Chapter 8 and 9 - Developing Network Security and Management Strategies
Chapter 8 and 9 - Developing Network Security and Management Strategies
Chapter Eight
Security Mechanisms
Authentication
Authorization
Accounting (Auditing)
Data encryption
Public/Private Key encryption
Packet Filters
Firewalls
Physical Security
Authentication
Verify the identity of an individual before
you can grant him access to resources.
User identification: Who do you claim to
be?
- Note the use of the term claim
- Not always unique, even on the system
User identification + Something else =
Reasonable association of the person with
the ID presented
Password, Digital Certificate, “One-time”
password (e.g., tokens), Biometric, Physical
locality (including IP address)
10
Authorization
Authorization is the granting of access to
resources.
Once we know who it is, we need to decide
what they can access, and how.
Servers, Networks, Applications, Files (data),
Actions
Access Control Lists (ACLs):
On Firewalls, Gateways and Routers, Servers,
Workstations
11
Accounting (Auditing)
Collecting network activity data
Strict security policy - collect all attempts to
achieve authentication and authorization
◦ Include user and host names. Timestamp
◦ Should not collect passwords
Security assessment - network examined
from within by a security professional trained
in vulnerabilities exploited by invaders
12
Data Encryption
Process that scrambles data to protect it from
being read by anyone but the intended
receiver
Useful for providing data confidentiality
Tradeoffs
Encryption algorithm is a set of instructions to
scramble and unscramble data
Encryption key is a code used by an algorithm
to scramble and unscramble data
13
Packet Filters
Set up on routers to accept or deny packets from particular
addresses or services
Augment authentication and authorization mechanisms
Packet filters can:
◦ deny specific types of packets and accept all else
◦ accept specific types of packets and deny all else
15
Firewalls
A system or combination of systems that
enforces security policies at the boundary
between two or more networks
Can be a router with ACLs, a dedicated
hardware box, or software running on a PC or
UNIX system
16
Physical Security
Limiting access to key network resources by
keeping the resources behind a locked door
Protect core routers, demarcation points,
cabling, modems, servers, hosts, backup
storage, ...
17
18
19
20
21
22
23
26
27
Summary
Your goal as a network designer is to help develop some
strategies and processes for implementing security.
Security is a major concern for most customers because of the
increase in Internet connectivity.
The tasks involved with security design parallel the tasks
involved with overall network design.
The network should be considered a modular system that
requires security for many components, including Internet
connections, remote-access networks, network services, end-
user services, and wireless networks.
To protect the network, you should develop multilayered
strategies, procedures, and implementations that provide
security defense in depth.
28
29
30
31
32
Fault Management
Refers to detecting, isolating, diagnosing, and
correcting problems
It includes processes for reporting problems
to end users and managers and tracking
trends related to problems
Users expect quick resolution
A variety of tools exist to meet fault
management requirements, including
monitoring tools
33
Configuration Management
Helps a network manager keep track of
network devices and maintain information on
how devices are configured
Can define and save a default configuration for
similar devices, modify the default
configuration for specific devices and load the
configuration on devices
Facilitates change management. Use dynamic
configuration protocols and tools
34
Accounting Management
Keep track of network usage by departments
or individuals
Facilitates usage-based billing whereby
individual departments or projects are
charged for network services
Can help control abuses of the network
35
Performance Management
Two types should be monitored:
◦ End-to-end performance management measures
performance across an internetwork. Availability,
capacity, utilization, delay, delay variation,
throughput, reachability, response time, errors, and
the burstiness of traffic
◦ Component performance measure the
performance of individual links or devices
36
37
Security Management
Lets a network manager maintain and
distribute passwords and other authentication
and authorizing information
One important aspect is a process for
collecting, storing, and examining security audit
logs
Collecting audit data can result in a large
accumulation of data. Keep to a minimum by
keeping data for a shorter period time and
summarizing it
38
◦ A network
management system
(NMS)
◦ Agents
◦ Managed devices
◦ Management
Information Bases
(MIBs)
39
40
41
43
44
Summary
Determine which resources to monitor,
which data about these resources to collect,
and how to interpret that data
Develop processes that address fault,
accounting, configuration, performance, and
security management
Develop a network management
architecture
Select management protocols and tools
47
Review Questions
How does a security plan differ from a
security policy?
Why is it important to achieve buy-in from
users, managers, and technical staff for the
security policy?
What are some methods for keeping hackers
from viewing and changing router and switch
configuration information?
How can a network manager secure a
wireless network?
48
Review Questions
Why is network management design
important?
Define the five types of network management
processes according to the ISO.
What are some advantages and disadvantages
of using in-band network management versus
out-of-band network management?
What are some advantages and disadvantages
of using centralized network management
versus distributed network management?
49