Information Security
Download
Report
Transcript Information Security
Information Security
Overview of Technologies & Solutions
Information Security
Introduction
The Enterprise Network
Defense in Depth
What to protect against?
Technologies & Solutions
Perimeter Technologies
Internal Technologies
Consulting
Audit, Implementation & Support
Introduction
The security of your network is
evaluated daily, the question is…
“Are you the one doing
it?”
Introduction
Good Information Security provides;
Data confidentiality
Data integrity
Ensure that no data is disclosed intentionally or
unintentionally
Ensure that data is not modified by unauthorized
personel, that no unauthorized changes are made by
authorized personel, and that data remains consistent,
both internally and externally
Data availability
Provide reliable and timely access to data and
resources
The Enterprise Network
Branch Office
Corporate HQ
IP
Communication
LAN
Telecommutor
Wireless Access
Public
Internet
Security Enforcement
ISP Router
Secure Gateway
Firewall
SOHO
Internal Servers
Corporate Data
Secure Gateway
DMZ Services
Defense in Depth
How?
Secure the perimeter
Secure the internal network
Account for the human factor
Using a layered approach:
Increases an attacker’s risk of detection
Reduces an attacker’s chance of success
Defense in Depth
Data
Application
Host
Internal Network
Perimeter
Physical Security
Policies, Procedures, &
Awareness
ACL, encryption
Application hardening, antivirus
OS hardening, update management,
authentication
Network segments, IPSec, NIDS
Firewalls, VPN quarantine,…
Guards, locks, tracking devices
User education against social
engineering
Network Security
Network Security – focus on
perimeter and Internal Network
solutions
Internal Network
Perimeter
Network segments (VLANs),
IPSec, NIDS, Network Access
Protection, …
Firewalls, VPN, NIDS, AntiSpam, …
Why do we need Network Security?
First look at what you need to protect
Data (company resources)
Services (applications or their individually
accessible parts and the people using them)
Protect against what?
Malware (Viruses, Spyware,…)
Spam (“Steals” resources and productivity)
Hackers (Network penetration, defacements,
DoS Attacks,…)
Internal Users (Unauthorized access,…)
…
Common Threat Classification
Network
Host
Threats against
the network
Spoofed packets, etc.
Threats against the host
Buffer overflows, illicit paths, etc.
Threats against the application
SQL injection, XSS, input tampering, etc.
Application
Examples of Network Threats
Threat
Information
gathering
Examples
Port scanning
Using trace routing to detect network
topologies
Using broadcast requests to enumerate
subnet hosts
Eavesdropping
Using packet sniffers to steal passwords
Denial of service
(DoS)
SYN floods
ICMP echo request floods
Malformed packets
Spoofing
Packets with spoofed source addresses
Typical Pattern of an Attack
Enter the network through SQL Injection
etc.
Install or use port proxy software to open
inbound connections
Remotely control the host to mount further
attacks from inside until a domain
controller is accessible
Gain control of the desired resources
Erase traces of attack and remove installed
software
How to protect yourself?
Technologies & Solutions
Secure the perimeter
Secure the internal network
Perimeter Technologies
Firewall (Packet Filter, Stateful, Proxy)
Intrusion Detection System (IDS, IPS)
Virtual Private Network (IPsec, SSL)
Anti-Spam (Mail relay, AV)
Anti-Spyware (URL filtering, AV)
Anti-Virus
Firewall – Static Packet Filter
Every router is a static packet filter
(including your ISP router)
First incoming and last outgoing layer
of your network security
Faster at screening traffic than
stateful or proxy firewalls
But no knowledge of “state” thus less
secure than most common firewalls
Firewall – Stateful
Most common type of Firewall today
Keeps track of “state”, blocks traffic
that is not in its table of established
connections
Slower at screening traffic than
packet filter, but more secure
Firewall - Proxy
Most advanced, least common type of
Firewall (is also a stateful firewall)
Higher degree of security because
internal and external hosts never
communicate directly
Examines the entire packet to ensure
compliance with the protocol that is
indicated by the destination port
number
Firewall – Basic theory of operation
Intermediate Network (DMZ)
Connection allowed
External Network (Internet)
Internal Network (LAN)
Connection refused
Firewall Divides your internal network from an external network (usually
Internet)
If the incoming connection is an “answer” to an outgoing connection, the
connection is allowed, if not, the connection is dropped. (Stateful)
Most firewalls have DMZ functionality, allowing you to further divide your
network in order to supply some “Internet faced services” to your users.
