network security and firewalls

92
Copyright © 2002 ProsoftTraining. All rights reserved. Network Security and Firewalls

Upload: aspen

Post on 12-Jan-2016

66 views

Category:

Documents


1 download

DESCRIPTION

Network Security and Firewalls. Lesson 1: What Is Security. Objectives. Define security Explain the need for network security Identify resources that need security Identify the two general security threat types List security standards and organizations. What Is Security?. LANs WANs VPNs - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Network Security and Firewalls

Copyright © 2002 ProsoftTraining. All rights reserved.

Network Securityand Firewalls

Page 2: Network Security and Firewalls

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 1:What Is Security

Page 3: Network Security and Firewalls

Objectives

• Define security• Explain the need for network security• Identify resources that need security• Identify the two general security threat types• List security standards and organizations

Page 4: Network Security and Firewalls

What Is Security?

• LANs• WANs• VPNs• Network perimeters

Page 5: Network Security and Firewalls

Hacker Statistics

• One of every five Internet sites has experienced a security breach

• Losses due to security breaches are estimated at $10 billion each year

• Intrusions have increased an estimated 50 percent in the past year

Page 6: Network Security and Firewalls

What Is the Risk?

• Categorizing attacks• Countering attacks systematically

Page 7: Network Security and Firewalls

The Myth of 100-Percent Security

• Security as balance• Security policies

Page 8: Network Security and Firewalls

Attributes of anEffective Security Matrix

• Allows access control• Easy to use• Appropriate cost of ownership• Flexible and scalable• Superior alarming and reporting

Page 9: Network Security and Firewalls

What You AreTrying to Protect

• End user resources• Network resources• Server resources• Information storage resources

Page 10: Network Security and Firewalls

Who Is the Threat?

• Casual attackers• Determined attackers• Spies

Page 11: Network Security and Firewalls

Security Standards

• Security services– Authentication– Access control– Data confidentiality– Data integrity– Nonrepudiation

• Security mechanisms– The Orange Book

Page 12: Network Security and Firewalls

Summary

Define security Explain the need for network security Identify resources that need security Identify the two general security threat types List security standards and organizations

Page 13: Network Security and Firewalls

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 2:Elements of Security

Page 14: Network Security and Firewalls

Objectives

• Formulate the basics of an effective security policy

• Identify the key user authentication methods• Explain the need for access control methods• Describe the function of an access control

list

Page 15: Network Security and Firewalls

Objectives (cont’d)

• List the three main encryption methods used in internetworking

• Explain the need for auditing

Page 16: Network Security and Firewalls

Elements of Security

Audit Administration

Encryption Access Control

User Authentication

Corporate Security Policy

Page 17: Network Security and Firewalls

The Security Policy

• Classify systems• Prioritize resources• Assign risk factors• Define acceptable and unacceptable activities• Define measures to apply to resources• Define education standards• Assign policy administration

Page 18: Network Security and Firewalls

Encryption

• Encryption categories– Symmetric– Asymmetric– Hash

• Encryption strength

Page 19: Network Security and Firewalls

Authentication

• Authentication methods– Proving what you know– Showing what you have– Demonstrating who you are– Identifying where you are

Page 20: Network Security and Firewalls

SpecificAuthentication Techniques

• Kerberos• One-time passwords

Page 21: Network Security and Firewalls

Access Control

• Access Control List– Objects

• Execution Control List– Sandboxing

Page 22: Network Security and Firewalls

Auditing

• Passive auditing• Active auditing

Page 23: Network Security and Firewalls

Security Tradeoffsand Drawbacks

• Increased complexity• Slower system response time

Page 24: Network Security and Firewalls

Summary

Formulate the basics of an effective security policy

Identify the key user authentication methods Explain the need for access control methods Describe the function of an access control

list

Page 25: Network Security and Firewalls

Summary (cont’d)

