Network Security UNIT III
Network Security UNIT III
1. Segment
The first best practice is to segment your network into zones. Basic
network segments for a perimeter-based network firewall in a small
organization are designed to isolate it from external networks, maybe
creating a demilitarized zone (DMZ) and internal network.
In the zero trust model, data can be considered the new perimeter. Access
to that data is allowed only to the people, devices, systems, and
applications that need it as part of their defined role. To implement zero
trust, deploy role-based access controls and identity management
systems that can verify access.
This includes:
Ensuring the device or machine where they are making the request from
complies with company requirements (e.g. is not in an infected or rooted
state).
3. Secure IoT
IoT security is an extension of the “Trust but Verify” best practice. IoT
devices connected to the network are ubiquitous today. Like shadow-IT,
employees may connect IoT devices to the network without first getting
approval. Unfortunately there is a good chance the device is vulnerable,
and, if it is exposed to the Internet, it has a good chance of being
discovered and compromised by bot networks.
4. Enable Security
o CDR enables them access to only safe files while the files are emulated in
a virtual sandbox to watch for maliciousness.
o Likewise, users should be protected from visiting sites that are malicious
and serving up drive-by malware.
Secure Data: Prevent the inadvertent loss of sensitive data with Data
Loss Prevention (DLP) technologies. Users sometimes inadvertently or out
of convenience may send work to a personal email. DLP technologies
provide security and visibility into how employees are using company
data.
o Device security products that secure laptops and BYOD devices apply the
zero trust model’s micro-segmentation best practice by creating a security
layer for these mobile devices.
Here, we revisit one of the top cyber security recommendations from the
2021 Security Report: be cyber-aware and use this threat intelligence to
your advantage and what this means when applied to network security
o Another security audit finding may show that sensitive data that is not
secured at rest, in transit across the network, or while in use. Encrypting
data at rest and using VPNs can help secure data from eavesdropping and
when a breach occurs.
o Regularly backing up system configurations and data will help you recover
when systems fail, administrators make mistakes, and, in a worst-case
scenario, when a breach occurs.
o Firewalls need to do deep packet inspection which can add latency and
lower throughput. Use security systems that can scale as needed to meet
demand.
AUTHENTICATION APPLICATIONS
KERBEROS
Kerberos provides a centralized authentication server whose function is
to authenticate users to servers and servers to users. In Kerberos
Authentication server and database is used for client authentication.
Kerberos runs as a third-party trusted server known as the Key
Distribution Center (KDC). Each user and service on the network is a
principal.
The main components of Kerberos are:
Database:
The Authentication Server verifies the access rights of users in the
database.
Kerberos Overview:
Step-1:
User login and request services on the host. Thus user requests for
ticket-granting service.
Step-2:
Authentication Server verifies user’s access right using database and
then gives ticket-granting-ticket and session key. Results are
encrypted using the Password of the user.
Step-3:
The decryption of the message is done using the password then send
the ticket to Ticket Granting Server. The Ticket contains
authenticators like user names and network addresses.
Step-4:
Ticket Granting Server decrypts the ticket sent by User and
authenticator verifies the request then creates the ticket for
requesting services from the Server.
Step-5:
The user sends the Ticket and Authenticator to the Server.
Step-6:
The server verifies the Ticket and authenticators then generate
access to the service. After this User can access the services.
Kerberos Limitations
Applications
E-mail Security
It's not like, all reliable email services are confidential and protected
indeed. Several free alternatives may do further damage. Therefore, it
meets some or most of the following requirements when looking for the
most reliable email provider:
1. End-to-end encryption
No email service can call itself secure without end-to-end encryption. Your
message is only encoded till it hits Gmail or yahoo mail when you're using
a standard service. If end-to-end encryption is used, the text can only be
read by the sender and the receiver. The most popular end-to-end
encryption for protected messages is the so-called Pretty Good Protection
or PGP in general.
