Unit 2
Unit 2
A network security threat is exactly that: a threat to your network and data systems. Any
attempt to breach your network and obtain access to your data is a network threat.
There are different kinds of network threats, and each has different goals. Some,
like distributed denial-of-service (DDoS) attacks, seek to shut down your network or
servers by overwhelming it with requests. Other threats, like malware or credential theft, are
aimed at stealing your data. Still others, like spyware, will insert themselves into your
organization’s network, where they’ll lie in wait, collecting information about your
organization.
There are four main kinds of network threats:
1. External threats: Threats made by outside organizations or individuals, attempting to
get into your network.
2. Internal threats: These are threats from malicious insiders, such as disgruntled or
improperly vetted employees who are working for someone else. These are common.
According to Forrester, 46% of breaches in 2019 involved insiders like employees
and third-party partners.
3. Structured threats: Organized attacks by attackers who know what they’re doing
and have a clear aim or goal in mind. State-sponsored attacks, for example, fall into
this category.
4. Unstructured attacks: Disorganized attacks, often by amateurs with no concrete goal
in mind.
What is the difference between a threat and a
vulnerability?
If threats are attackers throwing rocks at a wall, a vulnerability is a weak spot in the wall —
a place where attackers can break a window, or pull out a loose rock and let themselves in.
Put simply, vulnerabilities are flaws in your systems that can be exploited by attackers. These
are often not malicious errors, but simply mistakes or things that have been overlooked.
Rabi
We’ve all heard about them, and we all have our fears. For everyday Internet
users, computer viruses are one of the most common network threats in
cybersecurity. Statistics show that approximately 33% of household
computers are affected with some type of malware, more than half of which
are viruses.
Computer viruses are pieces of software that are designed to be spread from
one computer to another. They’re often sent as email attachments or
downloaded from specific websites with the intent to infect your computer —
and other computers on your contact list — by using systems on your network.
Viruses are known to send spam, disable your security settings, corrupt and
steal data from your computer including personal information such as
passwords, even going as far as to delete everything on your hard drive.
2. Rogue security software
Leveraging the fear of computer viruses, scammers have a found a new way
to commit Internet fraud.
Rogue security software is malicious software that mislead users to believe
that they have network security issues, most commonly a computer virus
installed on their computer or that their security measures are not up to date.
Then they offer to install or update users’ security settings. They’ll either ask
you to download their program to remove the alleged viruses, or to pay for a
tool. Both cases lead to actual malware being installed on your computer.
3. Trojan horse
Computer worms are pieces of malware programs that replicate quickly and
spread from one computer to another. A worm spreads from an infected
computer by sending itself to all of the computer’s contacts, then immediately
to the contacts of the other computers.
A worm spreads from an infected computer by sending itself to all of the
computer’s contacts,, then immediately to the contacts of the other computers
Interestingly, they are not always designed to cause harm; there are worms
that are made just to spread. Transmission of worms is also often done by
exploiting software vulnerabilities. While we don’t hear about them much
today, computer worm are one of the most common computer network
threats.
6. DOS and DDOS attack
Have you ever found yourself waiting impatiently for the online release of a
product, one that you’re eagerly waiting to purchase? You keep refreshing the
page, waiting for that moment when the product will go live. Then, as you
press F5 for the last time, the page shows an error: “Service Unavailable.” The
server must be overloaded!
There are indeed cases like these where a website’s server gets overloaded
with traffic and simply crashes, sometimes when a news story breaks. But
more commonly, this is what happens to a website during a DoS attack, or
denial-of-service, a malicious traffic overload that occurs when attackers
overflood a website with traffic. When a website has too much traffic, it’s
unable to serve its content to visitors.
A DoS attack is performed by one machine and its internet connection, by
flooding a website with packets and making it impossible for legitimate users
to access the content of flooded website. Fortunately, you can’t really overload
a server with a single other server or a PC anymore. In the past years it hasn’t
been that common if anything, then by flaws in the protocol.
A DDoS attack, or distributed denial-of-service attack, is similar to DoS, but is
more forceful. It’s harder to overcome a DDoS attack. It’s launched from
several computers, and the number of computers involved can range from just
a couple of them to thousands or even more.
Since it’s likely that not all of those machines belong to the attacker, they are
compromised and added to the attacker’s network by malware. These
computers can be distributed around the entire globe, and that network of
compromised computers is called botnet.
Since the attack comes from so many different IP addresses simultaneously, a
DDoS attack is much more difficult for the victim to locate and defend against.
7. Phishing
We know today that many servers storing data for websites use SQL. As
technology has progressed, network security threats have advanced, leading
us to the threat of SQL injection attacks.