Firewall Solutions
Juniper (Formerly NetScreen)
Check Point
Firewalls – Juniper
Integrated Firewall/IPSec VPN
NetScreen 500/200/50/25/XT/GT/HSC
Solution includes
Stateful Inspection (Perimeter defense)
Deep Inspection (Application-Level Protection)
Built-In Antivirus (Protects remote locations)
Web filtering (Prevent inappropiate web usage)
Secure Remote Acces (IPsec VPN – Secure
Client)
Firewalls – Check Point
Firewall
FireWall-1
Solution includes
Comprehensive application protection
Industry-leading management
High performance
Other Technologies
So if we buy a Firewall we are safe?!
Why NOT?
Weaknesses in TCP/IP suite
IP
Address Spoofing
Covert Channels
IP Fragments Attacks
TCP Flags
SYN Flood
Connection Hijacking
…
Intrusion Detection System
Gateway Intrusion Detection System
A network intrusion detection system
which acts as a network gateway
Designed to stop malicious traffic and
generate alerts on suspicious traffic
An “ideal” gateway IDS is able to stop all
known exploits
GIDS vs NIDS (Placement)
GIDS
Acts as network
gateway
Stops suspect
packets
Prevents
successful
intrusions
False positives
are VERY bad
NIDS
Only observes
network traffic
Logs suspect
packets and
generates alerts
Cannot stop an
intruder
False positives
are not as big of
an issue
IDS – Basic theory of operation
DMZ
IDS
Internet
LAN
IDS
Firewall
IDS
Much like a bridging firewall, IDS makes forward/drop decisions…
-This packet is always good so pass it into my network.
-This packet is always bad so drop it and tell me about it.
-This packet is sometimes bad so tell me about it, but don't drop it.
IDS Solutions
Juniper
Check Point
IDS – Juniper
IDS – IPS
NetScreen-IDP 10/100/500/1000
Solution includes
Eight different detection methods are used to protect the
network from network, application and hybrid attacks
Understands state to pinpoint exactly where an attack
can be perpetrated and only look there
Ability to define a response action in the rulebase for
detected attacks
Sub-second Stateful-failover between Juniper Networks
devices without losing sessions
Enables closed loop investigation, linking directly from
the log to the rule that triggered it and the session's
packet capture
IDS – Check Point
IDS - IPS
IntruShield
Solution includes
Unprecedented flexibility of IDS deployment, including inline, tap, and span modes to suit any network security
architecture
Thorough analysis of traffic at multi-gigabit rates that
builds and maintains traffic state information and
performs comprehensive protocol analysis.
Intelligent detection of known, unknown, and DoS attacks
using a combination of signature, anomaly and DoS
detection techniques.
Proactive capability to stop in-progress attacks coupled
with a rich set of alerting and response actions.
Powerful capability to set multiple, highly granular,
custom intrusion policies within a single sensor.
VPN
A Virtual Private Network is a service
that offers a secure, reliable
connection over a shared public
infrastructure such as the Internet.
Two main types;
Remote Access
Site-to-site
Two main technologies;
IPsec (and L2TP)
SSL
VPN – Remote Access
Secure Remote Access for mobile
users and/or home office.
Using a secure software client or
hardware device for IPsec, or a
webbrowser for SSL based VPN
If you able to connect to the Internet,
you are able to connect to the
corporate network
VPN – Site-to-Site
Valid replacement for leased lines and
Frame Relay connections to connect
different sites.
Using specialized VPN devices or
built-in into a firewall
If both your sites have Internet
connectivity, they can be connected
using VPN
VPN – Basic theory of operation
Site-to-Site VPN
VPN Tunnel
Remote Access
A VPN tunnel is setup using a secure client or SSL capable webbrowser, all
data send through the tunnel is encrypted, the packets can still be captured,
but if they are they are encrypted.
