Title: Network Security
 1Chapter 13
  2Objectives
- Understand the many processes involved with the 
 development of a comprehensive security policy
 and security architecture
- Understand the importance of a well-developed and 
 implemented security policy and associated people
 processes to effective security technology
 implementation
3Business Impact
- Impact on business when network security is 
 violated by on-line thieves ?
- According to federal law enforcement estimates in 
 USA, more than  10 billion worth of data is
 stolen annually in the US only
- In a single incident, 60,000 credit and calling 
 card numbers were stolen
- 50  of computer crimes are committed by a 
 companys current or ex-employee
4Security Policy DevelopmentLife Cycle 
 5Identification of Business-related security issues
- Security requirement assessment 
- What do we have to lose? 
- What do we have worth stealing? 
- Where are the security holes in our business 
 processes?
- How much can we afford to lose? 
- How much can we afford to spend on network 
 security?
6Analysis of Risks, Threats, Vulnerabilities
- Information asset evaluation  what do you have 
 thats worth protecting ?
- Network architecture documentation  What is the 
 current state of your network?
- How many unauthorized modems are dialing in ? 
- Identify all assets, threats and vulnerabilities 
- Determine risks and create protective measures 
7Architecture and Process Design
- Logical design of security architecture and 
 associated processes
- What must be the required functionality of the 
 implemented technology ?
- What business processes implemented and monitored 
 by people must complement this security
 architecture ?
8Security Technology and Process Implementation
- Choose security technology based on logical 
 design requirements
- Implement all security technology with 
 complementary people process
- Increase overall awareness of network security 
 and implement training
- Design ongoing education process for all 
 employees including senior management
9Audit Impact of Security Technology and Processes
- Ensure that implemented policy and technology are 
 meeting initial goals
- Institute a method to identify exceptions to 
 security policy standards and deal with these
 exceptions swiftly
10Evaluate effectiveness of Current Architecture 
and Processes
- Based on results of ongoing audits, evaluate 
 effectiveness of current policy and architecture
 of meeting high-level goals
- Adjust policy and architecture as required and 
 renew the cycle
11Security Requirements Assessment (SRA)
-  Proper SRA implies that appropriate security 
 processes and technology have been applied for
 any given user groups access to/from any
 potential corporate information resource
12Scope Definition and Feasibility Studies
-  Before proceeding blindly with a security policy 
 development project, it is important to properly
 define the scope or limitations of the project.
- The feasibility study provides and opportunity to 
 gain vital information on the difficulty of the
 security policy development process as well as
 the assets (human and financial) required to
 maintain such a process.
- One of the key issues is deciding on the balance 
 between security and productivity
13Security vs. Productivity Balance 
 14Data/Information Classification
- Unclassified/Public 
- Info. having no restrictions as to storage, 
 transmission, or distribution
- Sensitive 
- Info. whose release could not cause damage to 
 corporation but could cause potential
 embarrassment or measurable harm to individuals,
 e.g. salaries  benefits of employees
- Confidential 
- Info. whose release could cause measurable damage 
 to the corporation, e.g. corporate strategic
 plans, contracts
15Data/Information Classification
- Secret 
- Info. whose release could cause serious damage to 
 a corporation. Trade secrets or engineering
 diagrams are two examples
- Top secret 
- Info. whose release could cause grave or 
 permanent damage. Release of such information
 could literally put a company out of business.
 Secret formulas for key products would be
 considered top secret.
16Assets, Threats, Vulnerabilities, and Risks
- How to define the balance between security and 
 productivity?
- Identify assets 
- Identify threats 
- Identify vulnerabilities 
- Consider the risks 
- Identify risk domains 
- Take protective measures
17Assets
- Corporate property of some value that require 
 varying degrees of protection
- Network security 
- Corporate data 
- Network hardware 
- Software 
- Media to transport  data
18Threats
- Processes or people that pose a potential danger 
 to identified assets.
- Intentional or unintentional, natural, or 
 man-made.
