SlideShare a Scribd company logo
Chapter 10 Appendix
Security

Networking Concepts – Eric Vanderburg ©2005
Security
 Know

the costs

 Costs

due to loss of data
 Costs of downtime
 Cost of implementing security measures
 Physical

must be protected first
 Share oriented security (Win9x)
 User oriented security (Win2k, 2k3, XP)
Networking Concepts – Eric
Vanderburg ©2005
Security
 Securing

data

 Make

it safe from intruders
 Make sure damaged data can be replaced
 Plan

for network security

 Identify

threats
 Communicate with other managers in office
to make sure security system meets needs
(it is not only about IT & think of the users)
Networking Concepts – Eric
Vanderburg ©2005
Windows Security Features
 Kerberos
 PKI

(Public Key Infrastructure)
 Group Policy
 VPN (Virtual Private Network)
 IPSec (IP Security)

Networking Concepts – Eric
Vanderburg ©2005
Windows 2003
 CLR

(Command Language Runtime) –
reduces bugs that leave Windows vulnerable
by reducing the power of individual programs,
placing them under the control of the OS.
 IIS 6.0 – configured for maximum security by
default & disabled by default
 Unsecured clients cannot login – Windows 95,
and NT prior to SP4 cannot login to Windows
2003 domain by default; certificates and
encryption required by all clients
Networking Concepts – Eric
Vanderburg ©2005
Kerberos
 Authentication

Method (Win2k &2k3

default)
 Based on RFC 1510
 Uses Kerberos version 5
 Replaces NTLM (NT LAN Manager) &
NTLMv2 – still used with pre 2k clients

Networking Concepts – Eric
Vanderburg ©2005
Kerberos Components
KDC (Key Distribution Center)
 AS (Authentication Service)
 Verifies identity through AD
 Gives TGT (Ticket Granting Ticket) which gives access to certain
resources
 TGS (Ticket-Granting Service)
 Verifies TGT
 Creates a service ticket & session key for a resource based on
TGT. Client can present the service ticket to another server to
access it’s content.
NOTE: Servers have tickets too.
 Only services it’s own domain. Must refer to another TGS for
interdomain resource access (gives referral ticket)
 Server with the desired resource
 Client


Networking Concepts – Eric
Vanderburg ©2005
Items of Note
 Delegation

with Forwarding and Proxy For a server such as a database server
to access resources on your behalf.
(given proxy or forwarding ticket)
 NTP (Network Time Protocol) is used to
synchronize time between machines.
Keys are based on system time so all
must be the same.
Networking Concepts – Eric
Vanderburg ©2005
PKI
 Deploying

a PKI allows you to perform
tasks such as:
 Digitally

signing files (documents and
applications)
 Securing e-mail
 Enabling secure connections between
computers,
 Better user authentication (smart cards)
Networking Concepts – Eric
Vanderburg ©2005
Certificates




Digital certificates Electronic
credentials,
consisting of public
keys, which are used
to
sign and encrypt
data.
Certificate Vendors:
Entrust, Verisign

Networking Concepts – Eric
Vanderburg ©2005

Select CA Role
Certificates


Create certificate
templates so
subordinates can
issue certs

Certificate Template

Certificate Details
Networking Concepts – Eric
Vanderburg ©2005
Certificates
 CA

(Certification Authority)
Issues digital certificates. Form a
hierarchy
 Root CA
 Subordinate CA
Intermediate CA
Issuing CA
Rudimentary CA
restricted to issuing certain certs
Networking Concepts – Eric
Vanderburg ©2005
Certificates
Certificate policy and practice statements The two documents that
outline how the CA and its certificates are to be used, the degree of
trust that can be placed in these certificates, legal liabilities if the
trust is broken, and so on.
 Certificate repositories - Where certificates are stored and
published. (AD)
 CRL (Certificate Revocation List) - List of certificates that have been
revoked before reaching the scheduled expiration date
 CTL (Certificate Trust List) - The list of the certificates you trust. If
you trust a root, you trust all certs from that root.