2. Two-factor-authentication (2FA)
It gives you great protection and protects your accounts in case anyone
learns your password. You find it more difficult to hack into your inbox by
incorporating anything that you must have, like a mobile. There are
several 2FA options, varying from Google and other SMS to authorization
apps.
After the message hits their servers, Gmail, Hotmail, and other popular
services don't encode your confidential information. This implies that they
can translate them and make reading easier for attackers as well.
3. Do not be a commodity.
If your email is good and free to use, there may be some possibilities that
you are treated as a commodity. However, very few users realize that
Gmail constantly searches the mailbox for words and utilizes them to
display customized advertisements. By using this way, you are helping
Google to earn money from your data with the help of Gmail.
The USA and any cognitive ability-sharing nation with Fourteen Eyes will
someday wish to access your mailbox. If the vendor's database is in one
of those nations, it would be much quicker to do that than to obtain
access to any of Switzerland's nuclear bunkers.
Encryption Levels
o Transport-level Encryption
o End-to-end Encryption
PGP
o PGP stands for Pretty Good Privacy (PGP) which is invented by Phil
Zimmermann.
o PGP was designed to provide all four aspects of security, i.e.,
privacy, integrity, authentication, and non-repudiation in the
sending of email.
o PGP uses a digital signature (a combination of hashing and public
key encryption) to provide integrity, authentication, and non-
repudiation. PGP uses a combination of secret key encryption and
public key encryption to provide privacy. Therefore, we can say that
the digital signature uses one hash function, one secret key, and
two private-public key pairs.
o PGP is an open source and freely available software package for
email security.
o PGP provides authentication through the use of Digital Signature.
o It provides confidentiality through the use of symmetric block
encryption.
o It provides compression by using the ZIP algorithm, and EMAIL
compatibility using the radix-64 encoding scheme.
Following are the steps taken by PGP to create secure e-mail at the sender
site:
Following are the steps taken to show how PGP uses hashing and a
combination of three keys to generate the original message:
S/MIME
Email Encryption
The email content is encrypted using the recipient's public key, the
moment the sender hits the Send button. Even if the email gets
intercepted by anyone, they cannot view the content of the email unless
they have access to the private key of the recipient.
Data Confidentiality
The encryption of the email content ensures the confidentiality of the data
and attachments sent through the email. Any attempt to view the content
of the email is made void as the data can be decrypted only with the help
of a private key unique to the recipient.
Digital Signature
The email will be digitally signed along with encryption on installing the
S/MIME certificate. The email is signed using the private key of the sender
and authenticated by the public key of the recipient. An unaltered digital
signature shows that the email content has not been compromised and
tampered with.
Signature Authentication
When the sender digitally signs the email using their private key, the
recipient validates and authenticates the signature using their public key
to ensure that the email is received from a reliable source.
The digital signature of each sender is unique and is assigned to the user
and the domain when the S/MIME certificate is purchased and installed.
This voluntarily provides the non-repudiation of the signature by the
sender in case of any legal proceedings.
When the recipient of a digitally signed email is validated using the public
key of the recipient, they're assured of the absence of any alterations in
the content of the email and is intact as and when it was sent.
IP SECURITY (IPSEC)
IPSec refers to a collection of communication rules or protocols used to
establish secure network connections. Internet Protocol (IP) is the
common standard that controls how data is transmitted across the
internet. IPSec enhances the protocol’s security by
introducing encryption and authentication. For example, it encrypts data
at the source and then decrypts it at the destination. It also verifies the
source of the data.
Uses of IP Security
IPsec can be used to do the following things:
To encrypt application layer data.
To provide security for routers sending routing data across the public
internet.
To provide authentication without encryption, like to authenticate that
the data originates from a known sender.
To protect network data by setting up circuits using IPsec tunneling in
which all data being sent between the two endpoints is encrypted, as
with a Virtual Private Network(VPN) connection.
What is IPSec Encyrption?
