CH 12
CH 12
Chapter 12
Securing a Network
Objectives
What are the goals of network security, and what sorts of
attacks do you need to defend against?
CIA
Availability Confidentiality
Data
Integrity
Security Fundamentals
User Training
Many attacks require user intervention in order to be carried out.
For example a user needs to execute an application
containing a virus before the virus takes any actions.
Similarly, social engineering requires a user to give sensitive
information to an attacker in order for the attacker to access the
user’s account.
Defending Against Attacks
User Training (cont.)
As a result, several potential attacks can be thwarted through
effective user training.
As a few examples, users could be trained on using polices such
as the following:
Never give your password to anyone, even if they claim to be from IT.
Do not open e-mail attachments from unknown sources.
Select strong passwords, consisting of at least eight characters and
containing a mixture of alphabetical (upper- and lowercase), numeric,
and special characters.
Change your password monthly (or more often)
Defending Against Attacks
Patching
Some attacks are directed at vulnerabilities known to exist in
various Oss and applications.
The attacker then use their resources attacking the honey pot, the
end result of which is the they leave the real servers alone.
honey pot -- signal machine that draws they attacker attention.
Honey net -- multiple machines that draw the attacker attention.
After the zones are created, you then set up rules based on
those zones.
VPN (cont.)
There are two primary categories of VPNs
VPN Protocols
SSL/TLS
Strong, used by HTTPS
L2TP / IPSec
L2F
Old tunneling protocol from Cisco, no encryption
PPTP
Old Microsoft VPN protocol, weak encryption
Defending Against Attacks
Intrusion Detection and Prevention
When an attacker launches an attack against a network,
intrusion detection systems (IDS), and intrusion prevention
systems (IPS) technologies are often able to recognize the attack
and respond appropriately.
Attacks might be recognizable by comparing incoming data
streams against a database of well-known attack signatures.
IDS Versus IPS
IDS, sits parallel to the network, is a passive device, that monitors
all traffic and sends alerts.
IPS, sits in-line to the network, is an active device, that monitors
all traffic and sends alerts and deals with the offending traffic.
Defending Against Attacks