Network security
Download
Report
Transcript Network security
Chapter 13
Upon
completion of this chapter, you should
be able to:
Implement physical security
Respond to social engineering exploits
Identify network vulnerabilities & threats
Describe the authentication process
Describe secure protocols to use in place of
unsecure ones
Identify a method for secure remote access
to a network
Troubleshoot network security issues
13.1
Three
factors to keep in mind
Prevention
Detection
Recovery
Apply
layers (multi-barrier)
If they get through one barrier, there should be
more to stop them
Fences, locked doors, etc.
Perimeter,
Access, & Inter-facility security
Keep
unauthorized people out
Cover your perimeter
If
they get past the perimeter, need a 2nd
layer of defense
They’ll try Piggybacking or Tailgating
Unauthorized person accompanies an authorized
person inside
Piggyback is with consent
Tailgate is w/out consent
They’ll
try walking in with a large group
They’ll try a sympathy story (forgot my card)
When would these be a common problem?
Morning rush in or rush out of work (8am, 5pm)
Prevention
Turnstiles with access cards
(jumpers)
Key code locks (piggyback/tailgate)
Mantraps (airlock- 1st door closes,
2nd door opens)
methods
Manual/guarded
Automatic with card, key fob,
biometrics
Goal is to trap intruder inside
Access lists
Guarded sign in and out station
Within
your facility you can use:
Key fobs, access cards, key locks, ID badge, RFID,
biometric readers
Motion detectors, infrared detectors
Locked areas for computers/servers
TestOut
13.1.2- Fact Sheet
TestOut
13.1.3- Implement Physical Security
Lab
TestOut
13.1.4- Practice Questions (15)
You
walk into GCIT & someone you don’t
know follows you in before the door closes.
What is this called?
Tailgating
In
a layered defense, what three areas
should be kept secure?
Perimeter, access, inter-facility
What
is the difference between a smartcard
& an RFID card?
Smartcards can be encrypted & can store info
13.2
An
attempt to fraudulently get sensitive info
from users
Usernames, passwords, credit card #, account #,
ss #, etc.
They pretend to be a trustworthy person
Two
types of social engineering:
Passive- takes advantage of unintentional actions
of others
Active- direct interaction with users to get info
They must have inside access
Malicious insiders
Shoulder surfing
Listening to conversations to get the info
Dumpster diving
Looking over someone’s shoulder to get the info
Eavesdropping
Employees, repair people, vending machine people
Looking for trash with info on it
Piggybacking & Tailgating
Help
Me scenario/persuasive social
engineering
Over the phone
Pretends to be someone in another department
on the road & needs their password for an
emergency
Authority
Figure Approach
Pretends to be boss, CEO, network administrator
Needs password to fix account, email issue, etc.
Needs password to get presentation on the road;
give password or else they are fired
Phishing
Email requesting information in an emergency
Link to website that looks real
You enter info & submit it to the attacker
Used for attacking large retailers to get
usernames & passwords
Spear
Attack
Phishing
Attackers identify bank you use to send phishing
attacks
Whaling
Vishing
Phishing over VoIP
The
end user is the weak link
Teach users:
Forward those types of calls to
help desk (they’ll probably hang
up)
Check web links for https, web
address
Privacy filter to prevent shoulder
surfers
Shred documents to prevent
dumpster diving
Mantraps & turnstiles
TestOut
13.2.2- Social Engineering Facts
TestOut
13.2.3- Identifying Social Engineering
Exploits
TestOut
13.2.4- Respond to Social
Engineering Exploits Lab
TestOut
13.2.5- Practice Questions (14)
Describe
Takes advantage of unintentional actions of
others
Name
some examples:
Eavesdropping, shoulder surfing, dumpster diving
Describe
some examples:
Phishing, vishing, whaling
What
active social engineering.
Direct interaction
Name
passive social engineering.
is the best way to prevent social eng.?
Train staff
Without
your knowledge, an attacker has
identified that you use TD Bank. You get an
email from what looks like TD asking you to
verify your username and password. What
kind of attack is this?
Speak phishing
If
someone tries to steal your personal
information over the phone, what kind of
attack is this?
Vishing
13.3
Designed to infiltrate computer and possibly damage it or
take it over
Going to go over:
Virus
Macro virus
Polymorphic virus
Companion virus
Worms
Trojan horse
Rootkits
Logic bomb
Spyware
Adware
Crimeware
Prevention
Attached
to a file
They all have:
A way to replicate
A way to activate
An objective
Types
of viruses:
Stealth
Macro virus
Polymorphic virus
Companion virus
Install
it & schedule scans
Include scanning of removable drives & email
Enable real-time protection
Travels across networks
Automatically replicates itself
Propagates without a file
Spreads rapidly
Ties up network bandwidth &
prevent users from doing normal
stuff
Gets in from unpactched
software
SOLUTION:
Keep software up to date
Install anti-malware software
Appears to be good software
Malicious code within good
software
No replication & not attached to a
file
You end up running the program
Can open a hole in software for an
attack
Your PC becomes a zombie (Bot or
Botnet)
Used for spamming, DDoS attack,
etc.
