- Virus Scanning is the primary method for
successful detection and removal - Software most often work works off a library of
known viruses - New viruses are appearing at approx 200/month
- Purchase antivirus software which updates virus
signatures at least once per month - Typically, vendors update virus signatures files
every 4 hours, with hourly updates expected in
near future.
31Antivirus Technology
- Emulation technology attempts to detect as yet
unknown viruses by running programs with a
software emulation program known as a virtual PC. - Proactive rather than reactive
- Execution program can be examined in a safe
environment for any unusual behavior of other
tell-tale symptoms of resident viruses. - Advantage identification of potentially unknown
viruses based on their behavior rather than by
relying on identifiable signatures of known
viruses.
32Antivirus Technology
- Such programs are also capable of trapping
encrypted or polymorphic viruses that are capable
of constantly changing their identities or
signatures. - Some of these programs are also self-learning
- Knowledge of virus-like activity increases with
experience.
33Antivirus Technology
- CRC checkers or Hashing checkers create and save
unique cyclical redundancy check character or
hashing number for each file to be monitored - Each time the file is saved, the new CRC is
checked against the reference CRC - If CRC are different ? file has changed
- A program evaluates changes to determine a
likelihood that changes were caused by a viral
infection. - Disadvantage able to detect virus after
infection - Decoys files that are allowed to be infected to
detect and report on virus activity.
34Antivirus Technology
- Active content monitor
- to identify viruses and malicious content such as
Java applets or Active X controls that may be
introduced via Internet connectivity - Able to examine transmission from the Internet in
real time and identify known malicious content
based on - contents of reference
- definition libraries
35(No Transcript)
36Firewalls
- When a company links to the Internet, a two-way
access point out of as well as into that
companys confidential information is created - To prevent unauthorized access from the Internet
to companys confidential data, firewall is
deployed. - Firewall runs on dedicated server that is
connected to, but outside of, the corporate
network - All network packets are filtered/examined for
authorized access. - Firewall provides a layer of isolation between
inside network and the outside network.
37Firewalls
- Does it provide full protection? No !!, if
- Dial-up modems access remains uncontrolled or
unmonitored - Incorrectly implemented firewalls my introduce
new loopholes
38Firewall Architectures
- No standards for firewall functionality,
architectures, or interoperability. - As a result, user must be especially aware of how
firewalls work to evaluate potential firewall
technology purchase. - Three architectures
- Packet filtering
- Application Gateways
- Internet Firewalls
39Packet filtering
- Every packet of data on the Internet is uniquely
identified by the addresses of source and
destination addresses. - Addresses in the header
- Filter is a program that examines the source and
destination address of all incoming packets to
the firewall server. - Router are also capable of filtering packets
- Filter tables are list of addresses whose data
packets and embedded messages are either allowed
or prohibited from proceeding through the
firewall server and into the corporate network
40Packet filtering
- Packet filter gateways on routers
- Maintaining filter tables and access rules on
multiple routers is not a simple task. - Packet filtering has limitations in terms of
level of security it provides. - Dedicated packet-filtering firewalls are usually
easier to configure - IP spoofing is used by hackers to breach packet
filters - Hacker can make a packet appear to come from an
authorized/trusted IP address.
41Application Level Filters (ALFs)
- Also known as
- Application gateways
- Assured pipelines
- Proxies
- Go beyond port level filters in their attempts to
prevent unauthorized access. - Port level filters determine the legitimacy of
the party asking for information - ALFs ensure the validity of what they are asking
for.
42Application Level Filters (ALFs)
- Circuit-level proxies provide proxy services for
transport layer protocols such as TCP. - Socks creates a proxy data channel to the
application server on behalf of the application
client - Socks can control traffic by disabling or
enabling communication according to TCP port
numbers - Sock4 allows outgoing firewall applications
- Sock5 supports both incoming and outgoing
firewall applications as well as authentication
43Application Level Filters (ALFs)
- Internal firewalls the need
- 60 of the network attacks are made by internal
users - Disgruntled employees, former employees etc. are
responsible for 568 of 600 incidents of network
hacking - 30 of Internet sites that reported breaches had
firewalls in place. - Internal firewalls are a new category of software
to handle internal attacks. - Filters that work on the datalink, network, and
application layers to examine communications on
coroprate internal network.
44Authentication and Access Control
- The overall purpose of Authentication is toe
ensure that users attempting to gain access to
networks are really who they claim to be. - Password protection no longer sufficient. More
is needed - Variety of Authentication Technology (AT)
developed to ensure authentication. Products fall
into three main categories.
45Authentication and Access Control
- The categories are
- What you know AT that delivers single sign-on
(SSO) access to multiple network-attached servers
and resources via passwords. - TrustBroker from CyberSafe
- PassGo SSO from Axent Technologies
- Global Sign On from IBM
- What you have AT that uses one-time or session
passwords to authenticate user. This AT requires
the user to possess some type of smart card or
other token authentication device to generate
these single use passwords
46Authentication and Access Control
- What you are AT that validates users based on
some physical characteristic such as finger
prints, hand geometry, retinal scans etc.
47Token Authentication (TAu) Smart Cards
- This technology provides one-time-use session
passwords that are authenticated by associated
server software. TAu may take multiple forms - HW based smart cards that are about the size of a
credit card with a numeric keypad. - In-line TAu devices that connect to the serial
port of a computer for dial-in authentication
thru a modem - SW tokens that are installed on client PC and
authenticate with the server portion of the token
authentication product transparently to the end
user. PIN is required to activate authentication
process
48Biometric Authentication (BA)
- BA can authenticate users based on
- finger prints
- palm prints
- retinal patterns
- hand geometry
- facial geometry
- voice recognition
- Other physical characteristics
- Not yet perfect or fool proof.
- False rejects BA device comparison algorithm
configured very sensitive - False Accepts - BA device comparison algorithm
not detailed enough
49Authorization
- Can be seen as subset of authentication
- Authorization ensures that only properly
authorized users are able to access particular
network resources or corporate information
resources - The authorization security software can be either
- Server based also known as brokered
authorization - Work-station based also known as trusted node.
50Kerberos
- Probably the most well-known combination of
authentication/ authorization software - Architecture consists of three key components
- Kerberos client software
- Kerberos authentication server software
- Kerberos application server software