Computer Security System Notes
Computer Security System Notes
UNIT – 5
Internet Infrastructure
One of the greatest things about the Internet is that nobody really owns it. It is a
global collection of networks, both big and small. These networks connect
together in many different ways to form the single entity that we know as
the Internet. In fact, the name comes from this idea of interconnected networks.
Since its beginning in 1969, the Internet has grown from four host computer
systems to tens of millions. However, just because nobody owns the Internet, it
doesn't mean it is not monitored and maintained in different ways. The Internet
Society, a non-profit group established in 1992, oversees the formation of the
policies and protocols that define how we use and interact with the Internet.
When you connect to the Internet, your computer becomes part of a network.
Every computer that is connected to the Internet is part of a network, even the
one in your home. For example, you may use a modem and dial a local number to
connect to an Internet Service Provider (ISP). At work, you may be part of a local
area network (LAN), but you most likely still connect to the Internet using an ISP
that your company has contracted with. When you connect to your ISP, you
become part of their network. The ISP may then connect to a larger network and
become part of their network. The Internet is simply a network of networks.
There are many businesses that don’t have a complete inventory of all of
the IT assets that they have tied into their network. This is
a massive problem. If you don’t know what all of the assets are on your
network, how can you be sure your network is secure?
The easiest fix for this is to conduct a review of all the devices on your
network and identify all of the various platforms they run. By doing this, you
can know what all of the different access points are on your network and
which ones are most in need of security updates.
Problem 2: Abuse of User Account Privileges
According to data cited by the Harvard Business Review, for the year of 2016,
“60% of all attacks were carried out by insiders.” Whether it’s because of honest
mistakes (accidentally sending info to the wrong email address or losing a work
device), intentional leaks and misuse of account privileges, or identity theft arising
from a phishing campaign or other social engineering attack that compromises
their user account data, the people inside your business represent one of the
biggest security problems you’ll ever face.
Because these threats come from trusted users and systems, they’re also among
the hardest to identify and stop.
However, there are ways to minimize your risk in case of an insider attack.
The problem is that some businesses have an open network structure where once
an attacker is in a trusted system, they have unfettered access to all systems on
the network.
If the network is structured with strong segmentation to keep all of its discrete
parts separate, then it’s possible to slow down the attacker enough to keep them
out of vital systems while your security team works to identify, contain, and
eliminate the breach.
When this happens, critical cyber security alerts may get missed, and successful
attacks may not be eliminated in time to minimize damage.
Routing Security
1. Bad guys play games with routing protocols.
2. Traffic is diverted.
– Enemy can see the traffic.
– Enemy can easily modify the traffic.
– Enemy can drop the traffic.
Types of Attacks:
1. Denial of service (DoS) – An attack where the attacker renders a computer
useless (inaccessible) to the user by making a resource unavailable or by
flooding the system with traffic.
3. DNS spoofing (also known as DNS cache poisoning) – Attacker will drive the
traffic away from real DNS servers and redirect them to a “pirate” server,
unbeknownst to the users. This may cause in the corruption/theft of a user’s
personal data.
4. Fast flux – An attacker will typically spoof his IP address while performing an
attack. Fast flux is a technique to constantly change location-based data in
order to hide where exactly the attack is coming from. This will mask the
attacker’s real location, giving him the time needed to exploit the attack.
Flux can be single or double or of any other variant. A single flux changes
address of the web server while double flux changes both the address of
web server and names of DNS serves.
4. Sharing login credentials - The more login credentials are shared, the more
they likely they are commonly know by too many others, even with people
who should not have access to the system. The more they are shared, the
more difficult it is to establish an audit trail to help track down the source
of a problem. The more they are shared, the greater the number of people
affected when logins need to be changed due to a security breach or
threat.
8. Corporate web site is encrypted but the login process is not - Encrypting a
session after login may be useful but failing to encrypt logins is a bit like
leaving the key in the lock when you are done locking the barn door. Even if
a login form POSTs to an encrypted resource, in many cases this can be
circumvented by a malicious security cracker who develops their own login
form to access the same resource and allow them access to sensitive data.
9. Using weak encryption for back end management - Using Windows Remote
Desktop without and encrypted user-id and password in a non-VPN
environment is opening your site to the world. Using proprietary platform-
specific technologies often leads to resistance to use of secure encryption
for Web site access. Cross-platform-compatible strong encryption such as
SSH is usually preferable to platform-specific, weaker encryption tools such
as Windows Remote Desktop.
(C) Caching Web browsers temporarily save web pages on a user’s machine as
he/she visits them to speed up and ease access in case the user wants to visit
those pages again. This is known as cashing. The hacker has gained the access of
the user’s machine and views all the cashed contents of the user that may contain
user IDs, passwords and pictorial data without any authentication.
(D) Cookie Poisoning –
Cookies are created by the web servers when a user visits a website. Cookies are
used to save credentials and the interaction information of the user with the
website, which the web server can use later when processing the sessions of that
particular user. Cookie poisoning is the alteration or stealing of cookie in a user’s
machine by a hacker to reprieve personal information. If the hacker gets a hold of
a cookie containing a password and username, he or she can use the cookie on his
or her machine and the web server will not demand any verification.
By allowing access to known IP addresses, for example, you could allow access
only to recognized, established IP addresses, or, you could deny access to all
unknown or unrecognized IP addresses.
By denying access to IP addresses or ports, for example, you could deny access to
port 80 to outsiders. Since most HTTP servers run on port 80, this would in effect
block off all outside access to the HTTP server.
IP packet filtering is accomplished by all firewalls in some fashion. This is normally
done through a packet-filtering router. The router will filter or screen packets
traveling through the router's interfaces that are operating under the firewall
policy established by the enterprise. A packet is a piece of information that is
being transmitted over the network. The packet filtering router will examine the
path the packet is taking and the type of information contained in the packet. If
the packet passes the firewall policy's tests, it is permitted to continue on its path.
The information the packet filtering router looks for includes
1. The packet source IP address and source TCP/UDP port, and
2. The destination IP address and destination TCP/UDP port of the packet.
Some packet-filtering firewalls will only be able to filter IP addresses and not the
source TCP/UDP port, but having TCP or UDP filtering as a feature can provide
much greater maneuverability, since traffic can be restricted for all incoming
connections except those selected by the enterprise.
Although packet-filtering firewalls are less expensive than other types, and
vendors are improving their offerings, they are considered less desirable
in maintainability and configurability. They are useful for bandwidth control and
limitation but are lacking in other features such as logging capabilities. If the
firewall policy does not restrict certain types of packets, the packets may
go unnoticed until an incident occurs. Enterprises utilizing packet-filtering
firewalls should look for devices that can provide detailed logging, a simplified
setup, and firewall policy checking.
Devices that Help us with Network Security
Firewalls − They can be software or applications which operate at the network
level. They protect Private networks from external users and other networks.
Generally, they are a compound of programs and their main function is to
monitor the traffic flow from outside to inside and vice versa. Their position is
generally behind a router or in front of the router depending on the network
topologies.
They are also called Intrusion detection devices; their traffic rules are configured
according to the company policy rules. For example, you block all incoming traffic
to port POP because you don’t want to receive a mail so as to be secured from all
possible mail attacks. They log all the network attempts for a latter audit for you.
They also can work as packet filters this means that the firewall takes the
decisions to forward or not the packet based on source and destination
addresses and ports.
Some of the recommended brands are −