- Network related threats include 
- Hackers 
- Fires 
- Floods 
- Power failures 
- Equipment failures 
- Dishonest employees 
- Incompetent employees 
19Vulnerabilities
- Manner or path by which threats are able to 
 attack assets.
- Can be thought of as weak links in overall 
 security architecture and should be identified
 for every potential threat/asset combination
- Vulnerabilities that have been identified can be 
 blocked
20Risks
- Probability of a particular threat successfully 
 attacking a particular asset in a given amount of
 time via particular vulnerability
- After identifying vulnerabilities, the questions 
 are
- How should a network analyst proceed in 
 developing defenses to these vulnerabilities?
- Which vulnerabilities should be dealt with first? 
- How can a network analyst determine an objective 
 means to prioritize vulnerabilities?
- By considering the risk, network analysts are 
 able to quantify the relative importance of
 threats and vulnerabilities.
21(No Transcript) 
 22Protective measures
- There might exist multiple vulnerabilities 
 (paths) between a given asset and a given threat
- ? multiple protective measures need to be 
 established between given threat/asset
 combinations
- Major categories of protective measures 
- Virus protection 
- Firewalls 
- Authentication 
- Encryption 
- Intrusion Detection 
23Virus Protection
-  A comprehensive virus protection plan must 
 combine policy, people, processes, and technology
 to be effective.
- Most common microcomputer security breach 
- 90 of the organizations surveyed with 500 or 
 more PCs experience at least one virus incident
 per month
- Complete recovery from a virus infections costs 
 and average of 8300 and 44 hours over a period
 of 22 working days.
- In Jan 1998, there were over 16,000 known 
 viruses, with as many as 200 new viruses
 appearing per month
24Virus Categories
-  Virus symptoms, methods of infection, and 
 outbreak mechanisms can vary widely, but all
 viruses share a few common behaviors.
- Most viruses work by infecting other legitimate 
 programs and causing them to become destructive
 or disrupt the system in some other manner.
- Most viruses use some type of replication method 
 to get the virus to spread and infect other
 programs, systems, or networks
- Most viruses need some sort of trigger or 
 activation mechanism to set them off. Viruses may
 remain dormant and undetected for long periods
25Virus Categories
-  Two main types 
- Time bombs 
- Logic bombs 
- File infectors 
- System/boot infectors 
- Multipartite viruses 
- Hostile applets 
- E-mail viruses 
- Cluster/File system viruses 
26Antivirus Strategies (AS)
-  Effective AS must include 
- Policy 
- Procedures 
- Technology 
27Antivirus Strategies (AS) Policies and 
procedures 
-  Identify virus infection vulnerabilities and 
 design protective measures
- Install virus scanning software at all points of 
 attacks
- All diskettes must be scanned at a stand-alone 
 scanning PC before being loaded onto network
 attached clients or servers
- All consultants and third party contractors be 
 prohibited from attaching notebook computer to
 the corporate network without scanning
28Antivirus Strategies (AS) Policies and 
procedures 
- All vendors must run demos on their own equipment 
- Shareware/downloaded software should be 
 prohibited or controlled and scanned
- All diagnostic and reference diskettes must be 
 scanned before use
- Write protect all diskettes with .exe, .com files 
- Create a master boot record that disables write 
 to hard drive when booting from a diskettes etc.
29Antivirus Technology
- Viruses can attack 
- Locally or remotely attached client platforms 
- Server platforms 
- Entrance to the corporate network via the 
 Internet
- At each entrance point, viruses must be detected 
 and removed
30Antivirus Technology
- Virus Scanning is the primary method for 
 successful detection and removal
- Software most often work works off a library of 
 known viruses
- New viruses are appearing at approx 200/month 
- Purchase antivirus software which updates virus 
 signatures at least once per month
- Typically, vendors update virus signatures files 
 every 4 hours, with hourly updates expected in
 near future.
31Antivirus Technology
- Emulation technology attempts to detect as yet 
 unknown viruses by running programs with a
 software emulation program known as a virtual PC.