SQL injection attacks are designed to target data-driven applications by
exploiting security vulnerabilities in the application’s software. They use
malicious code to obtain private data, change and even destroy that data, and
can go as far as to void transactions on websites. It has quickly become one
of the most dangerous privacy issues for data confidentiality. You can read
more on the history of SQL injection attacks to better understand the threat it
poses to cybersecurity.
Application Attacks
The application layer is the hardest to defend. The vulnerabilities encountered here
often rely on complex user input scenarios that are hard to define with an intrusion
detection signature. This layer is also the most accessible and the most exposed to
the outside world. For the application to function, it must be accessible over Port
80 (HTTP) or Port 443 (HTTPS).
In the diagram below, the Web application is completely exposed to the outside
world in spite of network defenses such as firewalls and intrusion prevention
systems:
In 2014, SQL injections, a type of application attack, were responsible for 8.1
percent of all data breaches. That makes it the third most used type of attack,
behind malware and distributed denial-of-service attacks. You will also find on the
list other common application attacks such as security misconfiguration, using
components with known vulnerabilities and cross-site scripting. Attackers were
able to manipulate application input and obtain confidential data without being
detected by network defense systems.
Most vulnerabilities found in the proprietary code of Web applications are
unknown to security defense systems; these are called zero-day vulnerabilities.
This is because these vulnerabilities are specific to each application and have never
been known before. A skilled attacker can easily find these vulnerabilities and
exploit the issue without being detected.
The best defense against these attacks is to develop secure applications. Developers
must be aware of how application attacks work and build software defenses right
into their applications.
1. Unvalidated Redirects and Forwards
This category of vulnerabilities is used in phishing attacks in which the victim is
tricked into navigating to a malicious site. Attackers can manipulate the URLs of a
trusted site to redirect to an unwanted location.
7. Cross-Site Scripting
Cross-site scripting is a type of vulnerability that lets attackers insert Javascript in
the pages of a trusted site. By doing so, they can completely alter the contents of
the site to do their bidding — for example, they could send the user’s credentials to
some evil server.
8. Injection
As the all-time favorite category of application attacks, injections let attackers
modify a back-end statement of command through unsanitized user input.This
takes us through several examples of SQL injections, and he ends up making the
application spit out the entire user table, including passwords.
So, it’s necessary that organizations look to have proper network security in place to
address the looming threat of cyberattacks in an effort to maintain and protect the
access to and confidentiality of, your organization’s network and data.
Physical controls – These controls are used to prevent someone from physically
gaining access to any of your organization’s network components. Your data center
or server room likely has a keycard system to limit access. That’s a great example of
a physical control. Security guards, video surveillance, picture IDs, and biometrics
are other types of physical controls.
Data and access controls – These controls are the process and policy that define
how employees can and should act when working with sensitive data, applications,
and systems. Password requirements, mobile device usage, and incident response
are just a few examples of administrative controls.
Secure remote access – Access is the one thing every cybercriminal must have to
successfully attack your organization. Access controls limit which users and devices
are able to access specific internal or cloud-based resources. Modern
implementations of access controls include zero trust network access (which
facilitates access to internal and cloud-based resources without logically placing the
user or their device on the corporate network), and secure remote access (a mix of
technologies that can address endpoint security, authentication, secure remote
connections, and elevation of privileges).
Firewall – Firewalls sit at the logical perimeter of your organization’s network acting
as a network security guard, inspecting inbound and outbound traffic and determining
whether to allow or deny it in real-time.
Virtual Private Network (VPN) – VPNs encrypt the connection between a remote
endpoint (e.g., your user working from home) and the internal corporate network.
Application security – Many applications and the hardware and OS they run on
have vulnerabilities that need to be secured. Application security technologies seek
to identify and remediate those vulnerabilities. While application security can
encompass many technologies, here we’re referencing those that are considered
true network security technologies, such as web application firewalls.
Cloud access security broker (CASB) – CASB is comprised of a number of
technologies designed to protect online services, applications, and environments
from threats that take advantage of the anytime, from anywhere, from any device
nature of the cloud.
Intrusion Prevention System (IPS) – Unlike a firewall that uses simple protocol
rules to allow and deny traffic, IPS scans network traffic and leverages threat
intelligence to identify and block potentially malicious traffic.
Web security – Outbound use of the Internet by your employees can equally result
in malicious access. Web security technologies focus on blocking malicious websites
and threats found on the Internet.
CIS Security Controls – The Center for Internet Security offers 20 specific
controls designed to create an continually secure network environment.
