Lesson 1 Introduction to Network Computer Security
Lesson 1 Introduction to Network Computer Security
Security
Lesson 1
Introduction to Computer Network Security
Lecturer: Dr Msagha J Mbogholi, PhD
Content
Some common security vocabulary used in this course includes (Schneider, 1999):
• Vulnerability – a defect or weakness found in the network system, be it in design,
operation or maintenance.
• Threat – someone or something capable of exploiting a vulnerability
• Attack – exploitation of a vulnerability (could be for good or bad purpose)
• Attacker – the one who carries out an attack
• Exploit – something that can be used for an attack
• Defender – person or process that mitigates an attack
• Risk – an assessment of the likelihood of an attacker or a threat using an exploit to
attack or compromise the network.
Security Dimensions
• Confidentiality is the way in which information is only accessed by those who are
authorized to do so.
• In a network information can be in one of two states: residing in a device, or in
transit to or from a device.
• Confidentiality dimension must ensure that information is not accessed by
unauthorized users whether in a network device or in transit.
• There are different mechanisms for implementation of confidentiality, and these
will be discussed later.
Integrity
• Integrity ensures that the information is in the form in which it was entered
into the system.
• Essentially this means that integrity ensures that the information has not
been tampered with (modified) in any form.
• In a network integrity mechanisms need to be implemented at both source
(where the information is stored) and in transit (between points where the
information is being sent)
Availability
• Availability simply means that authorized users can have access to the
network as and when they need to use it.
• In the absence of availability the network will not be accessible and users
can’t get services that the network is meant to provide.
CIA
• It is not possible to discuss network security without examining the role of the OSI
model in this context.
• The OSI model was developed by ISO as a model for network engineers to use in
1984.
• It is a theoretical model/framework that seeks to explain what happens in a
network, i.e. the functions of the network.
• The model does this by dividing the functions of the network using 7 layers.
• The key question is how security is applied using the model in order to understand
in which layers it should be applied and how.
OSI Model & Security
• Access attacks – when the attacker wishes to access information that they
are not authorized to see. This compromises the Confidentiality (c) of
information. The attack may occur on a device or information in transit.
• Modification attacks – when the attacker seeks to modify information that
they are not authorized to modify. This compromises the Integrity (I) of the
information. This attack may occur on the device or information in transit.
Categories Of Network Attacks (cont’d)
• Denial Of Service attack – this occurs when the attacker floods resources on
the network such that they are not able to service legitimate users. This
attack compromises the Availability (A) of the resources and/or the network
as a whole.
• Repudiation attack – to repudiate is to refuse or to deny the validity of
something. A repudiation attack occurs when there is an attempt to deny
the validity of a transaction or to deliberately give false information. This
compromises the accountability of the information or transaction.
Specific Threats to the Network
• Snooping – this is a basic form of attack where the attacker goes through files with
the hope of finding some specific information. This is also known as sniffing. A
passive attack.
• Eavesdropping – this is mostly done electronically; the attacker positions himself
between the source and the destination hoping to gain access to information. Of
course the access is unauthorized. A passive attack.
• Interception – this happens when the attacker positions himself between the
source and the destination. The attacker intercepts the information before it
reaches its destination; from there the attacker may either let the information go
on, modify it, or prevent it from reaching the destination. A man in the middle
attack is a form of interception attack. An active attack.
Specific Threats to the Network (cont’d)
• Denial of Service (DoS) attack – in this scenario the attacker floods the resources of
a network with the intention of denying legitimate users access to those resources.
The attack is normally targeted at a server or router, but may also be targeted at
other network resources such as printers. In DoS a single machine targets a single
network device (also known as a host)
• Distributed Denial of Service (DDoS) attack – a DDoS is an all out attack on a single
machine/device on the network. In this case several machines are used to attack
the targeted host. This means that a DDoS is more intense and will ultimately
cause more damage in the network.
Specific Threats to the Network (cont’d)
• Theft – this happens when the network is physically attacked. The attacker may
physically steal network resources with malicious intentions.
• Phishing – this is a form of attack where users are fooled into giving away their
personal details thinking it is a legitimate website whereas it is not. Phishing has
been improved to include the concept of the “evil twins” around WiFi access points
(APs).
• Insider threats – these are the hardest form of attack to control since the attacker is
an insider with access to most of the network resources.
• Attack forms are being modified by the day as the average network user becomes
more familiar with the attacks. It is for this reason that the modern network
security specialist needs to keep abreast of the different forms of attack that the
network is vulnerable to; this will help in developing the right preventive defense
mechanisms. This leads us to the next question. Who are the attackers?
Who are the Attackers?
• Insiders – these are the most dangerous threat to an organization. They consist of
users who are already authorized to use the system, employees, partners (who
have access vide the extranet), or even temporary contractors. They will attack the
network from inside causing a lot of damage to the information and even resources
in the network.
