Chapter 7 Network Security
Chapter 7 Network Security
Network Security
Er. Abhijeet Karna
Department of Ethical Hacking and Cyber-security
Softwarica College of IT & E-Commerce, Kathmandu
Properties of secure communication
• Secure communication is when two entities are communicating
and do not want a third party to listen in.
• This means that only the sender and receiver can listen and
transmit each other while other cannot intercept that
communication
• Fundamentally, There are 3 properties of a secure
communication
• Secrecy
• Authentication
• Message Integrity
Secrecy/confidentiality
• This means only the sender and intended
receiver should be able to understand the
contents of transmitted message
• In any communication there is possibility of
eavesdropping (i.e. someone may be
intercepting the message)
• This problem of secrecy is solved by the
means of encryption and decryption.
• This aspect of secrecy is probably the most
commonly perceived meaning of the term
“Secure Communication”.
Authentication
• Authentication is the act of validating that users are whom they
claim to be. This is the first step in any security process.
• It is the process of confirming the identity of the parties involved in
the communication.
• Suppose if someone calls on the phone claiming to be your bank
and asking for your account number, secret PIN, and account
balance for verification purpose.
• Would you give that information out over the Phone??
• Tools used for authentication are: Passwords, One-time pins,
Authentication apps, biometrics, etc.
Message integrity
• Suppose you download a file from the Internet. How can you be 100%
sure that you have downloaded intended content as provided by the
provider not something like malware.
• In the same way, if the sender and receiver are able to authenticate
each other, they also want to insure that the content of their
communication is not altered, either maliciously or by accident, in
transmission.
• Tools which are used for message integrity are check-summing
techniques that we encountered in reliable transport and data link
protocols.
• These includes CRC, Cryptographic Hash Functions.
Cryptography
• There are two types of cryptography one is symmetric key cryptography and
other is Asymmetric Cryptography.
• In Symmetric Key Cryptography, the users use same pre-shared key which is
both used to encrypt and decrypt messages
Asymmetric Cryptography
• Asymmetric cryptography, also known as public-key cryptography, is
a process that uses a pair of related keys -- one public key and one
private key
• A public key is a cryptographic key that can be used by any person to
encrypt a message so that it can only be deciphered by the intended
recipient with their private key.
• A private key -- also known as a secret key -- is shared only with key's
initiator
• Many protocols rely on asymmetric cryptography, including the
transport layer security (TLS) and secure sockets layer (SSL)
protocols, which make HTTPS possible.
Firewall
• A firewall is a system designed to prevent unauthorized access to or
from a private network.
• Firewalls carefully analyze incoming traffic based on pre-established
rules and filter traffic coming from unsecured or suspicious sources to
prevent attacks.
• Think of IP addresses as houses, and port numbers as rooms within
the house. Only trusted people (source addresses) are allowed to
enter the house (destination address) at all—then it’s further filtered
so that people within the house are only allowed to access certain
rooms (destination ports), depending on if they're the owner, a child,
or a guest. The owner is allowed to any room (any port), while
children and guests are allowed into a certain set of rooms (specific
ports).
Types of firewall (Software firewall)
• There are mainly two types of firewall. These can be either software
or hardware
• SOFTWARE FIREWALL
• A software firewall is a program installed on each computer and regulates
traffic through port numbers and applications, while a physical firewall is a
piece of equipment installed between your network and gateway.
• Packet-filtering firewalls are divided into two categories: state-full and
stateless.
• Stateless firewalls examine packets independently of one another and lack
context, making them easy targets for hackers.
• In contrast, state-full firewalls remember information about previously passed
packets and are considered much more secure.
Types of firewall (Hardware firewall)
• A hardware firewall is a physical device much like a server that filters the
traffic going to a computer.
• A hardware firewall is a physical device much like a server that filters the
traffic going to a computer. While a user would normally plug a network
cable directly into a computer or server, with a hardware firewall, the cable
is plugged into the firewall first.
• The firewall sits between the external network and the server, providing an
antivirus solution and a hard barrier against intrusions.
• A hardware firewall provides several benefits:
• Can be used to intelligently control the traffic that reaches your server
• Can be configured with specific rules for all traffic
• Can ease the burden on other server resources. For example, you can disable
software firewalls, which can free up much-needed memory and processor power
Types of firewall (Hardware firewall)
• A hardware firewall is a physical device much like a server that filters the
traffic going to a computer.
• A hardware firewall is a physical device much like a server that filters the
traffic going to a computer. While a user would normally plug a network
cable directly into a computer or server, with a hardware firewall, the cable
is plugged into the firewall first.
• The firewall sits between the external network and the server, providing an
antivirus solution and a hard barrier against intrusions.
• A hardware firewall provides several benefits:
• Can be used to intelligently control the traffic that reaches your server
• Can be configured with specific rules for all traffic
• Can ease the burden on other server resources. For example, you can disable
software firewalls, which can free up much-needed memory and processor power
Virtual Private Network
• The term virtual private network
(abbreviated VPN) describes any
technology that can encapsulate
and transmit network data,
typically Internet Protocol data,
over another network.
• Such a system enables users to
access network resources that
may otherwise be inaccessible
from the public internet.
Network Attacks
• What is a network attack?
Network attacks are unauthorized actions on the digital assets
within an organizational network.
Malicious parties usually execute network attacks to alter,
destroy, or steal private data.
Perpetrators in network attacks tend to target network
perimeters to gain access to internal systems.
• Types of Attacks:
• Active Attack
• Passive Attack
Network Attacks
• Types of Attacks:
• Active Attack
• Passive Attack