network access and security chapter 13 – 15. topics security protocols –ipsec –l2tp –ssl...

38
Network Access and Security Chapter 13 – 15

Upload: molly-bates

Post on 18-Jan-2016

235 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Network Access and Security

Chapter 13 – 15

Page 2: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Topics

• Security protocols– IPSec– L2TP– SSL– WEP– WPA– 802.x

• Authentication Protocols• Firewalls• Proxy Services• Disaster Recovery

Page 3: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Accessing Network Resources

• Client Selection– Installing the Windows 2003

Client

Page 4: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Managing User Account and Password Security

• Usernames and passwords are key to network security, and you use them to control initial access to your system.

Page 5: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Network Resource-Sharing Security Models

• You can secure files that are shared over the network in two ways:– Share-Level Security– User-Level Security

Page 6: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Managing Accounts

• Creating• Renaming• Disabling• Removing accounts.• Create and disable temporary

accounts.• Setup accounts for Anonymous

Access.

Page 7: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Managing Passwords

• Strong Passwords– Minimum Length– Complexity– Avoid weak passwords

• Password Management– Password History– Minimum Age– Maximum Age– Minimum Length– Require Complexity– Account Lockout duration– Account Lockout Threshold– Reset Lockout counter time

Page 8: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Using Firewalls

• Firewall Technologies– Statefull– Stateless

• Access Control Lists (ACL)

Page 9: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

The Demilitarized Zone (DMZ)

Page 10: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Protocol Switching

• Internally use IPX instead of TCP• Use IPX in a dead zone

– Example on page 335• Dynamic Packet Filtering• Proxy Servers

– IP Proxy: An IP proxy hides the IP addresses of all stations

– Web (HTTP) Proxy: Web proxies (also called HTTP [Hypertext Transfer Protocol] proxies) handle HTTP requests on behalf of the sending workstation.

– FTP Proxy: FTP proxies handle the uploading and downloading of files from a server on behalf of a workstation.

– SMTP Proxy: SMTP proxies handle Internet e-mail. Here, the actual contents of the packet and mail can be automatically searched.

Page 11: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Security Protocols

• Layer 2 Tunneling Protocol (L2TP)• Internet Protocol Security (IPSec)• Secure Sockets Layer (SSL)• Kerberos• Wired Equivalent Privacy (WEP)• Wi-Fi Protected Access (WPA)• 802.1x• Password Authentication Protocol (PAP)• Challenge Handshake Authentication Protocol

(CHAP)• Microsoft Challenge Handshake Authentication

Protocol (MS-CHAP)• Remote Authentication Dial-In User Service

(RADIUS)

Page 12: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Comparing Firewall Operating System Platforms

• UNIX allows you to lock down servers.– Many Hardware Firewalls are built around

Linux/UNIX.

• NetWare uses BorderManager which integrates with NDS.

• Windows has its own ISA server which is a statefull firewall. There are also many third party firewalls.

• Cisco PIX and others.

Page 13: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Understanding and Defending AgainstHacker Attacks

• Hacker Tools: Common Network Attacks– IP Spoofing– The Ping of Death– WinNuke– SYN Flood

Page 14: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Intruder Detection: Defence Techniques

• Three Types– Active Detection– Passive Detection– Proactive Defence

Page 15: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Certified Operating Systems and Networks

• Not all versions of an operating system are certified. This is the case even within the same vendor’s product line.

Page 16: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Understanding Encryption

• The NSA has classified encryption tools and formulas as munitions since 1979 and therefore regulates them.

• Not all systems use encryption. Older utilities like FTP and Telnet do not.

• There are third party utilities to provide data encryption.– PGP provides encryption for email– VPN– Https

Page 17: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

How Encryption works

• Number substitution– A=1, B=2, C=3 …

• Letter substitution– A=Z, B=Y, C=X …

• Encryption Key– Private Key

• DES and Triple DES• Skipjack and Clipper

– Public Key• RSA Data Security• PGP (Pretty Good Privacy)

Page 18: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Security Policies

• A security policy defines how security will be implemented in an organization, including physical security, document security, and network security.– Security Audit– Clean Desk Policy– Recording Equipment

Page 19: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Other Common Security Policies

• Notification• Equipment Access• Wiring• Door Locks/Swipe Mechanisms• Badges• Tracking• Passwords• Monitor Viewing

Page 20: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Breaking Policy

• Major Infractions• Minor Infractions• The Exit Interview• Returning and Logging Property• Disabling Accounts

Page 21: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Recognizing Security Threats

• Denial of Service (DoS)• Ping of Death• Distributed Denial of Service (DDoS)• Man in the Middle• Smurf

Page 22: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Recognizing Security Threats

• SYN Flood– SYN flags are only used to initiate new

communications. To initiate a SYN flood, a hacker sends a barrage of SYN packets.

– Any further incoming connections to the victimized device will be rejected until it can respond to the barrage of connection requests it’s already busy trying to deal with.

Page 23: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

DoS/SYN flood attack

Page 24: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Recognizing Security Threats

• Tribe Flood Network (TFN) and Tribe Flood Network 2000 (TFN2K)– They’re called distributed denial of

service (DDos) attacks and also make use of IP spoofing.

Page 25: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Recognizing Security Threats

• Stacheldraht• It basically incorporates TFN and

adds a dash of encryption to the mix. • The nightmare begins with a huge

invasion at the root level, followed with a DoS attack finale.

Page 26: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Viruses

In their simplest form, viruses are basically little programs that cause a variety of very bad things to happen on your computer, ranging from merely annoying to totally devastating.

Page 27: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Types of Viruses

• File Viruses• Macro Viruses• Boot-Sector Viruses• Multipartite Viruses

– Anthrax and Tequila are both multipartite viruses.

• Worms

Page 28: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Attackers and Their Tools

• IP Spoofing

Page 29: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Attackers and Their Tools

• Application-Layer Attacks• Active-X Attacks• Autorooters• Backdoors• Network Reconnaissance• Packet Sniffers• Password Attacks• Brute-Force Attacks

Page 30: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Attackers and Their Tools

• Port-Redirection Attacks• Trust-Exploitation Attacks• Man-in-the-Middle Attacks• Rogue Access Points• Social Engineering (Phishing)

Page 31: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Patch Management

• Updating Windows• Updating Antivirus• Fixing an infected PC

Page 32: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Types of Attacks

• Application-Layer Attacks• Active-X Attacks• Autorooters• Backdoors• Network Reconnaissance• Packet Sniffers• Password Attacks• Brute-Force Attacks• Port-Redirection Attacks• Trust-Exploitation Attacks• Man-in-the-Middle Attacks

Page 33: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Other Security Threats

• Rogue Access Points• Social Engineering (Phishing)

Page 34: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Understanding Mitigation Techniques

• Active Detection• Passive Detection• Proactive Defense

Page 35: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Policies and Procedures

• Security Policies• Security Audit• Clean-Desk Policy• Recording Equipment

Page 36: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Other Common Security Policies

Page 37: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

DMZ

Page 38: Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services

Summary

• Summary and • Exam Essentials• Review Questions