• Cybercriminals – this is a person or group who attack networks with the main
purpose of financial gain. They will attack networks with the purpose of stealing
information or exposing vulnerabilities, then using these to demand money or steal
it electronically. They are the modern day criminal who use cyber crime as a form
of white collar crime.
Who are the Attackers? (cont’d)
• Script Kiddies – as the name implies these are seen as newbies in cyber
crime. They will use existing software to penetrate network systems and
engage in a form of cyber crime such as cybervandalism or even steal
information. In reality they are less experienced crackers.
• Cyberterrrorists – They will attack networks and sites based on their
ideologies or religious beliefs. Unlike the hacker who does it for financial
gain a cyber terrorist is interested in doing what hackers do but they are
driven by different reasons.
Who are the Attackers? (cont’d)
• Spies – this is the James Bond of the cyber world. They are hired to steal
information from the network or a specific computer without leaving a trace
that they were ever there; this implies that they are usually very skilled and
tech savvy.
• As can be seen the network is exposed to so many different users with
different intentions but all ultimately wishing to cause some form of
damage or other. So, what are the generic forms of defense that can be
used to protect the network?
Defense Principles
• Layering – This is the first defense principle. Layering should be used to protect the
network by creating several layers of defense between a potential attacker and the
network. Each layer should be difficult to penetrate thus making it literally
impossible for the attacker to penetrate all the layers. Layering concept can be
explained better by examining an onion which has several layers. As you peel each
layer off you are more likely to tear more such that it’s actually discouraging to
continue the exercise unless you have a very motivating goal! Similarly with
networking it should be equally difficult to penetrate all successive layers until the
core network is accessed. In other security circles this principle is also referred to as
defense- in- depth.
Defense Principles (cont’d)
• Obscurity – obscurity is about hiding details; the less an attacker knows about a
system they want to penetrate the harder it is to penetrate. This principle is also
known as security by obscurity. As an example most hackers are able to penetrate
a network by testing the vulnerability of that network. If the hacker does not know
the components of the network then it makes it that harder to penetrate the
network.
• In certain organizations obscurity is implemented to a tee; there is one that even
had the desktops delivered without any logo or technical details availability such
that even users had no idea what type or spec of desktop they were using.
Defense Principles (cont’d)
Security Services
Security Services
• These are the services used to counter the different categories of attacks
defined earlier in this lesson.
• The X.800 standard also defines Security Service as a service provided by a
protocol layer of communicating open systems, which ensures adequate
security of the systems or data transfers. There is a small variation in what is
defined in X.800 as this is mostly related to the OSI model protocol layers.
Security Services (cont’d)
• Integrity – this service ensures that the information has not been modified
in any way, i.e. the data is correct and in its original form. Again the integrity
of data can only be compromised at same points as in confidentiality, at the
source and in transit.
• Integrity service will protect against both modification and repudiation
attacks. Repudiation as the information will change making it possible for
the originator to deny the information was from him/her.
Security Services (cont’d)
• Availability – this is the service that ensures that the network can be
accessed and used by authorized users when they need to. It ensures
continuity of services and resources. Availability refers to availability of
information and the network itself
• The availability service protects against Denial of Service (DoS) attacks.
Security Services (cont’d)
Security Models
Security Models
• The International Data Cooperation (IDC) present two generic models for
network security. A model is a representation and the Security Models
suggest ways in which security services can be implemented in a network to
protect it from attacks.
• http://www.idc-
online.com/technical_references/pdfs/data_communications/A_Model_for_
Network_Security.pdf
• These models are briefly explained.
Security Models (cont’d)
Security Models (cont’d)
Part 6
Threat Models
Threat Models
• Threat modeling is the process by which threats to the network can be identified.
• In a standard network there can only be one or both types of attackers: an internal
attacker or an external attacker.
• The damage that will occur may be intentional or accidental, but either way the
damage has happened.
• A threat model explores the attacks that the network is vulnerable to with a view to
devising ways and means of preventing those attacks.
• In networking environments the threat model can be used to test the environment
in order to identify threats and possible solutions to the threats; it is a fairly
common practice
Threat Models (cont’d)
• An example of a threat model is presented below:
Name Type Classification Cause Measures
Access Internal High risk No annual Review access
bonus for rights in
employees sensitive areas
Summary
• Network security is concerned with the CIA dimensions: Confidentiality, Integrity &
Availability
• The OSI model explains the different security issues in the 7 layers
• The challenges in network security lie mostly with 3 issues: how will the network be
attacked, what type of attack will it be, who is attacking us.
• The 5 defense principles upon which all defense mechanisms are based: layering,
limiting, diversity, obscurity, simplicity
• Security services used to counter different categories of attacks: Confidentiality,
Integrity, Availability. The X.800 document adds more categories and relates them to
the OSI model
• There are 2 models proposed by IDC as generic security service models: Secure
Channel Communication and Network Access Security Model
• Threat modeling is the process by which threats to the network can be identified.
References