Double click to see cert
View issued certs from
Certificates MMC
Networking Concepts – Eric
Vanderburg ©2005
Certificate Server Role







Publish certificates - The PKI administrator makes certificate
templates available to clients (users, services, applications, and
computers) and enables additional CAs to issue certificates.
Enroll clients - Users, services, or computers request and receive
certificates from an issuing CA or a Registration Authority (RA).
The CARA administrator or enrollment agent uses the
information provided to authenticate the identity of the requester
before issuing a certificate.
Publish CRL & CTL - Users need to know which certificates are
revokes and which servers are trusted by their CA.
Renew or revoke certificates

Networking Concepts – Eric
Vanderburg ©2005
Group Policy
AD Users & Computers MMC
Select your
group policy

Group Policy MMC

Edit as needed

Networking Concepts – Eric
Vanderburg ©2005
Group Policy

Properties

Double click
an item to edit
the properties
for it

Networking Concepts – Eric
Vanderburg ©2005
VPN
 Encapsulates

& encrypt one packet

inside another
 Server to Server - Connecting LANs
 Client to Server - Remote users &
Extranet

Networking Concepts – Eric
Vanderburg ©2005
VPN Protocols




L2TP (Layer 2 Tunneling Protocol)
 Encrypts with IPSec
 Works on many protocols (X.25, ATM, IP, Frame
Relay)
PPTP (Point to Point Tunneling Protocol)
 Encrypts with MPPE (Microsoft Point to Point
Encryption) - 40, 56, or 128bit
 Authenticates with PAP (Password Authentication
Protocol), CHAP (Challenge Handshake
Authentication Protocol), MSCHAP, or EAP
 Works only over IP
Networking Concepts – Eric
Vanderburg ©2005
VPN Advantages
 Distance

is not a concern
 More scalable - can adjust bandwidth to use
 Less reliant on expensive modem pools

Networking Concepts – Eric
Vanderburg ©2005
IPSec





Tunnel - encrypts the header and the payload of each
packet
Transport - encrypts the payload only.
All systems must be IPSec compliant
Encryption


Authentication Encryption





Data Encryption






SHA (Secure Hash Algorithm) - 160bit, high overhead.
MD5 (Message Digest 5) - 128bit
DES (Data Encryption Standard) 56bit
3DES (Triple DES) - high processor overhead
AES

IPv6 has IPSec built-in
Networking Concepts – Eric
Vanderburg ©2005
IPSec
 IPSec

filters specifies what type of traffic
will be accepted by a machine
 Permit

(unsecured packets sent)
 Request Security (Preference is IPSec
encrypted packets but plaintext is allowed)
 Require Security (Packets must be
encrypted)

Networking Concepts – Eric
Vanderburg ©2005
Security
 Firewalls
 IDS
 Honeypot
 Malicious

Code

 Wireless
A

“hardened” OS is
one that has been
made as secure as
possible Networking Concepts – Eric
Vanderburg ©2005
Hardware Firewalls
Screening Router - filters
packets & closes ports

Screened host - hardware
firewall filters packets & ports.
Bastion host does application
filtering. NAT or proxy
Multiple DMZ – each section has
its own set of firewalls and DMZ
separating it from the others

Screened Subnet/DMZ
(Demilitarized Zone) – put
external access machines in
between 2 firewalls

Networking Concepts – Eric
Vanderburg ©2005
Hardware requirements
 Storage

– large amounts of log files will
be present on this computer so there
must be a large amount of storage
 Processor – this computer will be
analyzing many packets
 2 NICs – must be able to connect the
outside with the inside

Networking Concepts – Eric
Vanderburg ©2005
Software Firewalls
 Most

are cumbersome to configure and control
 Inexpensive extra layer of protection
 Firewall places itself in between the NIC and
the TCP/IP stack
 Vendors
Windows Firewall (built-in)
 Novell Border Manager (built-in)
 Macintosh Firewall (built-in)
 Norton Internet Security
 BlackIce
 ZoneAlarm