Install anti-malware program
Installed in the boot sector
BIOS boots system from rootkit
Thinks rootkit is the OS
Rootkit runs in RAM
Very difficult to detect; almost invisible to antimalware software
SOLUTION: secure boot feature in newer
Windows
Malicious
code that executes at a certain
date/time
Software
installed w/out you knowing
Intercepts & collects data; gets passwords
Uses a tracking cookie
May install other software, change settings,
or redirect to other websites
Plays,
displays, downloads ads to computer
Spies on your web activity to display certain
ads
SOLUTION:
Use pop-up blocker/ ad blocker
Install anti-malware software
Accesses
user’s accounts (bank, shop, etc.)
Gathers data to remove funds or make
unauthorized purchases
Uses keyloggers
Keep
software/web browser up to date
Install latest OS updates
Install anti-malware program
Keep it up to date
Run regular scans
Real-time protection
Use
a firewall
Pop-up blocker
Cookie settings
What
type of threat installs software on your
PC to monitor your activity?
Spyware
Your
PC was attacked by malicious code that
activated on January 10, 2016 at 10:01am.
What kind of threat was this?
Logic bomb
What
is the most difficult threat to protect
against because it installs in the boot sector?
Rootkit
Overload
a system so it can’t do its normal
work
Crash or flood server
Regular
Example:
You go to bank to cash a check
Bank is filled with people who don’t even have a
bank account
They are just there to disrupt normal service
Uses
infected “zombie” computers to launch
attacks
Zombies are all over the place; can’t trace
Sent
to one network (amplifier PCs) with
spoofed source IP and reflected to victim
Sends huge amounts of traffic
Smurf attack (spoofs the source IP)
TestOut
13.3.4- Perform a Flood Attack
(Interesting to watch)
TestOut
13.3.5- DoS Attack Fact Sheet
What
kind of attack uses zombie computers
to attack another system?
DDoS
How
do DoS and DDoS attack a server?
They overload it so the server cannot do its
normal functions; possibly crashes
If
software is installed on you PC & allows an
attacker to “see” what you are typing, what
kind of threat is this and what are they using
to do it?
Crimeware; keylogger
Man-in-the-middle
Pretends to be source & destination
Intercepts data
TCP
Hijacking
Like above, but hacker pretends to be the client
Replay
attack
attack
Hacker sniffs packets to get authentication info
Then hacker uses info to connect to server
IP
spoofing
Hiding the source IP
MAC
Mainly used in wireless networks to avoid MAC
filtering
ARP
spoofing
spoofing (aka ARP poisoning)
When an ARP request is sent, hacker responds
with their MAC address
Hacker receives all traffic
Man-in-the-middle
TestOut
13.3.7- ARP Spoofing (Interesting)
TestOut
13.3.8- Fact Sheet
TestOut
13.3.9- Practice Questions (14)
13.4
Guessing
passwords
Easy passwords
You don’t change default
Gather names/dates from social media
Writing down passwords
Shoulder surfing
Social engineering
Brute
force attack (cracking tool)
Use strong passwords
8-12 characters
Upper/lower case
Numbers & symbols
TestOut
13.4.4- DEMO of cracking passwords
(interesting to watch)
13.5
Process
of verifying identity credentials
Username & password or PIN
Smart card/key fob (uses hardware security
token)
Biometrics
Use
multiple types
(username/password/thumbprint)
Single
Sign-On (SSO)
Authenticate once & given access to multiple
systems
Method
used to exchange credentials
3-way handshake
All devices MUST have shared secret
password configured on each
Microsoft-CHAP
DO
NOT USE ANYMORE
Not secure
Has known weaknesses & vulnerabilities
Method
of identifying which authentication
protocol to use
Many types of EAP
Assists in communication of the device ID to
the authenticating server (RADIUS)
Used in wireless & wired
Authentication
& authorization to use
resources
Uses a ticket system
User authenticates once & authorized to use
each service w/out re-authentication
Connect
to authenticating server, RADIUS
What
type of authentication is a 3-way
handshake where all devices use a shared
secret password and uses a challenge string
and hash?
CHAP
What
type of authentication allows you to
authenticate once and gives you access to
server services without re-authorizing?
Kerberos
What
authentication protocol connects to a
switch using EAP and then a RADIUS server?
802.1x
13.6
HTTP
FTP
TELNET
TFTP
You
can ad security to them OR use a secure
replacement version
HTTP
FTP
TELNET
TFTP
• SSL and TLS
• Encrypts Data
• HTTP becomes HTTPS
• Can also use SSH with FTP
to become SFTP
Use SSH
Encrypts Data
Authenticates
Use SFTP instead
TestOut
13.6.4- Practice Questions (7)
13.7
Encrypts
data over unsecure Internet
connection
Remote users can connect into main offices
via Internet connection
Packet
is encrypted
VPN protocols tunnel (encapsulate) each
encrypted packet in a new packet
Only destination device can read packet
contents
Types of VPN connections:
Host to host (hosts have VPN configured)
Site to site (sites have VPN server configured)
Remote access (host to remote site)
Client has VPN configured
Connects to VPN server/concentrator
TestOut
13.7.3- DEMO Configuring VPN
TestOut
13.7.4- Configure a VPN connection
LAB
TestOut
13.7.5- Configure a Mobile Device
VPN Connection
TestOOut
13.7.6- Practice Questions (12)
13.8
Firewall
Block
outbound with a source IP not on your
network (zombie prevention)
Block
ICMP for all or individuals- prevents
your systems from responding to these
attacks
TestOut
13.8.2- Responding to Network
Attacks DEMO
Complete
the study guide handout
Complete
TestOut
Practice
in Packet Tracer
Jeopardy
review
Chapter 13