Zero Trust – The network security principle based on the idea of “never trust, always
verify”, initially coined by a Forrester researcher, has grown into a well-developed
architecture with a framework recently developed by the folks at NIST.
One or more of the frameworks above will provide you with enough direction to begin
building out your network security strategy, assisting in defining the people, process,
policy, and technologies needed to create a proper defense against the ever-
changing face of cyberthreats.
Introduction
How you design the network and build its components directly
contributes to the protection of the organization. Understanding the
various elements of network design and knowing their functions is
central to creating an overall security solution that includes multiple
layers of protection.
What network design elements are:-
Perimeter network boundaries, firewalls, and VLANs are just some of
the components of network design that help ensure a secure
network.
Subnetting
A secure network is a divided network. Subnetting divides a network
into smaller, more manageable, components. When creating a
subnet, you take bits from the host node and group them with the
network mask to create a subnet mask. In addition to making the
network more secure by controlling traffic and creating additional
broadcast domains, subnets also increase IP address efficiency.
DMZ
A DMZ (Demilitarized Zone) is a subnet used to keep public
information separate from private information. Any service an
organization wants to make public is placed in a DMZ as an extra layer
of security. Firewalls are used to keep the public from accessing
private areas of the network.
For example, you can create a public server and place it in a DMZ. The
server is accessible to both the private network and the public (such
as the Internet), but a firewall blocks the public’s view of the private
network, making it inaccessible. The best firewall for this purpose
transmits in three directions: internally, externally, and to the DMZ,
which allows you to direct traffic accordingly.
VLAN
Virtual Local Area Networks (VLANs) are groups of segmented hosts
that do not require the network administrator to relocate nodes or
rewire data links. VLANs are simply broadcast domains that are
configured via software, so instead of a physical link between hosts,
there is a virtual link. VLANs have several advantages, including
broadcast scope reduction and improved performance and
manageability. Of course, the most important advantage of a VLAN is
the increased security offered by grouping similar users together into
segments.
NAT
Similar to a firewall, a NAT (Network Address Translation) server hides
a network from outside users by displaying a small amount of IP
addresses for connected computers. The NAT server assigns IP
addresses to network hosts and devices while tracking incoming and
outgoing traffic. Network users connect either through the NAT server
or a router that supports NAT, so unauthorized users will only see one
address rather than all network connections.
The majority of systems that use NAT have private IP addresses for
network hosts and public IP addresses that the NAT uses to translate
and communicate with outside networks; this is called dynamic NAT.
The NAT is thus a proxy between the local network and the Internet.
PAT
Port Address Translation (PAT) is a more limited option form of NAT. A
NAT system can use more than one public IP address, whereas PAT
systems use only one address and share the network port. PAT gives
network hosts access to outside networks using a router’s IP address.
The protocol, either TCP or UDP, and the port can be specified by the
administrator. Because it is such a limited option, PAT is usually
employed on smaller home networks.
Telephony
The merger of telecommunications and networking resulted in
telephony, or Voice over IP (VoIP). This technology allows
communications services like voice calling, SMS, fax and voice
messaging to be provisioned over computer networks. Telephony
uses IP telephones and a network connection to transmit
telecommunications via data packets.
When it comes to security, telephony services have to be protected in
the same way as other network services. VoIP is vulnerable to DOS
attacks, call interception, theft of service and malware embedded in
the session, so it is extremely important that telephony services are
considered when designing network security.
Remote Access
Often referred to as RAS, Remote Access Services allow network
connection via remote systems. Remote access can be established
with a dial-up modem or network systems, like VPNs or DSL. The most
popular remote access service is remote administration, which is used
to take control of another user’s workstation. Depending on the
protocols used, the remote connection can either be in the clear or
secured. Because of the security risks involved with RAS, it is
recommended that network administrators set up remote access via
a manual start service and only launch the application when it is
needed to prevent back-door access to the network.
NAC
In order to ensure operational security of a network, a set of
standards called Network Access Control (NAC) defines the client
requirements before granting access to the network. Typically, NAC
makes sure that clients have no viruses and adhere to the network’s
specific policies before allowing access to the network. NAC protocols
enforce pre-admission and post-admission guidelines, controlling not
only which clients have access to the network but also where those
clients can go and what they can do once access is granted.
Virtualization
In order to make cloud computing possible, hardware virtualization is
necessary. This means that the physical hardware of a device is
abstracted using a hypervisor, also known as a Virtual Machine
Manager, and made available on a virtual machine. The physical
device is known as the host and the virtual devices are guests.
Virtual machines can run several operating systems in parallel from a
single physical computer. Because so many systems use virtualization,
it is important to study several different use examples and have a
general understanding of the implementation of virtual hardware.