Crafting a secure network
Download
Report
Transcript Crafting a secure network
Eric Van Horn
Cosc 356
Nearly every organization in todays era uses
computers and a network to send, receive, and
store information
Very important to focus on the security of the
network, especially if the network contains
sensitive, confidential, and personal
information
Without being up to date, it makes it easy for a
hacker to gain unauthorized access to the
system
Information security can be defined as
“measures adopted to prevent the
unauthorized use, misuse, modification, or
denial of use of knowledge, facts, data, or
capabilities.”
It is a name given to the preventative steps
taken to guard information
Cannot alone guarantee protection
Numerous methods to ensure security
Sub-netting
Planning for convergence
DMZ’s
Firewalls
Proxy Servers
Network intrusion detection systems
Network intrusion prevention systems
Divides one network into a series of subnets
Splits the host IP address into two addresses
Network address (192.146.118)
Host address (20)
The source of potential security issues can be
located much quicker than on a large single
network.
Makes regulating who has access in and out of
a particular subnetwork much easier
Decreased network traffic
The integration of voice and data traffic over a
single IP network is becoming a more popular
idea in today’s day in age.
Allows several different services to be combined and
transferred in a single universal format
Advantages:
Moves from the traditional concept of a network to a
more ‘slimmed down’ and efficient concept
Still has a way to go security wise before being
accepted as the standard
As with any traditional network, convergence
networks, too, are vulnerable to attacks
Not currently the standard, but someday may
be, and so it is important for a secure network
design to be ready to convert easily and less
chaotically
Demilitarized zones (DMZ) are a good security
measure to take.
If an organization has sensitive, private files that
need to be protected while enabling some services of
the network to outside “common” users.
DMZ is a separate network located outside the
perimeter of the secured network.
Isolates devices and systems that are most
vulnerable to attack
Email servers, web servers
Users in a DMZ have access to things located
within the DMZ but not the secured network
Ex: A hotel has a network for customers to connect
to for browsing the web and checking email, but not
to personal information for the hotel itself
Computers loaded with data files and software
that appears to be legitimate in order to fool
attackers
Typically located inside a DMZ
Can be used to monitor attackers techniques, early
warning signs of an attack on the secure network
and to deflect attention from the actual sensitive data
Network Address Translation
hides the IP addresses of devices connected to the
secure network by switching it with a common,
known IP address that can be used by anybody on
the network before sending the packet out
typically incorporated into a firewall
implementation and is usually required when two or
more networks interface with each other
Good for security because it stops users on the
internet from seeing the actual IP address of
the sender
Responsible for examining the current state of a
system or device attempting to connect to the
network before allowing it to join.
If device fails to meet criteria, it is sent to a
“quarantine” network
Does so by checking to see if the system joining is up to
par with a specified set of criteria, such as having the
most current anti-virus signature or having the firewall
properly enabled.
A network located outside of the secure network
The overall idea of NAC is to prevent computers
with sub-par security from joining the secure
network and potentially infecting other computers
System that attempts to discover unauthorized
access to a computer network by analyzing
traffic on the network for signs of malicious
activity
Can perform simple tasks such as alerting the
administrator via email or text message at the first
sign of an intrusion
i.e., burglar alarm
A popular open-source NIPS
has the ability to perform real-time traffic analysis
and packet logging on IP networks
performs protocol analysis, content searching, and
content matching
can also be used to detect probes or attacks,
including, but not limited to, operating system
fingerprinting attempts, common gateway interface,
buffer overflows, server message bloke probes, and
stealth port scans.
Recently entered InfoWorld’s open source hall
of fame as “one of the greatest pieces of open
source software of all time”
Has several modes to run on
Sniffer mode
Packet logger mode
Intrusion detection mode
1. Ciampa, Mark D. Security+ Guide to Network
Security Fundamentals. 3rd ed. Boston, MA:
Course Technology, Cengage Learning, 2012.
2. Fung, K. T. Network Security Technologies.
Boca Raton, FL: Auerbach Publications, 2005.
3. Maiwald, Eric. Network Security: A Beginner's
Guide. New York, NY: Osborne/McGraw-Hill
2001.
4. Wikipedia.org