Networking Concepts – Eric
Vanderburg ©2005
Firewalls (cont)
 Multiple

firewalls can be used for load
balancing

Networking Concepts – Eric
Vanderburg ©2005
Firewalls

ZoneAlarm
Windows Firewall
Networking Concepts – Eric
Vanderburg ©2005
IDS (Intrusion Detection System)








NIDS (Network IDS) – analyzes network traffic
HIDS (Host IDS) – analyzes traffic sent only to its host
LIDS (Linux IDS) – Open source IDS for linux clients
or servers (http://www.lids.org/)
Looks at network or host traffic based on rules to
determine whether an attack is in progress
The IDS can be configured to respond accordingly ex:
close ports, ban IP addresses, alert admins, close
shares, disable accounts, ect..
Examples: snort

Networking Concepts – Eric
Vanderburg ©2005
Rules
 Rule

base – set of rules that tell the
firewall or IDS what action to take when
types of traffic flow through it.
 Should

be based on security policy

Networking Concepts – Eric
Vanderburg ©2005
Honeypot
A

lure for a hacker
 Wastes the hackers time
 Fake computer or network behind
security barriers
 Can be analyzed to view attack methods
and improve security. Identify what they
are after, what is their skill level, and
what tools they use.
Networking Concepts – Eric
Vanderburg ©2005
Malicious Code
Virus - self-replicating code segment which is be attached to an
executable. When the program is started, the virus code may also run. If
possible, the virus will replicate by attaching a copy of itself to another
file. A virus may also have an additional ``payload'' that runs when
specific conditions are met.
 Trojan horse - malicious code pretending to be a legitimate application.
The user believes they are running an innocent application when the
program is actually initiating its ulterior activities. Trojan horses do not
replicate.
 Worm - self-replicating program, does not require a host program,
creates a copy and causes it to execute; no user intervention is required.
Worms commonly utilize network services to propagate to other
computer systems
 Spyware - a program that secretly monitors your actions. Could be a
remote control program used by a hacker, or it could be used to gather
data about users for advertising, aggregation/research, or preliminary
information for an attack. Some spyware is configured to download other
programs on the computer.


Networking Concepts – Eric
Vanderburg ©2005
Viruses
 Implement

virus protection at these locations:

Workstation – protects a single computer by
scanning files from server or e-mail messages
 Server – scans data read from or written to
server; prevents virus from server spreading
throughout network
 Internet gateway – scans all Web browser,
FTP, and e-mail traffic; stops viruses before
they enter network. Do not infect those checking
your website


Networking Concepts – Eric
Vanderburg ©2005
Wireless Security
 Site

Survey - adjust location and range
so that wireless access extends only to
business borders
 Passwords should be changed and so
should WEP keys. WEP should be
enabled.
 Filter MACs
 Disable SSID broadcasting
Networking Concepts – Eric
Vanderburg ©2005
Hardening
 Remove

unneeded services
 Close unused ports
 Remove unused user accounts

Networking Concepts – Eric
Vanderburg ©2005
Auditing
 Records

certain actions for security and
troubleshooting
 Failed

access
 Granted access
 Should

use auditing sparingly – uses
resources & more is harder to utilize
effectively

Networking Concepts – Eric
Vanderburg ©2005
Enabling Auditing






Administrative Tools 
Local Security Policy
Local Policies  Audit
Policy.
Double-click the policy
that you want to enable or
disable.
Click the Success (An
audited security access
attempt that succeeds)
and Fail (audited
security access attempt
that fails)

Networking Concepts – Eric
Vanderburg ©2005

More Related Content

PPTX
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
PPSX
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
Byres Security Inc.
 