List the three main encryption methods used in internetworking

Explain the need for auditing

Page 26: Network Security and Firewalls

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 3:Applied Encryption

Page 27: Network Security and Firewalls

Objectives

• Create a trust relationship using public-key cryptography

• List specific forms of symmetric, asymmetric, and hash encryption

• Deploy PGP in Windows 2000 and Linux

Page 28: Network Security and Firewalls

Creating Trust Relationships

• Manually• Automatically

Page 29: Network Security and Firewalls

Rounds, Parallelizationand Strong Encryption

• Round– Discrete part of the encryption process

• Parallelization– Use of multiple processes, processors or

machines to work on cracking one encryption algorithm

• Strong encryption– Use of any key longer than 128 bits

Page 30: Network Security and Firewalls

Symmetric-KeyEncryption

• One key is used to encrypt and decrypt messages

Page 31: Network Security and Firewalls

SymmetricAlgorithms

• Data encryption standard

• Triple DES• Symmetric

algorithms created by RSA Security Corporation

• International Data Encryption Algorithm

• Blowfish • Twofish• Skipjack• MARS• Rijndael• Serpent• Advanced

Encryption Standard

Page 32: Network Security and Firewalls

Asymmetric Encryption

• Asymmetric-key encryption elements– RSA– DSA– Diffie-Hellman

Page 33: Network Security and Firewalls

Hash Encryption

• Signing• Hash algorithms

– MD2, MD4, and MD5– Secure hash algorithm

Page 34: Network Security and Firewalls

AppliedEncryption Processes

• E-mail• PGP and GPG• S-MIME• Encrypting drives• Web server encryption

Page 35: Network Security and Firewalls

Summary

Create a trust relationship using public-key cryptography

List specific forms of symmetric, asymmetric, and hash encryption

Deploy PGP in Windows 2000 and Linux

Page 36: Network Security and Firewalls

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 4:Types of Attacks

Page 37: Network Security and Firewalls

Objectives

• Describe specific types of security attacks• Recognize specific attack incidents

Page 38: Network Security and Firewalls

Brute-Force andDictionary Attacks

• Brute-force attack– Repeated access attempts

• Dictionary attack– Customized version of brute-force attack

Page 39: Network Security and Firewalls

System Bugs and Back Doors

• Buffer overflow• Trojans and root kits

Page 40: Network Security and Firewalls

Social Engineeringand Nondirect Attacks

• Call and ask for the password• Fraudulent e-mail• DOS and DDOS attacks• Spoofing• Trojans• Information leakage• Hijacking and man-in-the-middle attacks

Page 41: Network Security and Firewalls

Summary

Describe specific types of security attacks Recognize specific attack incidents

Page 42: Network Security and Firewalls

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 5:General

Security Principles

Page 43: Network Security and Firewalls

Objectives

• Describe the universal guidelines and principles for effective network security

• Use universal guidelines to create effective specific solutions

Page 44: Network Security and Firewalls

CommonSecurity Principles

• Be paranoid• Have a security

policy• No system stands

alone• Minimize damage• Deploy company-

wide enforcement

• Provide training• Integrate security

strategies• Place equipment

according to needs• Identify security

business issues• Consider physical

security

Page 45: Network Security and Firewalls

Summary

Describe the universal guidelines and principles for effective network security

Use universal guidelines to create effective specific solutions

Page 46: Network Security and Firewalls

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 6:Protocol Layers

and Security

Page 47: Network Security and Firewalls

Objectives

• List the protocols that pass through a firewall

• Identify potential threats at different layers of the TCP/IP stack

Page 48: Network Security and Firewalls

TCP/IP andNetwork Security

• The Internet and TCP/IP were not designed around strong security principles

Page 49: Network Security and Firewalls

The TCP/IP Suite andthe OSI Reference Model

• Physical layer• Network layer• Transport layer• Application layer• Presentation layer• Session layer• Data link layer

Page 50: Network Security and Firewalls

TCP/IPPacket Construction

TCP Segment

Header Body

IP Datagram

Header Body

Ethernet Frames

Application Message: e-mail, FTP, Telnet

Header Body Trailer

Page 51: Network Security and Firewalls

Summary

List the protocols that pass through a firewall

Identify potential threats at different layers of the TCP/IP stack

Page 52: Network Security and Firewalls

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 7:Securing Resources

Page 53: Network Security and Firewalls

Objectives

• Consistently apply security principles• Secure TCP/IP services• Describe the importance of testing and

evaluating systems and services• Discuss network security management

applications

Page 54: Network Security and Firewalls

Implementing Security

• Categorize resources and needs• Define a security policy• Secure each resource and service• Log, test, and evaluate• Repeat the process and keep current

Page 55: Network Security and Firewalls

Resources and Services

• Protecting services– Protect against profiling– Coordinate methods and techniques– Protect services by changing default

settings– Remove unnecessary services

Page 56: Network Security and Firewalls

ProtectingTCP/IP Services

• The Web Server– CGI scripts– CGI and programming

• Securing IIS• Additional HTTP servers• FTP servers

– Access control

Page 57: Network Security and Firewalls

Simple MailTransfer Protocol

• The Internet Worm• The Melissa virus• E-mail and virus scanning• Access control measures

Page 58: Network Security and Firewalls

Testing and Evaluating

• Testing existing systems

Page 59: Network Security and Firewalls

Security Testing Software

• Specific tools– Network scanners– Operating system add-ons– Logging and log analysis tools

Page 60: Network Security and Firewalls

Security and Repetition

• Understanding the latest exploits

Page 61: Network Security and Firewalls

Summary

Consistently apply security principles Secure TCP/IP services Describe the importance of testing and

evaluating systems and services Discuss network security management

applications

Page 62: Network Security and Firewalls

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 8:Firewalls and

Virtual Private Networks

Page 63: Network Security and Firewalls

Objectives

• Describe the role a firewall plays in a company’s security policy

• Define common firewall terms• Describe packet-filtering rules• Describe circuit-level gateways• Configure an application-level gateway• Explain PKI• Discuss public keys and VPNs