VPN - IPsec
Usually employs custom software at each
of the endpoints – the device and the client
Normally utilizes OSI Layer 3 Protocols (AH
– ESP)
Authentication Header provides two-way
device authentication (implemented in
hard- or software)
Encapsulation Security Payload protocol
provides data encryption (3DES, AES)
VPN – SSL
Employs Webbrowser at the client
side and a device at the corporate
side
SSL is an network Layer Protocol
SSL uses Certificates to prove the
identities of both endpoints
All trafic is encrypted using a shared
key and a negotiated encryption
algorithm (3DES, AES)
VPN Solutions
Juniper
Check Point
VPN – Juniper
IPsec VPN
Solution includes
Secure client enables adherens to security policy
SSL VPN
Built-in to firewall range of products
NetScreen-RA 500, NetScreen-SA 1000/3000/5000
Solution includes
Secure access for remote/mobile employees, with no
client software required
Secure LAN, intranet, and extranet access for employees,
business partners, and customers
Hardware-based SSL acceleration
Hardware-based HTTP compression
Dynamic access privilege management, with three access
methods
VPN – Check Point
IPsec VPN
Solution includes
Simple VPN deployment
Highest level of security
Easy-to-use centralized management
Unparalleled performance
High availability
SSL VPN
VPN-1, VPN-1 Edge, VPN-1 VSX
SSL Network Extender
Solution includes
Network-level connectivity over SSL VPN
Support for all IP-based applications
Combined IPSec and SSL VPN solution
Integrated with Check Point VPN-1
Anti-Spam (Spam Firewall)
Acts as a mailrelay server – accepts
incoming mail, scans the content and
forwards the mail to the back-end
mailserver.
Usually in combination with an Antivirus
scanning engine to deliver spam- and
virus-free e-mail.
Prevents direct access to your e-mail
server
Anti-Spam (Spam Firewall)
Web Mail
Anti-Spam Firewall
DMZ
Internet
LAN
E-Mail Server
Anti-Spam – Basic theory of operation
E-mail is delivered to the Spam
Firewall
E-mail is checked against IP Block
Lists, Antivirus scanning is
performed, user rules are applied,
spam fingerprint, intention analysis,
Bayesian analysis and rule-based
scoring checks are performed
Clean E-Mail is relayed to internal
mailserver
Anti-Spam Solutions
Barracuda
Trend Micro
Anti-Spam – Barracuda
Anti-Spam Firewall
Outbound Mode
200/300/400/600/800
200/300/400/600/800
Solution Includes
Spam Filter
Content Based Filtering
Bayesian Algorithms
Denial of Service Protection
Anti-Spoofing
Anti-Phising
Virus Filter
Dual-Layer Virus Blocking
Decompression of Archives
File Type Blocking
Anti-Spam – Trend Micro
Anti-Spam
Spam Prevention Solution (SPS 2.0)
Solution includes
Advanced Filtering, Analysis, and Updating
Capabilities
Comprehensive Reporting and Auditing
Dynamic, Flexible Heuristic Technology
Ease of Administration and Configuration
High Performance and Scalability
Seamless Integration with Antivirus and
Content Security Offerings
Anti-Spyware (Gateway)
Gateway device to stop spyware
installations, block spyware sites and
scan for spyware signatures
Some solutions can detect spyware
on user desktops and target them for
cleaning
Usually combined with Antivirus
solutions
Anti-Spyware – Basic theory of
operation
LAN
Internet
Firewall
Spyware & AV
Proxies
Clients
If a user requests access to a website, the device checks if the site is listed in
the known spyware sites list, if not the request is proxied. The content of the
requested site then is scanned for spyware (and viruses) if the content is
Spyware and virus free it is delivered to the client, if not it is dropped.
Anti-Spyware Solutions
BlueCoat
Barracuda
Anti-Spyware – BlueCoat
Anti-Spyware
Spyware Interceptor
ProxySG + ProxyAV
Solution includes
Easy, affordable, and effective spyware
prevention
Automatically updates spyware profiles,
policies, and prevention techniques.
Backed by world-leading experts in web
proxy performance and security at Blue
Coat Labs™
Anti-Spyware – Barracuda
Anti-Spyware
Spyware Firewall 210/310/410
Solution includes
Stops spyware downloads (including drive-by
downloads)
Stops virus downloads
Blocks access to spyware websites
Detects spyware access to the Internet
Facilitates spyware removal
Website Category blocking
Content Inspection
Flexible Policy Enforcement
Antivirus (Gateway)
Provides Internet gateway protection
against viruses (http, ftp, smtp
traffic)
If combined with internal antivirus
solution provides dual layer
protection (different vendors)
Usually a combination of AntiSpyware, Anti-Virus and Anti-Spam
on the gateway
Anti-Virus (Gateway) – Basic theory of
operation
LAN
Internet
Firewall
Spyware & AV
Proxies
Clients
Requested webcontent is scanned with antivirs engine on the proxy server
Clean content is delivered to the clients.