PPTX
Application layer Security in IoT: A Survey
Adeel Ahmed
 
PDF
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Honeywell
 
PDF
Securing Critical Iot Infrastructure, IoT Israel 2014
iotisrael
 
PDF
S4xJapan Closing Keynote
Digital Bond
 
PDF
The 5 elements of IoT security
Julien Vermillard
 
PDF
API Training 10 Nov 2014
Digital Bond
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
Byres Security Inc.
 
Application layer Security in IoT: A Survey
Adeel Ahmed
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Honeywell
 
Securing Critical Iot Infrastructure, IoT Israel 2014
iotisrael
 
S4xJapan Closing Keynote
Digital Bond
 
The 5 elements of IoT security
Julien Vermillard
 
API Training 10 Nov 2014
Digital Bond
 

What's hot (20)

PPTX
Checkpoint Overview
Leonardo Antichi
 
PDF
Palo Alto Networks Portfolio & Strategy Overview 2019
Sean Xie
 
PPT
Open Platform for ICS Cybersecurity Research and Education
EnergySec
 
PDF
Unidirectional Network Architectures
EnergySec
 
PDF
Eximbank security presentation
laonap166
 
PPTX
Data Center Security Now and into the Future
Cisco Security
 
PPT
Day1
Jai4uk
 
PDF
Cisco Study: State of Web Security
Cisco Canada
 
PDF
TechWiseTV Workshop: Stealthwatch Learning Network License
Robb Boyd
 
PPTX
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Hassan EL ALLOUSSI
 
PPTX
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
Digital Bond
 
PPSX
ISE_Pub
Will Hatcher
 
PDF
Unidirectional Security, Andrew Ginter of Waterfall Security
Digital Bond
 
PDF
Who needs iot security?
Justin Black
 
PPTX
Vulnerability Inheritance in ICS (English)
Digital Bond
 
PDF
Windows Service Hardening
Digital Bond
 
PDF
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
 
PDF
Monitoring ICS Communications
Digital Bond
 
PDF
The Network as a Sensor, Cisco and Lancope
Cisco Enterprise Networks
 
PPTX
Using Assessment Tools on ICS (English)
Digital Bond
 
Checkpoint Overview
Leonardo Antichi
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Sean Xie
 
Open Platform for ICS Cybersecurity Research and Education
EnergySec
 
Unidirectional Network Architectures
EnergySec
 
Eximbank security presentation
laonap166
 
Data Center Security Now and into the Future
Cisco Security
 
Day1
Jai4uk
 
Cisco Study: State of Web Security
Cisco Canada
 
TechWiseTV Workshop: Stealthwatch Learning Network License
Robb Boyd
 
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Hassan EL ALLOUSSI
 
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
Digital Bond
 
ISE_Pub
Will Hatcher
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Digital Bond
 
Who needs iot security?
Justin Black
 
Vulnerability Inheritance in ICS (English)
Digital Bond
 
Windows Service Hardening
Digital Bond
 
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
 
Monitoring ICS Communications
Digital Bond
 
The Network as a Sensor, Cisco and Lancope
Cisco Enterprise Networks
 
Using Assessment Tools on ICS (English)
Digital Bond
 
Ad

Viewers also liked (17)

PDF
Lecture5
Majid Taghiloo
 
PPTX
Security concepts
artisriva
 
PPTX
360suite Business Objects Xi3 New Security Concepts
Sebastien Goiffon
 
PPTX
PACE-IT: Basic Network Concepts (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
Pace IT at Edmonds Community College
 
PPTX
PACE-IT: Basic Network Concepts (part 1)
Pace IT at Edmonds Community College
 
PPT
Information Security Management. Security solutions copy
yuliana_mar
 
PPTX
A review of network concepts base on CISCO by Ali Shahbazi
Ali Shahbazi Khojasteh
 
PPT
Network and security concepts
sonuagain
 
PPT
Basic Network Concepts
Abhishek Singh
 
PPTX
5G Wireless Technology - pavankumar_912
Pavan Kumar Sindgi
 
PDF
Model-driven Extraction and Analysis of Network Security Policies (at MoDELS'13)
Jordi Cabot
 
