Unit 5 - Security in Networks

Unit 5 - Security in Networks

Topics

Threats in networks

Network Security Controls – Architecture, Encryption, Content Integrity, Strong Authentication, Access Controls, Wireless Security, Honeypots, Traffic flow security.

Firewalls – Design and Types of Firewalls, Personal Firewalls, IDS

Email Security – PGP, S/MIME

Threats in Network

Threat - Potential vulnerability that can breach security and negatively alter, erase the data or can have unwanted impact on computer system.

Malware - Malicious + Software. All are malicious software but behaves differently.

On the basis of Infection

  1. Virus – Self Replicating, hooks on a program, can travel all over the internet and infect a computer without permission of the user… The Creeper Virus was first detected on ARPANET.

  2. Worms – Self Replcating, don’t hook on computer, are network-aware(can travel in network). Don’t do much harm rather consume hard disk space thus slowing down the computer.

  3. Trojan – Conceal themselves inside the software that seem legitimate and it is executed when required. Used often provide backdoor gateway for malicious programs to enter your system and steal your valuable data without your knowledge and permission. Examples include FTP Trojans, Proxy Trojans, Remote Access Trojans(RAT) etc.

  4. Bots –: Automated processes that are designed to interact over the internet, without the need for human interaction. Malicious bot can infect one host and after infecting will create connection to the central server which will provide commands to all infected hosts attached to that network called Botnet.

Malware on the basis of Actions:

Shikari par ASR ZR Sanya ka

  1. Adware – Not malicious. Breach user privacy to display ads. Come attached with free-to-use software. Monitor user’s interests and display relevant ads.

  2. Spyware – Monitors computer activity on computer and share the collected information to an interested party. Generally dropped by Trojans. Sits silently to avoid detection. Most common example - KEYLOGGER.

  3. Ransomware – Will either encrypt your files or will lock your computer making it inaccessible either partially or wholly. Then a screen will be displayed asking for money i.e. ransom in exchange.

  4. Scareware – Masquerades as a tool to help fix your system but when executed it infects system completely.

  5. Rootkits – Gain root access or administrative privileges in the user system.

  6. Zombies – similar to Spyware, except wait for hacker’s command.

2. Network Security Controls

Introduction

  • Ensures the CIA (Confidentiality, Integrity, Availability) of network services. by implementing either technical or administrative safeguards implemented to minimize the security risk.

  • To reduce the risk of a network being compromised, an adequate network security requires implementing a proper combination of network security controls.

Encryption

enter image description here

Strong Authentication(13)

enter image description here

enter image description here

Access Control

Limiting access of computer resources to users. This mechanism grants access(read, write, execute) to the user/application based on the access permissions and their associated roles.

Includes : CRUD(Create , Read , Update , Delete) of File permissions, Execution of Program permissions, Data rights to retrieve or update information in a database.

Types

1. Discretionary Access Control (DAC)

Owner of the resource decides how it can be shared. He himself responsible to give read/write access to others.

enter image description here

2. Mandatory Access Control (MAC)

User works in a company and the company decides how data should be shared like Hospital owns patient records and limits their sharing. For example HIPAA for health information

In short, who can share what and to whom.

3. Role Based Access Control (RBAC)

It is not based on users, rather it is based on Roles. What you are performing you will have the access to it.

enter image description here

Identification: Confirming the user’s identity, process or device accessing the network, via unique User ID/Acc Number.

Authentication: Who are you ? Verifying the credentials provided by the user while attempting to connect to a network. A typical user authentication consists of a user ID and a password.

Authorization: What action a user can perform. What you can do ?

Accounting Tracking the actions performed by the user on a network. It keeps track of who, when, how, what the users access the network. It helps in identifying authorized and unauthorized actions.

Wireless Security

Honeypots

  • A network-attached system used as a trap for cyber-attackers to detect and study the types of attacks used by hackers.
  • It acts as a potential target on the internet and informs the defenders about any unauthorized attempt to the information system.
  • Mostly used by large companies and organizations.
  • The cost of a honeypot is generally high because it requires specialized skills and resources to implement.
  • A honeynet is a combination of two or more honeypots on a network.
    enter image description here

Classified based on their deployment and the involvement.

  • Research honeypots- These are used by researchers to analyze hacker attacks and deploy different ways to prevent these attacks.