IPSec encryption is a software function that encrypts data to protect it
from unauthorized access. An encryption key encrypts data, which must
be decrypted. IPSec supports a variety of encryption algorithms,
including AES, Blowfish, Triple DES, ChaCha, and DES-CBC. IPSec
combines asymmetric and symmetric encryption to provide both speed
and security during data transmission. In asymmetric encryption, the
encryption key is made public, while the decryption key remains private.
Symmetric encryption employs the same public key to encrypt and
decrypts data. IPSec builds a secure connection using asymmetric
encryption and then switches to symmetric encryption to speed up data
transmission.
Components of IP Security
It has the following components:
Encapsulating Security Payload (ESP)
Authentication Header (AH)
Internet Key Exchange (IKE)
1. Encapsulating Security Payload (ESP): It provides data integrity,
encryption, authentication, and anti-replay. It also provides authentication
for payload.
2. Authentication Header (AH): It also provides data integrity,
authentication, and anti-replay and it does not provide encryption. The
anti-replay protection protects against the unauthorized transmission of
packets. It does not protect data confidentiality.
IP Header
IP Security Architecture
IPSec (IP Security) architecture uses two protocols to secure the traffic or
data flow. These protocols are ESP (Encapsulation Security Payload) and
AH (Authentication Header). IPSec Architecture includes protocols,
algorithms, DOI, and Key Management. All these components are very
important in order to provide the three main services:
Confidentiality
Authenticity
Integrity
IP Security Architecture
Working on IP Security
The host checks if the packet should be transmitted using IPsec or not.
This packet traffic triggers the security policy for itself. This is done
when the system sending the packet applies appropriate encryption.
The incoming packets are also checked by the host that they are
encrypted properly or not.
Then IKE Phase 1 starts in which the 2 hosts( using IPsec ) authenticate
themselves to each other to start a secure channel. It has 2 modes.
The Main mode provides greater security and the Aggressive mode
which enables the host to establish an IPsec circuit more quickly.
The channel created in the last step is then used to securely negotiate
the way the IP circuit will encrypt data across the IP circuit.
Now, the IKE Phase 2 is conducted over the secure channel in which
the two hosts negotiate the type of cryptographic algorithms to use on
the session and agree on secret keying material to be used with those
algorithms.
Then the data is exchanged across the newly created IPsec encrypted
tunnel. These packets are encrypted and decrypted by the hosts using
IPsec SAs.
When the communication between the hosts is completed or the
session times out then the IPsec tunnel is terminated by discarding the
keys by both hosts.
What are IPSec modes?
Tunnel: The IPSec tunnel mode is appropriate for sending data over
public networks because it improves data security against
unauthorised parties. The computer encrypts all data, including the
payload and header, and adds a new header to it.
Transport: IPSec transport mode encrypts only the data packet’s
payload while leaving the IP header unchanged. The unencrypted
packet header enables routers to determine the destination address of
each data packet. As a result, IPSec transport is utilized in a closed and
trusted network, such as to secure a direct link between two
computers.
Features of IPSec
Authentication: IPSec provides authentication of IP packets
using digital signatures or shared secrets. This helps ensure that the
packets are not tampered with or forged.
Confidentiality: IPSec provides confidentiality by encrypting IP
packets, preventing eavesdropping on the network traffic.
Integrity: IPSec provides integrity by ensuring that IP packets have
not been modified or corrupted during transmission.
Key management: IPSec provides key management services,
including key exchange and key revocation, to ensure that
cryptographic keys are securely managed.
Tunneling: IPSec supports tunneling, allowing IP packets to be
encapsulated within another protocol, such as GRE (Generic Routing
Encapsulation) or L2TP (Layer 2 Tunneling Protocol).
Flexibility: IPSec can be configured to provide security for a wide
range of network topologies, including point-to-point, site-to-site, and
remote access connections.
Interoperability: IPSec is an open standard protocol, which means
that it is supported by a wide range of vendors and can be used in
heterogeneous environments.