PPT
Network Security
MAJU
 
PPT
Basic concepts of computer Networking
Hj Habib
 
PPTX
Mobile security in Cyber Security
Geo Marian
 
PPTX
Introduction to computer network
Ashita Agrawal
 
Lecture5
Majid Taghiloo
 
Security concepts
artisriva
 
360suite Business Objects Xi3 New Security Concepts
Sebastien Goiffon
 
PACE-IT: Basic Network Concepts (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.2: Secure Network Administration Concepts
Pace IT at Edmonds Community College
 
PACE-IT: Basic Network Concepts (part 1)
Pace IT at Edmonds Community College
 
Information Security Management. Security solutions copy
yuliana_mar
 
A review of network concepts base on CISCO by Ali Shahbazi
Ali Shahbazi Khojasteh
 
Network and security concepts
sonuagain
 
Basic Network Concepts
Abhishek Singh
 
5G Wireless Technology - pavankumar_912
Pavan Kumar Sindgi
 
Model-driven Extraction and Analysis of Network Security Policies (at MoDELS'13)
Jordi Cabot
 
Network Security
MAJU
 
Basic concepts of computer Networking
Hj Habib
 
Mobile security in Cyber Security
Geo Marian
 
Introduction to computer network
Ashita Agrawal
 
Ad

Similar to Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg (20)

PPT
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Eric Vanderburg
 
PPT
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
 
PPT
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
Eric Vanderburg
 
PDF
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
VMworld
 
PPT
Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
Eric Vanderburg
 
PDF
Enabling embedded security for the Internet of Things
team-WIBU
 
PPTX
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
 
PPTX
Rik Ferguson
CloudExpoEurope
 
PPT
Information Security Lesson 6 - Web Security - Eric Vanderburg
Eric Vanderburg
 
PPT
Day4
Jai4uk
 
PDF
IoT Meets Security
Samsung Open Source Group
 
PPT
Chapter08
Muhammad Ahad
 
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 11
Nil Menon
 
PPTX
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
PPTX
Network Security ffffffffffffffffffffffffff
simonlaurette1
 
PDF
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada
 
PPTX
Investigation, Design and Implementation of a Secure
Firas Alsayied
 
PDF
IRJET- Network Monitoring & Network Security
IRJET Journal
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Eric Vanderburg
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
 
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
Eric Vanderburg
 
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
VMworld
 
Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
Eric Vanderburg
 
Enabling embedded security for the Internet of Things
team-WIBU
 
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
 
Rik Ferguson
CloudExpoEurope
 
Information Security Lesson 6 - Web Security - Eric Vanderburg
Eric Vanderburg
 
Day4
Jai4uk
 
IoT Meets Security
Samsung Open Source Group
 
Chapter08
Muhammad Ahad
 
CCNA 1 Routing and Switching v5.0 Chapter 11
Nil Menon
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
Network Security ffffffffffffffffffffffffff
simonlaurette1
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada
 
Investigation, Design and Implementation of a Secure
Firas Alsayied
 
IRJET- Network Monitoring & Network Security
IRJET Journal
 

More from Eric Vanderburg (20)

PPTX
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
PPTX
Modern Security the way Equifax Should Have
Eric Vanderburg
 
PPTX
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
PPTX
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
 
PPTX
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
PPT
Emerging Technologies: Japan’s Position
Eric Vanderburg
 
PPT
Principles of technology management
Eric Vanderburg
 
PPT
Japanese railway technology
Eric Vanderburg
 
PPT
Evaluating japanese technological competitiveness
Eric Vanderburg
 
PPT
Japanese current and future technology management challenges
Eric Vanderburg
 
PPT
Technology management in Japan: Robotics
Eric Vanderburg
 
PPT
Incident response table top exercises
Eric Vanderburg
 
PPTX
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
PPTX
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
PPTX
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
PPTX
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 
PPTX
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
 