  • Production honeypots- Production honeypots are deployed in production networks along with the server. Act as a frontend trap.

Based on interaction

  1. Low interaction honeypots: Gives little insight & control to the hacker about the network. It simulates frequently requested services.
  2. Medium Interaction Honeypots: Certain activities and are designed to give certain responses.
  3. High Interaction honeypots: Large no. of services, trying to get complete information about the hackers.

Traffic Flow Security

Hide the traffic levels across an IT infrastructure.

The idea behind traffic-flow security is to make it impossible for external observers to see whether traffic is changing in real time, or when any individual message goes from one location to another.

Methods - Use dummy traffic, Encrypt actual messages. Send a continuous encrypted signal even when a network is not being used.

Necessary to hide traffic on a platform where knowledge of access times and traffic levels could be used inappropriately by an outside observer.

2. Firewalls

Introduction

  • A network security device, either hardware or software-based, which monitors all incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or drops that specific traffic.

enter image description here

Working

Firewall matches the traffic against the rule set defined in its table. Once the rule is matched, associate action is applied to the network traffic.

For example, HR department cannot access the data from code server and system administrator can access the data from both HR and technical department.

Outgoing and Incomming Traffic rules are set separately.

Default policy: It is very difficult to explicitly cover every possible rule on the firewall. For this reason, the firewall must always have a default policy. Default policy only consists of action (accept, reject or drop).

If default policy on the firewall is set to accept, then any computer outside of your office can establish an SSH connection to the server. Therefore, setting default policy as drop (or reject) is always a good practice.

Design

Requirements, Outlining Policies, Deployment Location

Types of Firewalls

enter image description here

  • Host- based Firewalls : Host-based firewall is installed on each network node which controls each incoming and outgoing packet. It is a software application or suite of applications, comes as a part of the operating system. Host-based firewalls are needed because network firewalls cannot provide protection inside a trusted network.

  • Network-based Firewalls : It works on network level. In other words, these firewalls filter all incoming and outgoing traffic across the network. It protects the internal network by filtering the traffic using rules defined on the firewall. A network-based firewall is usually a dedicated system with proprietary software installed, or might have two or more network interface cards(NIC).

  1. Packet Filtering – Also known as static firewall. Monitors outgoing & incoming packets thus pass or halt based on the source and destination Internet Protocol (IP) addresses, protocols, and ports.

  2. Stateful Inspection– Also called dynamic packet filtering. Monitors how data packets move through a firewall and Inspect that if the packet belongs to a particular session or not. Block if not.

  3. Application Level Gateway – Also called Proxy Firewall. Examine application layer information like an HTTP request. If finds some suspicious application it gets blocked right away.

  4. Next-generation Firewalls – Also called intelligent firewalls. Performs all the task performed by firewalls mentioned above, with additional features like application awareness, intrusion prevention, and cloud-delivered threat intelligence.

  5. Circuit-level gateways – A circuit-level gateway is a firewall that provides User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) connection security.

  6. Software Firewall – Type of computer software that runs on our computers. It protects our system in real time by notifying us about the danger if occur.

  7. Hardware Firewall – Physical appliance that is deployed to enforce a network boundary.

  8. Cloud Firewall – FaaS(Firewall As A Service). Cloud-deployed network devices. Unlike traditional firewalls, a cloud firewall filters data at the cloud level.

Personal Firewalls

A software application that shields internet users from potential hackers by permitting or denying network traffic to and from their computer and warning them about attempted intrusions. It’s like a filter between the Internet and your network.

Example : McAfee LiveSafe, Kaspersky Internet Security, Bitdefender Internet Security.

IDS

Introduction

Intruder(person who tries to gain unauthorized access over network with criminal intention) - Intrusion - IDS(Intrusion Detection System)
Outside Intruder(Masquerader)
Inside Intruder(Misfeasor) - Misusing the privelleges granted. “Dagabaazz”

enter image description here

Methods

  1. Signature Based IDS - Detect attacks comparing with database of attack pattern. Cannot identify new attack.
  2. Anamoly Based IDS - System Administor sets the access to various roles. Deviation from normal behaviour/base line.

