Ec Council
Ec Council
GOAL OF NETWORK DEFENSE incolves predicting , protecting , monitoring , analyzing , detecting , and responding.
1.Confidentiality
2.availability
3.integrity
Confidentiality:-
information is not disclosed to un-authorized parties or other than authorized user no one can access it(eg. Man in
integrity:-
information trnasfered through from sender to receiver cannot be modified or changed by third party.(eg.man in th
availability:-
the information is available to only authorized user without disturbance
1.preventive :-
techniques that use to avoid threads or attacks. It consist of access control mechanism as a firewall, admission cont
2.reactive :-
techniques that use to detect attacks or threads. It includes security monitoring methods such as IDS, SIMS, TRS, IPS
3.retrospective:-
it examine the cause of attacks or any other info which help organization to plan a route to recover the data.
it includes fault finfing mechanism such as protocol analyzers and traffic monitors. Security forensics techniques as
4.proactive:-
basically it is a future plan that helps an organization to prevent from attacks or threads in future
radius , tacacs+ , kerberos , pgp , s/mime , secure HTTP , HTTPS , tls , ssl , Ipsec
radius:- remote authentication dial in user services it works on OSI model by using UDP and TCP as transport protocol. Also
it works in 3 differents stages such as:-
access request toward the server (id and pass)
access accepted or rejected
access challenges(accounting request)
TACACS+
network security protocols devided into diff layers such as
*transport
*network
*application
Transport:-
it includes TLS and SSL protocols.
TLS:- TLS protocol provides security and dependability of data between two communicating parties.
SSL:- SSl proviides security to the communication between clients and servers
Network layer:-
IPsec:- this protocol authenticate the packets during the transmission of data.
Application layer:-
PGP(pretty good protocol):- it provides cryptographic privacy and authentication for network communication and enhanc
Kerberos:- it is a client-server model that is implemented for authenticating request in computer network
RADIUS:- it provides centralized authentication,authorization,and accounting(AAA) for remote access servers to communicat
MODULE 02
ACCESS control
it works as the user sends a request toward the server then the authentication works on access control function
and it authorize the request in authorization database which manage by administrator(who add or delete or
modify account details in database)then the given request is correct then the access is given either it declined.
1.Separation of Duties(SoD)
2.need-to-know
3.princile of least privilege
1.Separation of Duties(SoD):-
bassically it’s a brekdown of a task which isure that the no one has the access to perfom all functions by
2.need-to-know:-
int this access is provided only to the information that is required for performing a specific task
Access Control Models:- it’s a standard which provides a predifined framework for implementing the necessary lvl of a
MAC(mandatory access control)
DAC(discretionary access control)
RBAC(role-based access control)
RB-RBAC(rule-based access control)
Identity and access management(IAM):- it responsible for providing the rigght individual with right access at the right time.
identity Repository:-
in the attributes related to the users identities are stored.
1.centralizwd authorization
2.decentralized authorization
3.implicit authorization
4.ecplicit authorization
1.centralizwd authorization:-
2.decentralized authorization:-
each network resource maintain its authorization unit and performs authorization locally
it maintain iits own database
3.implicit authorization:-
4.ecplicit authorization:-
REGULATORY FRAMEWORK it contains set of guidelines and best practices for security
use of regulatory framework according to field of uses
regulatory framework :-
under this frame work , an organization must document its pilicies, standards as well as procedures, prac
Polices:-
polices are high level statements dealing with the administrative network security of an organization.
eg. Policy includes email and encryption policies.
standards:-
it comprise specific low lvl mandatory controls related to the implementation of a specific
technology useful for enforcing and supporting policies.
it includes password policy such as password standard such as password complexity , password length etc or includ
Clear Communication
Brief and Clear Information
Defined Scope and Applicability:
Enforceable by Law
Recognizes Areas of Responsibility
Sufficient Guidance
physical layer
data link layer
network layer
transport layer
session layer
presentation layer
application layer
1. Physical Layer transmit raw bit stream over the physical medium
The physical layer is responsible for the physical cable or wireless connection between
network nodes. It defines the connector, the electrical cable or wireless technology connecting the
devices, and is responsible for transmission of the raw data, which is simply a series of 0s and 1s, while t
3. Network Layer
decides which physical path the data will take
4. Transport Layer
transmit data using transmission protocols including TCP and UDP
5. Session Layer
maintain connection and is responsible for controlling ports and sessions
6. Presentation Layer
ensure the data is in usable format and is where data encryption occurs
7. Application Layer
human-computer interaction layer, where application can access the network services.
preventive controls:- security types like door locks and security guard
detective controls:- includes security controls like motion detector, alarm system and sensors, etc
reovery controls:- used to recover security violation and restore information and system
compensating controls:-
used as an alternative control when the intended controls failed
eg. Hot sites, backup power system.
networl segmentation:-
is a splitting up the network into smaller network segments
firewall:- firewall only protects from network threads which came from outside
firewall allows or denied 4 thinngs
1.protocols
2.ports
3.programs
4. ip addresses
thid all goes under the BASTION HOST
Bastion Host:-
it is a computer system designed and configured to protect network resources
from attacks.
it is only host that can addresed directly from public network
it provide limited range of services such as website hosting and mail to ensure
security
need for baston host:-
minimize chances of penetration by intruders
create all logs which used to identify attacks or attempts to attack
it provide an additional lvl of security
DMZ(demilitarized zone):-
urity and integrity of data in transit. The network security protocols ensure the security of the data passinng through the network.
on system)
ntedd traffic and threads.
ng , and responding.
is a authorizing user
m as a firewall, admission control mechanism as NAC and NAP, cryptographic application such as IPSec and SSL, biometric techniques as sp
ods such as IDS, SIMS, TRS, IPS.
ds in future
CP as transport protocol. Also it uses password authentication protocol(PAP), the challenge handshake authentication(CHAP), or extensibl
k communication and enhances the security of emails
access servers to communicates with central servers.
n individual
practices established in order for organization to follow and thus meet their regulatory needs, enhance processes, improve protection an
rds as well as procedures, practices, and guidelines.each of them have different purposes thus they cannot be combined in ine document.
an organization.
password length etc or includes data encryption standard(DES), advanced encryption standard(AES), and rivest-shamir-adleman algorithm
tructions useful for implementing the controls that are defined by multiple policies, standards, and guidelines
e are further divided into
ity, network security,
ility, confidentiality,
ty of operations, and
how the system’s architecture
nications, encryption,
wned versus public
em in the program.
ork services.
through the network.
est-shamir-adleman algorithm