PPTX
Countering malware threats - Eric Vanderburg
Eric Vanderburg
 
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
Modern Security the way Equifax Should Have
Eric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
Emerging Technologies: Japan’s Position
Eric Vanderburg
 
Principles of technology management
Eric Vanderburg
 
Japanese railway technology
Eric Vanderburg
 
Evaluating japanese technological competitiveness
Eric Vanderburg
 
Japanese current and future technology management challenges
Eric Vanderburg
 
Technology management in Japan: Robotics
Eric Vanderburg
 
Incident response table top exercises
Eric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Eric Vanderburg
 

Recently uploaded (20)

PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Software Development Methodologies in 2025
KodekX
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
The Future of Artificial Intelligence (AI)
Mukul
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 

Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg

  • 1. Chapter 10 Appendix Security Networking Concepts – Eric Vanderburg ©2005
  • 2. Security  Know the costs  Costs due to loss of data  Costs of downtime  Cost of implementing security measures  Physical must be protected first  Share oriented security (Win9x)  User oriented security (Win2k, 2k3, XP) Networking Concepts – Eric Vanderburg ©2005
  • 3. Security  Securing data  Make it safe from intruders  Make sure damaged data can be replaced  Plan for network security  Identify threats  Communicate with other managers in office to make sure security system meets needs (it is not only about IT & think of the users) Networking Concepts – Eric Vanderburg ©2005
  • 4. Windows Security Features  Kerberos  PKI (Public Key Infrastructure)  Group Policy  VPN (Virtual Private Network)  IPSec (IP Security) Networking Concepts – Eric Vanderburg ©2005
  • 5. Windows 2003  CLR (Command Language Runtime) – reduces bugs that leave Windows vulnerable by reducing the power of individual programs, placing them under the control of the OS.  IIS 6.0 – configured for maximum security by default & disabled by default  Unsecured clients cannot login – Windows 95, and NT prior to SP4 cannot login to Windows 2003 domain by default; certificates and encryption required by all clients Networking Concepts – Eric Vanderburg ©2005
  • 6. Kerberos  Authentication Method (Win2k &2k3 default)  Based on RFC 1510  Uses Kerberos version 5  Replaces NTLM (NT LAN Manager) & NTLMv2 – still used with pre 2k clients Networking Concepts – Eric Vanderburg ©2005
  • 7. Kerberos Components KDC (Key Distribution Center)  AS (Authentication Service)  Verifies identity through AD  Gives TGT (Ticket Granting Ticket) which gives access to certain resources  TGS (Ticket-Granting Service)  Verifies TGT  Creates a service ticket & session key for a resource based on TGT. Client can present the service ticket to another server to access it’s content. NOTE: Servers have tickets too.  Only services it’s own domain. Must refer to another TGS for interdomain resource access (gives referral ticket)  Server with the desired resource  Client  Networking Concepts – Eric Vanderburg ©2005
  • 8. Items of Note  Delegation with Forwarding and Proxy For a server such as a database server to access resources on your behalf. (given proxy or forwarding ticket)  NTP (Network Time Protocol) is used to synchronize time between machines. Keys are based on system time so all must be the same. Networking Concepts – Eric Vanderburg ©2005
  • 9. PKI  Deploying a PKI allows you to perform tasks such as:  Digitally signing files (documents and applications)  Securing e-mail  Enabling secure connections between computers,  Better user authentication (smart cards) Networking Concepts – Eric Vanderburg ©2005
  • 10. Certificates   Digital certificates Electronic credentials, consisting of public keys, which are used to sign and encrypt data. Certificate Vendors: Entrust, Verisign Networking Concepts – Eric Vanderburg ©2005 Select CA Role
  • 11. Certificates  Create certificate templates so subordinates can issue certs Certificate Template Certificate Details Networking Concepts – Eric Vanderburg ©2005