Classification

  1. NIDS(Network Based) - Deployed within a network to Monitors, Capture, Analyze network traffic continuously and detects malicious data packets. How - Matches the traffic with library of known attacks. Very difficult to analyse in big and busy network.
  2. HIDS(Host Based) - Installed on individual host or device network. Monitors data packets from device only. How - Snapshot, comparing existing system with previous system checking files detected or modified.
  3. PIDS(Protocol Based) - Monitoring HTTPS protocol stream.
  4. APIDS(Application Protocol Based) - Identifies the intrusions by monitoring and interpreting the communication on application-specific protocols. SQL protocol detection as middleware.
  5. HIDS(Hybrid) - host agent or system data is combi/ned. Prelude

3. Email Security

Definition

  • Techniques for protecting email accounts, (acc mey kya hai) content, and communication(karta kya hai) against unauthorized access, loss, compromise (each one above) and to prevent the spread spam and phishing attacks.

Why

  • Email is open and accessible as possible. Thus, the security of email, on its own, is not reliable.
  • Hence, attackers try to take advantage of the lack of email security to carry out their attacks. Commonly attackers use deceptive messages to entice recipients and to gain sensitive information.
  • Since most organizations rely on email to do business, attackers exploit email in an attempt to steal sensitive information.

Common Attacks

  • Phishing: When a fake webpage is sent to victim to collect credentials.
  • Malware: Deliverin spyware, scareware, adware via email, or any other malicious code.
  • Account takeover: Attackers take over email inboxes from legitimate users.
  • Email interception: Attackers can intercept emails in order to steal or monitor the information they contain.

Common Preventions

  • Email security policies as removing executable content from emails.
  • Sending suspicious content to a sandboxing tool for detailed analysis.
  • Implementing automated email encryption.
  • One of the first best practices is implementing a secure email gateway (It scans and processes all incoming and outgoing email) and makes sure that threats are not allowed in.
    enter image description here

PGP

Introduction

  • PGP stands for Pretty Good Privacy, invented by Phil Zimmermann.
  • Designed to provide four security aspects i.e., Privacy, Integrity, Authentication, and Non-Repudiation in the sending of email. πŸš€PIAN
  • It is Open source and freely available software package for email security.
  • It provides compression by using the ZIP algorithm, and EMAIL compatibility using the radix-64 encoding scheme.

Working

Uses one hash function, one secret key, and two private-public key pairs.

Sender (A)

enter image description here

Reciever (B)

enter image description here

Explanation Example

Advantages

  • Integrity - H
  • Privacy & Authentication - B’s Public Key
  • Non-Repudiation - This System
  • PGP provides authentication through the use of Digital Signature.
  • Provides confidentiality through the use of symmetric block encryption.
  • Combination of secret key encryption and public key encryption to provides privacy.
  • Very strong encryption.

Disadvantages

  • Admin Issues The different versions of PGP complicate the administration.
  • Compatibility issues Both the sender and the receiver must have compatible versions of PGP. Both having different version, can’t be read.
  • Complexity PGP is a complex technique, hybrid approach that implements symmetric encryption with two keys. Less familiar than the traditional symmetric or asymmetric methods.
  • No Recovery: No forget password. PGP does not offer such a special program for recovery; encryption methods are very strong so, it does not retrieve the forgotten passwords results in lost messages or lost files.

S/MIME

Introduction

  • Stands for Secure/ Multipurpose Internet Mail Extensions (S/MIME).
  • A standard that adds an additional layer of security and encrypts the data shared via email, uses cryptography to digitally sign and encrypt to prevent unauthorized access to the data in the email.

Two Features

Includes two security features:

  • Message Privacy & Integrity(Via Encrypting Emails) - Encrypted emails are readable only by the intended recipient.

Encryption using recipient’s public key.

enter image description here

Decryption using recipient’s private key.

enter image description here

  • Digital Signature - It is to validate the sender, it digitally signs the emails sent between two S/MIME enabled users to eliminate any risk of spoofing.

Sender Validation - Digital signatures are unique to each user. Thus, it allows the recipient to verify if the email is actually sent by the person who it appears from. This eliminates the risk of anyone spoofing of your email address.

Non-Repudiation - The uniqueness of the digital signature ensures that the author of the email will not be able to deny ownership of the emails. Claims of impersonation can easily be refuted.

enter image description here

enter image description here

PGP vs S/MIME

Stands for.
Diffie Hellman | Elgamal digital signature is used.
Costlier | Cheaper
4096 | 1024 Public Keys
Protexts text message | data as well.

Comments