Anti-Virus (Gateway) – Solutions
Trend Micro
BlueCoat
Anti-Virus – Trend Micro
Anti-Virus
Interscan Web Security Suite
Solution includes
Comprehensive Web Security
Leading Virus Protection
Anti-phishing
Anti-spyware
URL Filtering Module
Scalable and Flexible
Centralized Management and Coordination
Anti-Virus - BlueCoat
Anti-Virus
ProxySG with Web Virus Scanning
Solution includes
Visual Policy Manager
Policy processing engine
Custom splash pages
Content stripping
ProxyAV integration
ICAP server integration
Auto sense settings
Internal Technologies
LAN security using “perimeter”
devices
Network Access Protection
Network segmentation (VLANs)
Strong Authentication
Malware protection
WLAN security
LAN Security using perimeter devices
Ingress and egress filtering on every
router
Internal firewalls to segregate
resources
Proxies to enhance performance and
security
IDS sensors to function as “canaries
in a coal mine” and monitor the
internal network
Network Access Protection
Provides endpoint security for access
to your LAN.
Make sure every device complies to
your corporate access policy before
LAN access is allowed
Prevents “rogue” devices from
accessing your network
Network Access Protection – Basic
theory of operation
Client device request access to the network
(cable is plugged in)
A policy compliance check is performed by
a device/server to see if the client has the
necessary access rights (802.1X) and the
required Anti-Virus en Operating System
updates.
If the client complies to policy access to the
network is allowed
If the client does not comply, the client is
placed in a quarantine network section and
updated to comply to the corporate policy
Network Access Protection - Solutions
Check Point
Network Access Protection – Check
Point
Network Access Protection
Total Access Protection
Solution includes
VPN Remote Access Policy Enforcement
Web Remote Access Policy Enforcement
Internal Policy Enforcement with 802.1Xcompatible Gateways
Rogue Access Prevention with 802.1xcompatible Gateways
Internal Policy Enforcement with InterSpect
Standalone Enforcement
Network Segmentation (VLANs)
Divide (Virtual LANs) your physical
network in several logical entities to
prevent unauthorized access to
certain parts of you LAN
VLAN membership based on identity
(802.1x)
Increase security and tracebility in
your local network
VLANs – Basic theory of operation
VLAN 1
VLAN 2
802.1X & VLAN capable switch
VLAN 3
VLAN capable switch divides your LAN into segments only, access rules
define whom can access which other segement of your network.
Membership to a VLAN can be based on identity of the device that requests
Access (802.1x)
Network Segmentation – Solutions
HP ProCurve
Nortel
Network Segmentation – ProCurve
Network Segmentation
Identity driven management
Dynamic VLANs
Solution includes
Access Control – Based on users’
business needs.
Access Rights – Not only based on the
individuals and their group associations,
but also day, time and location.
Policy Enforcement – On a per-user, persession basis.
Network Segmentation – Nortel
Network Segmentation
Dynamic VLAN assignment
Solution includes
Strong Authentication
Traditional static password are insecure, if
you can “guess” someones password you
have access.
Strong Authentication requires you to both
have something (Token – fingerprint, ect)
and know something (pin code –
password)
Information on Token is encrypted for
added security
Can be used for computer logon, singlesign-on, secure remote access
Strong Authentication – Solutions
SafeWord
Vasco
ActivCard
Strong Authentication – Safeword
Strong Authentication
Solution includes
Strong Authentication – Vasco
Strong Authentication
Solution includes
Strong Authentication – ActivCard
Strong Authentication
Solution includes
Malware protection
Corporate Managed Antivirus and
Anti-Spyware solutions
Malware Protection – Solutions
Trend Micro
WLAN security
Secure Access to you corporate LAN
Defend against “rogue” Access Points
Identity based Wireless Access
Usage of strong encryption and key
exchange protocols
WLAN Security
Pre-802.11i security (WPA) as a
replacement to the insecure WEP
model
Includes TKIP (Temporal Key Integrity
Protocol) and 802.1x (identity)
protocols
Security Consulting Services
Audit, design, implementation and
support of your secure networking
infrastructure
Customized training based on
implemented solutions or at customer
request
Coaching of IT division when selecting
and implementing security solutions