  • 12. Certificates  CA (Certification Authority) Issues digital certificates. Form a hierarchy  Root CA  Subordinate CA Intermediate CA Issuing CA Rudimentary CA restricted to issuing certain certs Networking Concepts – Eric Vanderburg ©2005
  • 13. Certificates Certificate policy and practice statements The two documents that outline how the CA and its certificates are to be used, the degree of trust that can be placed in these certificates, legal liabilities if the trust is broken, and so on.  Certificate repositories - Where certificates are stored and published. (AD)  CRL (Certificate Revocation List) - List of certificates that have been revoked before reaching the scheduled expiration date  CTL (Certificate Trust List) - The list of the certificates you trust. If you trust a root, you trust all certs from that root.  Double click to see cert View issued certs from Certificates MMC Networking Concepts – Eric Vanderburg ©2005
  • 14. Certificate Server Role     Publish certificates - The PKI administrator makes certificate templates available to clients (users, services, applications, and computers) and enables additional CAs to issue certificates. Enroll clients - Users, services, or computers request and receive certificates from an issuing CA or a Registration Authority (RA). The CARA administrator or enrollment agent uses the information provided to authenticate the identity of the requester before issuing a certificate. Publish CRL & CTL - Users need to know which certificates are revokes and which servers are trusted by their CA. Renew or revoke certificates Networking Concepts – Eric Vanderburg ©2005
  • 15. Group Policy AD Users & Computers MMC Select your group policy Group Policy MMC Edit as needed Networking Concepts – Eric Vanderburg ©2005
  • 16. Group Policy Properties Double click an item to edit the properties for it Networking Concepts – Eric Vanderburg ©2005
  • 17. VPN  Encapsulates & encrypt one packet inside another  Server to Server - Connecting LANs  Client to Server - Remote users & Extranet Networking Concepts – Eric Vanderburg ©2005
  • 18. VPN Protocols   L2TP (Layer 2 Tunneling Protocol)  Encrypts with IPSec  Works on many protocols (X.25, ATM, IP, Frame Relay) PPTP (Point to Point Tunneling Protocol)  Encrypts with MPPE (Microsoft Point to Point Encryption) - 40, 56, or 128bit  Authenticates with PAP (Password Authentication Protocol), CHAP (Challenge Handshake Authentication Protocol), MSCHAP, or EAP  Works only over IP Networking Concepts – Eric Vanderburg ©2005
  • 19. VPN Advantages  Distance is not a concern  More scalable - can adjust bandwidth to use  Less reliant on expensive modem pools Networking Concepts – Eric Vanderburg ©2005
  • 20. IPSec     Tunnel - encrypts the header and the payload of each packet Transport - encrypts the payload only. All systems must be IPSec compliant Encryption  Authentication Encryption    Data Encryption     SHA (Secure Hash Algorithm) - 160bit, high overhead. MD5 (Message Digest 5) - 128bit DES (Data Encryption Standard) 56bit 3DES (Triple DES) - high processor overhead AES IPv6 has IPSec built-in Networking Concepts – Eric Vanderburg ©2005
  • 21. IPSec  IPSec filters specifies what type of traffic will be accepted by a machine  Permit (unsecured packets sent)  Request Security (Preference is IPSec encrypted packets but plaintext is allowed)  Require Security (Packets must be encrypted) Networking Concepts – Eric Vanderburg ©2005
  • 22. Security  Firewalls  IDS  Honeypot  Malicious Code  Wireless A “hardened” OS is one that has been made as secure as possible Networking Concepts – Eric Vanderburg ©2005
  • 23. Hardware Firewalls Screening Router - filters packets & closes ports Screened host - hardware firewall filters packets & ports. Bastion host does application filtering. NAT or proxy Multiple DMZ – each section has its own set of firewalls and DMZ separating it from the others Screened Subnet/DMZ (Demilitarized Zone) – put external access machines in between 2 firewalls Networking Concepts – Eric Vanderburg ©2005
  • 24. Hardware requirements  Storage – large amounts of log files will be present on this computer so there must be a large amount of storage  Processor – this computer will be analyzing many packets  2 NICs – must be able to connect the outside with the inside Networking Concepts – Eric Vanderburg ©2005