Page 64: Network Security and Firewalls

The Roleof a Firewall

• Implement a company’s security policy• Create a choke point• Log Internet activity• Limit network host exposure

Page 65: Network Security and Firewalls

FirewallTerminology

• Packet filter• Proxy server• NAT• Bastion host• Operating system hardening• Screening and choke routers• DMZ

Page 66: Network Security and Firewalls

CreatingPacket Filter Rules

• Process– Packet filters work at the network layer of

the OSI/RM• Rules and fields

Page 67: Network Security and Firewalls

Packet Filter Advantages and Disadvantages

• Drawbacks• Stateful multi-layer inspection• Popular packet-filtering products• Using the ipchains and iptables

commands in Linux

Page 68: Network Security and Firewalls

ConfiguringProxy Servers

• Recommending a proxy-oriented firewall• Advantages and disadvantages

– Authentication– Logging and alarming– Caching– Reverse proxies and proxy arrays– Client configuration– Speed

Page 69: Network Security and Firewalls

Remote Access andVirtual Private Networks

• Virtual network perimeter• Tunneling protocols• IPsec• ESP• PPTP• L2TP

Page 70: Network Security and Firewalls

Public KeyInfrastructure (PKI)

• Standards– Based on X.509 standard

• Terminology• Certificates

Page 71: Network Security and Firewalls

Summary

Describe the role a firewall plays in a company’s security policy

Define common firewall terms Describe packet-filtering rules Describe circuit-level gateways Configure an application-level gateway Explain PKI Discuss public keys and VPNs

Page 72: Network Security and Firewalls

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 9:Levels of

Firewall Protection

Page 73: Network Security and Firewalls

Objectives

• Plan a firewall system that incorporates several levels of protection

• Describe the four types of firewall systems design and their degrees of security

• Implement a packet-filtering firewall

Page 74: Network Security and Firewalls

FirewallStrategies and Goals

• Resource placement• Physical access points• Site administration• Monitoring tools• Hardware

Page 75: Network Security and Firewalls

Building a Firewall

• Design principles– Keep design simple– Make contingency plans

Page 76: Network Security and Firewalls

Types ofBastion Hosts

• Single-homed bastion host• Dual-homed bastion host• Single-purpose bastion hosts

– Internal bastion hosts

Page 77: Network Security and Firewalls

Hardware Issues

• Operating system• Services• Daemons

Page 78: Network Security and Firewalls

CommonFirewall Designs

• Screening routers• Screened host firewall (single-homed bastion)• Screened host firewall (dual-homed bastion)• Screened subnet firewall (demilitarized zone)

Page 79: Network Security and Firewalls

Summary

Plan a firewall system that incorporates several levels of protection

Describe the four types of firewall systems design and their degrees of security

Implement a packet-filtering firewall

Page 80: Network Security and Firewalls

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 10:Detecting and

Distracting Hackers

Page 81: Network Security and Firewalls

Objectives

• Customize your network to manage hacker activity

• Implement proactive detection• Distract hackers and contain their activity• Set traps• Deploy Tripwire for Linux

Page 82: Network Security and Firewalls

Proactive Detection

• Automated security scans• Login scripts• Automated audit analysis• Checksum analysis

Page 83: Network Security and Firewalls

Distractingthe Hacker

• Dummy accounts• Dummy files• Dummy password files• Tripwires and automated checksums• Jails

Page 84: Network Security and Firewalls

Punishingthe Hacker

• Methods• Tools

Page 85: Network Security and Firewalls

Summary

Customize your network to manage hacker activity

Implement proactive detection Distract hackers and contain their activity Set traps Deploy Tripwire for Linux

Page 86: Network Security and Firewalls

Copyright © 2002 ProsoftTraining. All rights reserved.

Lesson 11:Incident Response

Page 87: Network Security and Firewalls

Objectives

• Respond appropriately to a security breach• Identify some of the security organizations

that can help you in case your system is attacked

• Subscribe to respected security alerting organizations

Page 88: Network Security and Firewalls

DecideAhead of Time

• Itemize a detailed list of procedures• Include the list in a written policy• Be sure all employees have a copy

Page 89: Network Security and Firewalls

Incident Response

• Do not panic• Document everything• Assess the situation• Stop or contain the activity• Execute the response plan• Analyze and learn

Page 90: Network Security and Firewalls

Summary

Respond appropriately to a security breach Identify some of the security organizations

that can help you in case your system is attacked

Subscribe to respected security alerting organizations

Page 91: Network Security and Firewalls

NetworkSecurity and Firewalls

What Is Security? Elements of Security Applied Encryption Types of Attacks General Security Principles Protocol Layers and Security

Page 92: Network Security and Firewalls

NetworkSecurity and Firewalls

Securing Resources Firewalls and Virtual Private Networks Levels of Firewall Protection Detecting and Distracting Hackers Incident Response