Module 4 - Implementing Network Security New
Module 4 - Implementing Network Security New
ASSURANCE &
SECURITY 1
MODULE 4
IMPLEMENTING
NETWORK SECURITY
OBJECTIVES
Upon completion of this module, the student would be able to:
▪ Define the Network components;
▪ Demonstrate the concepts of network analysis tools;
▪ Enumerate the types of network analysis tools
▪ Explain the types of network monitoring systems;
▪ Discuss how Network Address Translation operations;
▪ Give different deployment models of cloud computing
OBJECTIVES
Upon completion of this module, the student would be able to:
▪ Explain the types of networking protocols and services;
▪ Discuss how each networking protocols operates;
▪ Give different FTP protocols
▪ Explain the types of network administration security;
▪ Discuss how each wireless security protocols works;
▪ Give different wireless security methods
CONFIGURE SECURITY
PARAMETERS ON NETWORK
DEVICES AND TECHNOLOGIES
Network Components
There are several common components that make up a network:
❑ Device
❑ Media
❑ Network adapter
❑ Network operating system
❑ Protocol
Network Devices
❑Router
❑Switch
❑Firewall
❑Load balancer
❑All-in-one security appliance
Using Dedicated Firewalls to Protect a Network
▪ Ingress traffic
▪ Egress traffic
VLAN - Virtual Local Area Network
VLAN1 VLAN2
A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a
computer network at the data link layer
Subnet
Network
A network-based IDS (NIDS) monitors network traffic using sensors that are located
at key locations within the network, often in the demilitarized zone (DMZ) or at
network borders.
Wireless IDS
❑Manage network devices so that they are configured according to security policies.
❑Maintain documentation for all current server configurations.
❑Establish and document baselines.
❑Implement strong ACLs and implement implicit deny.
❑Update antivirus software regularly.
❑Configure only required network services.
❑Disable unused interfaces and unused application service ports.
❑Create and implement a DRP.
❑Apply security updates and patches.
❑Encrypt sensitive data.
❑Check event logs for unusual activity.
❑Monitor network activity.
NETWORK DESIGN ELEMENTS,
IMPLEMENT NETWORKING
PROTOCOLS AND SERVICES
Network Monitoring Systems
❑Behavior-based
❑Signature-based
❑Anomaly-based
❑Heuristic.
Web Security Gateway
Web Security
Gateway
NAT Server
24.96.83.120
VPN (Virtual Private Network) is a technology that uses encrypted tunnels to create
secure connections across public networks like the internet
Main Office
VPN Concentrator
VPN
Concentrator
❑Private
❑Public
❑Community
❑Hybrid
Cloud Computing Service Types
• SaaS - Software as a Service
• PaaS - Platform as a Service
• IaaS - Infrastructure as a Service
DNS - Domain Name System (or Service or Server)
DNS Server
www.comptia.org
comptia.org
209.117.62.36
209.117.62.36
HTTP - Hypertext Transfer Protocol.
HTTP
SSL/TLS
HTTPS, the secure version of HTTP web browsing, uses the SSL protocol.
SSL/TLS
1 Request secure connection
3 Negotiate encryption
SECURE SHELL (SSH)
Session is encrypted
SSH Tunnel
Man-in-the-Middle
IPSec Standards
Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates
and encrypts the packets of data sent over an Internet Protocol network
NetBIOS
❑Applications communicate across network
❑Connection communication over sessions
❑Connectionless datagram communication
❑Name registration
❑Vulnerable to analysis by malicious users
❑Implement strong passwords
❑Disallow root access
❑Disable null sessions
The BIOS provides an interface between the computer's operating system and the hardware.
File Transfer Protocols
SFTP (SSH File Transfer Protocol) is a network protocol that provides file transfer
and manipulation functionality over any reliable data stream.
File Transfer Protocols
FTPS (FTP/SSL) is a name used to provide a number of ways that FTP software
can perform secure file transfers.
File Transfer Protocols
TFTP - Trivial File Transfer Protocol is a file transfer protocol similar to FTP, but is
much more limited.
Ports and Port Ranges
A port is:
❑Endpoint of logical connections
Loop protection increases the efficiency of STP, RSTP, and MSTP by preventing
ports from moving into a forwarding state that would result in a loop opening up in
the network.
NETWORK SEPARATION is the tool used for dividing a network into smaller
parts which are called subnetworks or network segments.
Network Administration Security Methods
IMPLICIT DENY is a security stance treats everything not given specific and
selective permission as suspicious.
✓ Manage network devices so that they are configured according to security policies.
✓ Maintain documentation for all current server configurations.
✓ Establish and document baselines.
✓ Implement strong ACLs and implement implicit deny.
✓ Update antivirus software regularly.
✓ Configure only required network services.
Guidelines for Applying Network Security Administration Principles
❑Portable
❑Inexpensive
❑No obtrusive cabling
❑Introduces new, significant security issues
Wireless standards are a set of services and protocols that dictate how your Wi-
Fi network (and other data transmission networks) acts.
WIRELESS STANDARDS
802.11: There were actually two variations on the initial 802.11 wireless standard.
Both offered 1 or 2Mbps transmission speeds and the same RF of 2.4GHz.
WIRELESS STANDARDS
802.11a - The first “letter” following the June 1997 approval of the 802.11 standard,
this one provided for operation in the 5GHz frequency, with data rates up to
54Mbps.
WIRELESS STANDARDS
802.11b - Released in September 1999, it’s most likely that your first home router
was 802.11b, which operates in the 2.4GHz frequency and provides a data rate up
to 11 Mbps.
WIRELESS STANDARDS
802.11g offers wireless transmission over distances of 150 feet and speeds
up to 54Mbps compared with the 11Mbps of the 802.11b standard.
WIRELESS STANDARDS
802.11n (Wi-Fi 4)
WIRELESS STANDARDS
802.11ac (Wi-Fi 5) - Current home wireless routers are likely 802.1ac-
compliant, and operate in the 5 GHz frequency space.
Wireless Security Protocols
WPA2 is the security method added to WPA for wireless networks that provides
stronger data protection and network access control
WPA3, released in June 2018, is the successor to WPA2, which security experts
describe as “broken.”
Wireless Security Methods
While there aren’t any specific security capabilities associated with the SSID, there
are some security considerations that should be taken into account: