Chapter One - 2
Chapter One - 2
Part One
organizational assets.
4 networks(network of networks)
Why Is Computer and Network Security Important?
1. To protect company assets:- One of the primary goals of computer and network
security is the protection of company assets (hardware, software and/or information).
VULNERABILITAS
IP & Port Web Server Sniffing KeyStroke Password
Email Exploit DoS Attack Trojan Attack MITM Attack
Scanning Exploit Traffic Logging Cracking
PREVENT
Hardening AntiVirus Using Using Using
Using SSH Using IPSec
Host Applications Firewall GPG/PGP Certificate
DETECTION
Intrusion Spyware
System Log Backup and Finding
Detection HoneyPot Detection and
Analysis Restore Hidden Data
System Removal
6
Contd.
Internal External
attacker attacker
8
Contd.
1. Prevention:- is the foundation of the security trinity.
To provide some level of security, it is necessary to implement
measures to prevent the exploitation of vulnerabilities.
In developing network security schemes, organizations should
emphasize preventative measures over detection and response.
It is easier, more efficient, and much more cost-effective to
prevent a security breach than to detect or respond to one.
2. Detection:- Once preventative measures are implemented,
procedures need to be put in place to detect potential
problems or security breaches, in the event preventative
measures fail.
9
The sooner a problem is detected the easier it is to correct and cleanup.
Contd.
3. Response:- Organizations need to develop a plan that
identifies the appropriate response to a security breach.
The plan should be in writing and should identify who
is responsible for what actions and the varying
responses and levels of escalation.
10
Information Security
Network security is concerned, above all else, with the security of
information assets.
Information security means protecting information and information
systems from unauthorized access, use, disclosure, disruption,
modification, perusal, inspection, recording or destruction.
Information security = confidentiality + integrity +
availability + authentication.
The terms information security, computer security and information
assurance are frequently incorrectly used interchangeably.
These fields are interrelated often and share the common goals of
protecting the confidentiality, integrity and availability of information;
11
however, there are some subtle differences between them.
Contd.
Information security is concerned with the confidentiality,
integrity and availability of data regardless of the form the
data may take: electronic, print, or other forms.
Computer security can focus on ensuring the availability and
correct operation of a computer system without concern for
the information stored or processed by the computer.
Information security offers many areas for specialization
including: securing network(s) and allied infrastructure,
securing applications and databases, security testing,
information systems auditing, business continuity
12 planning and digital forensics science, etc
Basic Security Terminology
Network security terms are the foundation for any discussion of network
security and are the elements used to measure the security of a network.
Some of these terms include:-
entity or determining the identity of the individual or entity with whom you
are communicating.
14
Contd.
3. Access Control(Authorization):- refers to the ability to control the
information.
software are reliable and can recover quickly and completely in the
18
Part Two
Security Threats, Attacks and Vulnerabilities
information.
The threat comes from others who would like to acquire the information or
22
Security Threats
Security Threats
Malicious Non-Malicious
Floods
Fires
Earthquakes
Outsiders Hurricanes
like Insiders like
Ignorant
Crackers Disgruntled
Employees
and Hackers Employees
23
Contd.
1. Natural Disaster:- Nobody can stop nature from taking its
course.
Earthquakes, hurricanes, floods, lightning, and fire can cause
31
amount of protocol packets.
Contd.
Routers and servers eventually become overloaded by attempting
from clients.
consumption attack.
system keeps sending IP-spoofed packets faster than the expire limit on the
victim's server.
In most cases the victim of such an attack will have difficulty accepting any
outgoing connections.
Normally it consumes an enormous amount of memory and processing power
network.
If the computer is operating, it will respond to the request by sending
on the same local area network, all computers on that network receive
the IP packet.
When a computer outside the local area network sends an IP broadcast
38 packet, all computers on the target network receive the broadcast
Parties Involved in Saturating Network Resources
attack
Three parties are involved Saturating resource attack, namely:
i. The attacker
ii. The intermediary, can also be a victim
iii.The Victim
The intermediary receives an ICMP echo request packet that is
directed to the IP broadcast network address.
If nothing is filtering these ICMP echo requests, all computers on
the network will receive the ICMP echo request packet and respond
with an ICMP echo reply packet.
When all computers respond to these packets, severe network
39
congestion or outages are possible.
Contd.
Attackers don’t use their own IP source address while creating the attack.
Instead, they use the source address of their intended victim. This is
known as IP spoofing.
Attackers use a variety of tools for this purpose:
The tools enable the hackers to send ICMP echo request packets to
multiple intermediary computers, causing all of them to respond to
the same victim's source IP address.
These tools could also be used to scan for network routers that do not
filter broadcast traffic.
DDoS attacks involve breaking in to hundreds or thousands of computers
across the Internet.
Then the attacker installs DDoS software on them, allowing the attacker to
control all of these computers and launch coordinated attacks on victim
sites.
40
These attacks typically exhaust bandwidth, router processing capacity, or
network stack resources, breaking network connectivity to the victims.
Contd.
C. Mail Bombing:- is an e-mail based attack which sends floods of e-
mail to a system until it fails.
A system will fail in different ways, depending on the type of server
and how it is configured.
Some Internet service providers give temporary accounts to anyone
who signs up for a trial subscription, and those accounts can be
used to launch e-mail attacks.
Here are typical failure modes:
a. The e-mail server accepts e-mail messages until the disk where e-
mail is stored fills up.
Subsequent e-mail is not accepted.
41 If the e-mail disk is also the main system disk, it may crash the
Contd.
b. The incoming queue is filled with messages to be forwarded until
prevents subsequent mail from being received and may keep the
forged.
Dialog
Hello
Client PC
Server
Bob
Alice
Hello
operations.
The Smurf attack is a way of generating significant computer
47
is used to send a flood of packets to a server to test its ability to
Contd.
The ping support in Windows operating systems does not allow
someone to mount a ping storm.
The ping command in at least some UNIX-based systems offers
two options:
A. "ping -f" which specifies to output ping packets back as fast as they
are returned.
B. "ping -s[packetsize]", which causes the size of the outgoing packet to
be padded by some specified size in order to increase the load on the
receiving server. A ping storm is one form of packet storm.
49
variants that take place within systems and networks.
Contd.
9. Social Engineering:- is a common form of cracking. It can be
used by outsiders and by people within an organization.
Social engineering is a hacker term for tricking people into
revealing their password or some form of security information.
A common example of social engineering would be where a hacker
sends e-mail to an employee, claiming to be an administrator who
needs the employee's password to do some administrative work.
The normal user who has not been taught about security might not
know the difference between the actual administrator and the
imposter administrator, especially in a large organization.
50
Contd.
10. Packet Modification:- involves one system intercepting and
modifying a packet destined for another system.
Packet information may not only be modified, it could also be
destroyed.
Dialog
Balance =
Balance = $1
Client PC $1,000,000 Server
Bob Alice
Balance =$1
Balance =
$1,000,000
Attacker (Eve) intercepts
51
and alters messages
Contd.
3. Non-Malicious Threats:- The primary threat to data integrity comes
from authorized users who are not aware of the actions they are
performing.
Errors and omissions can cause valuable data to be lost, damaged,
or altered.
Non-malicious threats usually come from employees who are
untrained in computers and are unaware of security threats and
vulnerabilities.
Note that ignorant employees usually have no motives and goals
for causing damage. The damage is accidental.
Malicious attackers can deceive ignorant employees by using
"social engineering" to gain entry.
The attacker could masquerade as an administrator and ask for
52 passwords and user names
Contd.
56 Fig Threat agents, attack vectors, weakness, controls, IT asset and business
impact
Vulnerability Classification
Vulnerabilities are classified according to the asset class they
related to:
1. Hardware
susceptibility to humidity
susceptibility to dust
susceptibility to soiling
susceptibility to unprotected storage
2. Software
insufficient testing
lack of audit trail
57
Contd.
3. Network
Unprotected communication lines
Insecure network architecture
4. Personnel
inadequate recruiting process
inadequate security awareness
5. Site
area subject to flood
unreliable power source
6. Organizational
lack of regular audits
58 lack of continuity plans
Vulnerabilities in Common Network Access Procedures &
Protocols
The primary protocol used in operating systems today is the TCP/IP
protocol stack.
The wide use of this protocol helps to integrate different operating system
architectures such as Microsoft and UNIX.
Many organizations make use of this interoperability and use various
TCP/IP utilities to run programs, transfer information, and reveal
information.
Due to the nature of these utilities, various security risks and threats exist.
Users often use the same passwords for mixed environments.
Sometimes, passwords are automatically synchronized.
If hackers can crack the password on systems other than Microsoft
59
systems, they could also use that password to logon to a Microsoft system.
Telnet
The Telnet protocol allows a user to log onto a system over the network
and use that system as though the user was sitting at a terminal that was
directly connected.
The telnet command provides a user interface to a remote system.
When using the Microsoft telnet client to log on to the Microsoft
Windows 2000 Telnet service, it uses the NTLM protocol to log the client
on.
Problems arise when integrating Microsoft systems and UNIX systems.
When logging on to a system from a Microsoft telnet client to UNIX
TELNET daemon service or vice versa, the user name and password are
sent over the network in plain text.
Since the user name and password characters are not encrypted, it is
60
possible for an electronic eavesdropper to capture a user name and
File Transfer Protocol(FTP)
It allows users to connect to remote systems and transfer files back and
forth.
As part of establishing a connection to a remote computer, FTP relies
on a user name and password combination for authentication.
Use of FTP poses a security problem similar to use of the Telnet
protocol because passwords typed to FTP are transmitted over the
network in plain text, one character per packet. These packets can be
intercepted.
Another problem area for FTP is anonymous FTP.
Anonymous FTP allows users who do not have an account on a
computer to transfer files to and from a specific directory.
61 This capability is particularly useful for software or document
Contd.
To use anonymous FTP, a user passes a remote computer name as an
argument to FTP and then specifies "anonymous" as a user name.
Problems with anonymous FTP are:
There is often no record of who has requested what information.
The threat of denial-of-service attacks. That is, For deliberate or
accidental denial-of-service attacks, authorized users may be denied
access to a system if too many file transfers are initiated
simultaneously.
It is important to securely set up the anonymous FTP account on the
server because everyone on the network will have potential access.
If the anonymous FTP account is not securely configured and
62
administered, crackers may be capable of adding and modifying files.
Trivial File Transfer Protocol(TFTP)
When the finger client utility is invoked with a name argument, the
password file is searched on a UNIX server.
Every user with a first name, last name, or user name that matches the
name argument is returned.
66
Rexec
The rexec utility is provided as a client on Microsoft Windows NT and
Windows 2000.
Attacks
a) Normal flow
b) Interruption
c) Interception
75 d) Modification e) Fabrication
Contd.
Interruption
Interception
of a false stream.
83
Active Attack Types
A. Masquerading:- The entity pretends to be a different entity.
handled).
individual packets.
A valid digital signature gives a recipient reason to believe that the message
was created by a known sender, and that it was not altered in transit.
rights to resources.
91
Contd.
4. Data Integrity:- a variety of mechanisms used to assure the integrity
of data unit or stream of data units.
5. Authentication Exchange:- a mechanism intended to ensure the
identity of an entity by means of information exchange.
95
Access Control
Protection of information resources or services from access or use by unauthorized
entities (organizations, people, machines, processes).
Privileges – rights to access or use resources or services
Principles – entities own access control privileges
Subjects – entities exercise access control privileges
Objects / Targets – resources or services accessed/used by subjects
Delegation – transfer of access control privileges among principals
Authorization – transfer of access control privileges from principals to subjects
Non-Repudiation of Reception
Time Stamp
Digital Signature
97
Audit
Recording & analyses of participation, roles and actions in
98
Service vs. Layer Mapping
Service / Layer 1 2 3 4 6 7
Confidentiality, Connectionless Y Y Y Y
Confidentiality, Connection Y Y Y Y Y
Confidentiality, Selected Field Y Y
Confidentiality, Traffic Flow Y Y
Authentication, Data Origin ? Y Y Y
Authentication, Peer Entity Y Y Y
Integrity, Message Y Y Y Y
Integrity, Message Stream ? Y Y Y
Access Control ? Y Y Y
Non-Repudiation, Origin Y
Non-Repudiation, Receipt Y
? = difference between IEEE802 and ISO
99
A Model for Network Security
100
Design Issues in the Model
purpose.
2. Host hardening
Firewalls, Packet filtering
Routing protocols
Attacker
Dropped
Packet
Hardened
Server Internal
Log File Corporate
Network
103
Intrusion Detection System
1.
4. Alarm Intrusion Suspicious
Detection Packet
System
Network
Administrator 2. Suspicious
Packet Passed Internet
Attacker
3. Log
Packet
Hardened
Server
Log File Corporate Network
104
Encryption for Confidentiality
Encrypted
Message
“100100110001”
Client PC Server
Bob Alice
“100100110001”
105
Impersonation and Authentication
I’m Bob
Prove it!
Client PC Attacker (Authenticate Yourself)
Server
Bob (Eve) Alice
106
Secure Dialog System
Secure Dialog
Client PC
Automatically Handles Server
Bob
Negation of Security Options Alice
Authentication
Encryption
Integrity
Attacker cannot
read messages, alter
messages, or impersonate
107
Hardening Host Computers
1. The Problem
Computers installed out of the box have known vulnerabilities
Not just Windows computers
Hackers can take them over easily
They must be hardened—a complex process that involves many actions
2. Elements of Hardening
Physical security
Secure installation and configuration
Fix known vulnerabilities
Turn off unnecessary services (applications)
Harden all remaining applications
Manage users and groups
Manage access permissions
For individual files and directories, assign access permissions specific users and
groups
Back up the server regularly
108 Advanced protections