network security techniques

33
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University [email protected]

Upload: vernon-vance

Post on 04-Jan-2016

25 views

Category:

Documents


2 download

DESCRIPTION

Network Security Techniques. by Bruce Roy Millard Division of Computing Studies Arizona State University [email protected]. What is Network Security. Hardware – computers, routers, etc Networks – ethernet, wireless Communication Intruders Mitigation. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Network Security Techniques

Network Security

Techniquesby

Bruce Roy Millard

Division of Computing Studies

Arizona State University

[email protected]

Page 2: Network Security Techniques

What is Network Security

• Hardware – computers, routers, etc

• Networks – ethernet, wireless

• Communication

• Intruders

• Mitigation

Page 3: Network Security Techniques

What is Network Security

Hardware• Workstation

• Servers (and load balancers)

• Printers (and other shared devices)

• Routers/switches/hubs

• Security devices (firewalls, IDS, etc)

Page 4: Network Security Techniques

What is Network Security

Networks• Connectivity

• Ethernet (cable, DSL, TP, 1Gbps & up)

• Wireless (radio waves, 802.11?, satellite)

• LAN, CAN, MAN, WAN, PAN

• Internet

Page 5: Network Security Techniques

What is Network Security

Communication• E-mail

• FTP

• HTTP/HTML

• Voice, video, teleconferencing

• SSH/SCP

Page 6: Network Security Techniques

What is Network Security

Intruders

Page 7: Network Security Techniques

What is Network Security

Intruders• Eavesdroppers

• Insertion

• Hijacking

• Spoofing

• Denial of Service

• Trojan horse software

• Lurkers (viruses and worms)

Page 8: Network Security Techniques

What is Network Security

Mitigation

• Prevent

• Avoid

• Detect

• Assess

• React

Page 9: Network Security Techniques

Security Goals

• Privacy

• Integrity

• Non-repudiation

• Trust relationships – internal & external

• Authentication supports authorization supports fine-grained access control

Page 10: Network Security Techniques

Security Model(Protection)

• Assets - identify

• Risks - characterize

• Counter-measures - obtain

• Policy – create where no laws exist

Page 11: Network Security Techniques

Security Methods

• Shields – firewalls, virus scanners

• Selective shields - access control (VPN)

• Protocols – IPsec, SSL/TLS

• Intrusion Detection Systems

• Training & awareness

• Redundancy – backups, encryption, hashes, digests

Page 12: Network Security Techniques

Prevention(Attempts)

• Firewalls – have holes• Virus Scanners – behind the times• Physical Security• Know Fundamentals – routing, IP, TCP, ARP,

DHCP, applications• Encryption – PGP, SSH, SSL/TLS, Ipsec,

stenography, public key, symetric key• Patches – windowsupdate, up2date, yum

Page 13: Network Security Techniques

Avoidance

• Firewalls & VPNs – Ipsec, SSL, access control

• Host hardening – personal firewalls, ssh, iptables

• Proxy servers – squid (Web content cache)

• Honeynets/honeypots - redirection

Page 14: Network Security Techniques

DetectionFeeds Avoidance

• Vulnerability Scanning – netstat, netview, netmon, nmap, Nessus

• Network-based IDS – snort, kismet, ACID, tcpdump, ethereal, windump, netstumbler

• Host-based IDS – TCPwrappers, xinetd, tripwire, logsentry, portsentry

• Web security, Cisco logs+

Page 15: Network Security Techniques

Exploits

• Password cracking & WEP cracking• Denial of Service• OS typing – null session, xmas tree, . . .• OS configuration – sadmin password, . . .• Application holes – buffer overflow, NFS,

rpc, netbios, BIND, sendmail, CGI,etc

• Dumpsec, pingwar, . . .

Page 16: Network Security Techniques

URLs of Interest

• http://www.sans.org

• http://www.giac.org

• http://www.isc2.org

• http://www.cissp.com

Page 17: Network Security Techniques

10 Domains of the CBK

• Security Management Practices • Security Architecture and Models • Access Control Systems & Methodology • Application Development Security • Operations Security • Physical Security • Cryptography • Telecommunications, Network, & Internet Security • Business Continuity Planning • Law, Investigations, & Ethics

Page 18: Network Security Techniques

NS Applications

• netstat

• tcpview

• netmon

• netstumbler

• windump

• nmap

• ethereal

• snortiquette

Page 19: Network Security Techniques

www.sans.org/top20(vulnerabilities)

• Top Vulnerabilities to Windows Systems• W1 Web Servers & Services • W2 Workstation Service • W3 Windows Remote Access Services • W4 Microsoft SQL Server (MSSQL) • W5 Windows Authentication • W6 Web Browsers • W7 File-Sharing Applications • W8 LSAS Exposures • W9 Mail Client

• W10 Instant Messaging

Page 20: Network Security Techniques

www.sans.org/top20(vulnerabilities)

• Top Vulnerabilities to UNIX Systems• U1 BIND Domain Name System • U2 Web Server • U3 Authentication • U4 Version Control Systems • U5 Mail Transport Service • U6 Simple Network Management Protocol (SNMP) • U7 Open Secure Sockets Layer (SSL) • U8 Misconfiguration of Enterprise Services NIS/NFS • U9 Databases • U10 Kernel

Page 21: Network Security Techniques
Page 22: Network Security Techniques
Page 23: Network Security Techniques
Page 24: Network Security Techniques
Page 25: Network Security Techniques
Page 26: Network Security Techniques
Page 27: Network Security Techniques
Page 28: Network Security Techniques
Page 29: Network Security Techniques
Page 30: Network Security Techniques
Page 31: Network Security Techniques
Page 32: Network Security Techniques
Page 33: Network Security Techniques