Upon Completion of This Chapter, You Should Be Able To
Upon Completion of This Chapter, You Should Be Able To
Upon Completion of This Chapter, You Should Be Able To
1
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
Terminalogies
Access is the flow of information between a subject and an object.
A subject is an active entity that requests access to an object or the data
within an object.
A subject can be a user, program, or process that accesses an object to
accomplish a task.
When a program accesses a file, the program is the subject and the file is
the object.
An object is a passive entity that contains information.
An object can be a computer, database, file, computer program, directory,
or field contained in a table within a database.
When you look up information in a database, you are the active subject and
the database is the passive object.
2
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
3
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
ACCESS CONTROL
Access control is the method by which systems determine whether
and how to admit a user into a trusted area of the organization.
These ratings are often referred to as sensitivity levels, and they indicate
4
the level of confidentiality the information requires.
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
ACCESS CONTROL
5
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
ACCESS CONTROL
6
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
ACCESS CONTROL
The users can allow general, unrestricted access, or they can allow
specific individuals or sets of individuals to access these resources.
7
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
ACCESS CONTROL
8
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
ACCESS CONTROL
9
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
ACCESS CONTROL
10
The value should not be shared between users.
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
ACCESS CONTROL
AUTHENTICATION
Authentication is the process of validating a supplicant’s purported
identity.
11
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
ACCESS CONTROL
12
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
ACCESS CONTROL
Note: Certain critical logical or physical areas may require the use of
strong authentication— at minimum two different authentication
mechanisms drawn from two different factors of authentication, most
often something you have and something you know.
C. AUTHORIZATION
Authorization is the matching of an authenticated entity to a list of
information assets and corresponding access levels.
This list is usually an ACL or access control matrix.
13
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
ACCESS CONTROL
14
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
ACCESS CONTROL
D. ACCOUNTABILITY
Accountability, also known as auditability, ensures that all actions
on a system—authorized or unauthorized—can be attributed to an
authenticated identity.
15
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
16
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
FIREWALLS
A firewall in an information security program prevents specific types
of information from moving between the outside world, known as the
untrusted network (for example, the internet), and the inside world,
known as the trusted network.
17
Hybrids.
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
18
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
19
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
20
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
21
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
22
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
• Stores and updates the state and context of the data within the
packets
23
• Is considered a third-generation firewall
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
A state table looks similar to a firewall rule set but has additional
information, as shown in the following table
APPLICATION GATEWAYS
The application gateway, also known as an application-level
firewall or application firewall, is frequently installed on a
dedicated computer, separate from the filtering router, but is
commonly used in conjunction with a filtering router.
24
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
25
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
CIRCUIT GATEWAYS
The circuit gateway firewall operates at the transport layer.
Again, connections are authorized based on addresses.
Like filtering firewalls, circuit gateway firewalls do not usually look
at traffic flowing between one network and another, but they do
prevent direct connections between one network and another.
26
model.
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
HYBRID FIREWALLS
Hybrid firewalls combine the elements of other types of firewalls
27
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
28
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
29
particular source, destination, and port address to enter.
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
30
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
For the most part, simple username and password schemes are the
only means of authentication.
However some technologies have improved the authentication process.
31
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
32
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
33
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
a. KERBEROS
uses symmetric key encryption to validate an individual user to various
34
network resources.
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
35
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
36
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
The KDC knows the secret keys of all clients and servers on
the network.
37
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
The following figures illustrate this process. The first for login and
the second for service request respectively.
Kerberos may be obtained free of charge from MIT at
http://web.mit.edu/Kerberos/
38
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
39
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
b. SESAME
The Secure European System for Applications in a Multivendor
Environment (SESAME) is the result of a European research and
development project partly funded by the European Commission.
SESAME is similar to Kerberos in that the user is first
authenticated to an authentication server and receives a token.
40
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
41
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
A. A TRUSTED VPN
Also known as a legacy VPN, uses leased circuits from a service
provider and conducts packet switching over these leased circuits.
B. SECURE VPN
Uses security protocols and encrypt traffic transmitted across
unsecured public networks like the Internet.
42
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
C. A HYBRID VPN
combines the two, providing encrypted transmissions (as in secure
VPN) over some or all of a trusted VPN network.
43
networks on both ends of the VPN connection.
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
44
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
On the other hand, transport mode eliminates the need for special
servers and tunneling software, and allows the end users to
transmit traffic from anywhere.
45
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
The receiving server decrypts the packet and sends it to the final
address.
46
CH-6
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
47