  • 25. Software Firewalls  Most are cumbersome to configure and control  Inexpensive extra layer of protection  Firewall places itself in between the NIC and the TCP/IP stack  Vendors Windows Firewall (built-in)  Novell Border Manager (built-in)  Macintosh Firewall (built-in)  Norton Internet Security  BlackIce  ZoneAlarm  Networking Concepts – Eric Vanderburg ©2005
  • 26. Firewalls (cont)  Multiple firewalls can be used for load balancing Networking Concepts – Eric Vanderburg ©2005
  • 28. IDS (Intrusion Detection System)       NIDS (Network IDS) – analyzes network traffic HIDS (Host IDS) – analyzes traffic sent only to its host LIDS (Linux IDS) – Open source IDS for linux clients or servers (http://www.lids.org/) Looks at network or host traffic based on rules to determine whether an attack is in progress The IDS can be configured to respond accordingly ex: close ports, ban IP addresses, alert admins, close shares, disable accounts, ect.. Examples: snort Networking Concepts – Eric Vanderburg ©2005
  • 29. Rules  Rule base – set of rules that tell the firewall or IDS what action to take when types of traffic flow through it.  Should be based on security policy Networking Concepts – Eric Vanderburg ©2005
  • 30. Honeypot A lure for a hacker  Wastes the hackers time  Fake computer or network behind security barriers  Can be analyzed to view attack methods and improve security. Identify what they are after, what is their skill level, and what tools they use. Networking Concepts – Eric Vanderburg ©2005
  • 31. Malicious Code Virus - self-replicating code segment which is be attached to an executable. When the program is started, the virus code may also run. If possible, the virus will replicate by attaching a copy of itself to another file. A virus may also have an additional ``payload'' that runs when specific conditions are met.  Trojan horse - malicious code pretending to be a legitimate application. The user believes they are running an innocent application when the program is actually initiating its ulterior activities. Trojan horses do not replicate.  Worm - self-replicating program, does not require a host program, creates a copy and causes it to execute; no user intervention is required. Worms commonly utilize network services to propagate to other computer systems  Spyware - a program that secretly monitors your actions. Could be a remote control program used by a hacker, or it could be used to gather data about users for advertising, aggregation/research, or preliminary information for an attack. Some spyware is configured to download other programs on the computer.  Networking Concepts – Eric Vanderburg ©2005
  • 32. Viruses  Implement virus protection at these locations: Workstation – protects a single computer by scanning files from server or e-mail messages  Server – scans data read from or written to server; prevents virus from server spreading throughout network  Internet gateway – scans all Web browser, FTP, and e-mail traffic; stops viruses before they enter network. Do not infect those checking your website  Networking Concepts – Eric Vanderburg ©2005
  • 33. Wireless Security  Site Survey - adjust location and range so that wireless access extends only to business borders  Passwords should be changed and so should WEP keys. WEP should be enabled.  Filter MACs  Disable SSID broadcasting Networking Concepts – Eric Vanderburg ©2005
  • 34. Hardening  Remove unneeded services  Close unused ports  Remove unused user accounts Networking Concepts – Eric Vanderburg ©2005
  • 35. Auditing  Records certain actions for security and troubleshooting  Failed access  Granted access  Should use auditing sparingly – uses resources & more is harder to utilize effectively Networking Concepts – Eric Vanderburg ©2005
  • 36. Enabling Auditing     Administrative Tools  Local Security Policy Local Policies  Audit Policy. Double-click the policy that you want to enable or disable. Click the Success (An audited security access attempt that succeeds) and Fail (audited security access attempt that fails) Networking Concepts – Eric Vanderburg ©2005