Unit 4 - Servers
Unit 4 - Servers
Web Servers: Web servers are software programs that handle requests from web clients (such
as browsers) and deliver web content back to them over the Internet.
1. Software Complexity:
○ As software systems grow in complexity, they become more challenging to
secure. Increased complexity often leads to more vulnerabilities and potential
security risks.
○ Maintaining security involves regular updates, patches, and thorough testing to
identify and mitigate potential weaknesses.
2. Attacks:
○ Various types of attacks target vulnerabilities in web servers and applications.
Common examples include:
■ Phishing: Attempts to obtain sensitive information by masquerading as a
trustworthy entity.
■ Malware: Malicious software designed to disrupt, damage, or gain
unauthorized access to computer systems.
■ DDoS (Distributed Denial of Service): Overwhelms a server with traffic
from multiple sources, rendering it unavailable to legitimate users.
○ Implementing strong security measures, such as firewalls, intrusion detection
systems, and regular security audits, helps protect against these threats.
3. Security and Privacy Levels:
○ Implementing different levels of security and privacy measures based on the
sensitivity of information and user requirements.
○ Examples include encryption for data transmission, access control mechanisms,
and secure storage solutions to ensure confidentiality, integrity, and availability of
data.
Security Policy:
1. Security Policy:
○ A set of guidelines and practices designed to protect information and maintain
secure operations.
○ Involves defining roles, responsibilities, and acceptable use policies to ensure
consistent security practices across the organization.
○ A well-defined security policy includes:
■ Data Classification: Categorizing data based on its sensitivity and
determining appropriate handling and protection measures.
■ Access Control: Defining who has access to what information and
resources, and under what conditions.
■ Incident Response: Establishing procedures for responding to security
breaches or incidents, including reporting, investigation, and remediation.
2. Accessibility and Risk Analysis:
○ Evaluating the accessibility needs of users against potential security risks.
○ Involves identifying vulnerabilities, assessing their potential impact, and
implementing appropriate security measures to mitigate risks while maintaining
usability.
○ Steps in risk analysis include:
■ Threat Identification: Determining potential threats to the system.
■ Vulnerability Assessment: Identifying weaknesses that could be
exploited by threats.
■ Impact Analysis: Evaluating the potential consequences of a security
breach.
■ Risk Mitigation: Implementing measures to reduce the likelihood or
impact of identified risks.
Encryption Schemes:
1. Encryption:
○ The process of encoding data to prevent unauthorized access. Common
encryption schemes include:
■ SSL/TLS: Secure protocols for encrypting data transmitted over the
internet, ensuring secure communication between clients and servers.
○ Encryption is essential for protecting sensitive information during transmission
and storage, safeguarding it from interception and unauthorized access.
○ Types of encryption:
■ Symmetric Encryption: Uses the same key for both encryption and
decryption. Faster but requires secure key management.
■ Asymmetric Encryption: Uses a pair of keys (public and private) for
encryption and decryption. More secure but computationally intensive.
2. Secure Web Documents:
○ Ensuring web documents are transmitted securely using protocols like HTTPS,
which encrypts data between the server and client.
○ Using secure coding practices to prevent vulnerabilities like cross-site scripting
(XSS) and SQL injection.
○ Regularly updating and patching web server software and applications to address
security vulnerabilities.
Digital Signatures:
Firewalls:
1. Firewalls:
○ Security systems that monitor and control incoming and outgoing network traffic
based on predetermined security rules.
○ Act as a barrier between trusted internal networks and untrusted external
networks, blocking unauthorized access while allowing legitimate communication.
○ Functions of firewalls:
■ Packet Filtering: Inspects packets and allows or blocks them based on
source/destination IP addresses, ports, and protocols.
■ Stateful Inspection: Monitors the state of active connections and makes
decisions based on the context of traffic.
■ Proxy Service: Intercepts and inspects all traffic between the network
and external sources, providing an additional layer of security.
2. Types of Firewalls:
○ Packet-Filtering Firewalls: Analyze network packets and allow or block them
based on predefined rules. Simple and fast but can be bypassed by sophisticated
attacks.
○ Stateful Inspection Firewalls: Monitor the state of active connections and make
decisions based on the context of traffic. More secure than packet-filtering
firewalls.
○ Proxy Firewalls: Intercept and inspect all traffic between the network and
external sources, providing an additional layer of security. Can filter content and
cache web pages.
○ Next-Generation Firewalls (NGFW): Combine traditional firewall functions with
advanced features like intrusion prevention, application awareness, and
cloud-delivered threat intelligence.
1. IDS:
○ Tools used to detect unauthorized access or violations of policy within a network.
○ Monitor network traffic for suspicious activity and can alert administrators or take
action to block potential threats.
○ Functions of IDS:
■ Signature-Based Detection: Compares network traffic against a
database of known attack signatures.
■ Anomaly-Based Detection: Identifies deviations from normal network
behavior, potentially indicating a new or unknown attack.
2. Types of IDS:
○ Network-Based IDS (NIDS): Monitor network traffic for suspicious activity across
the entire network. Typically deployed at strategic points, such as the network
perimeter.
○ Host-Based IDS (HIDS): Monitor individual host systems for signs of suspicious
activity or policy violations. Can analyze system logs, file integrity, and user
activities.