- Proactive rather than reactive 
- Execution program can be examined in a safe 
 environment for any unusual behavior of other
 tell-tale symptoms of resident viruses.
- Advantage identification of potentially unknown 
 viruses based on their behavior rather than by
 relying on identifiable signatures of known
 viruses.
32Antivirus Technology
- Such programs are also capable of trapping 
 encrypted or polymorphic viruses that are capable
 of constantly changing their identities or
 signatures.
- Some of these programs are also self-learning 
- Knowledge of virus-like activity increases with 
 experience.
33Antivirus Technology
- CRC checkers or Hashing checkers create and save 
 unique cyclical redundancy check character or
 hashing number for each file to be monitored
- Each time the file is saved, the new CRC is 
 checked against the reference CRC
- If CRC are different ? file has changed 
- A program evaluates changes to determine a 
 likelihood that changes were caused by a viral
 infection.
- Disadvantage able to detect virus after 
 infection
- Decoys files that are allowed to be infected to 
 detect and report on virus activity.
34Antivirus Technology
- Active content monitor 
- to identify viruses and malicious content such as 
 Java applets or Active X controls that may be
 introduced via Internet connectivity
- Able to examine transmission from the Internet in 
 real time and identify known malicious content
 based on
- contents of reference 
- definition libraries
35(No Transcript) 
 36Firewalls
- When a company links to the Internet, a two-way 
 access point out of as well as into that
 companys confidential information is created
- To prevent unauthorized access from the Internet 
 to companys confidential data, firewall is
 deployed.
- Firewall runs on dedicated server that is 
 connected to, but outside of, the corporate
 network
- All network packets are filtered/examined for 
 authorized access.
- Firewall provides a layer of isolation between 
 inside network and the outside network.
37Firewalls
- Does it provide full protection? No !!, if 
- Dial-up modems access remains uncontrolled or 
 unmonitored
- Incorrectly implemented firewalls my introduce 
 new loopholes
38Firewall Architectures
- No standards for firewall functionality, 
 architectures, or interoperability.
- As a result, user must be especially aware of how 
 firewalls work to evaluate potential firewall
 technology purchase.
- Three architectures 
- Packet filtering 
- Application Gateways 
- Internet Firewalls
39Packet filtering
- Every packet of data on the Internet is uniquely 
 identified by the addresses of source and
 destination addresses.
- Addresses in the header 
- Filter is a program that examines the source and 
 destination address of all incoming packets to
 the firewall server.
- Router are also capable of filtering packets 
- Filter tables are list of addresses whose data 
 packets and embedded messages are either allowed
 or prohibited from proceeding through the
 firewall server and into the corporate network
40Packet filtering
- Packet filter gateways on routers 
- Maintaining filter tables and access rules on 
 multiple routers is not a simple task.
- Packet filtering has limitations in terms of 
 level of security it provides.
- Dedicated packet-filtering firewalls are usually 
 easier to configure
- IP spoofing is used by hackers to breach packet 
 filters
- Hacker can make a packet appear to come from an 
 authorized/trusted IP address.
41Application Level Filters (ALFs)
- Also known as 
- Application gateways 
- Assured pipelines 
- Proxies 
- Go beyond port level filters in their attempts to 
 prevent unauthorized access.
- Port level filters determine the legitimacy of 
 the party asking for information
- ALFs ensure the validity of what they are asking 
 for.
42Application Level Filters (ALFs)
- Circuit-level proxies provide proxy services for 
 transport layer protocols such as TCP.
- Socks creates a proxy data channel to the 
 application server on behalf of the application
 client
- Socks can control traffic by disabling or 
 enabling communication according to TCP port
 numbers
- Sock4  allows outgoing firewall applications 
- Sock5  supports both incoming and outgoing 
 firewall applications as well as authentication
43Application Level Filters (ALFs)
- Internal firewalls  the need 
- 60 of the network attacks are made by internal 
 users
- Disgruntled employees, former employees etc. are 
 responsible for 568 of 600 incidents of network
 hacking
- 30 of Internet sites that reported breaches had 
 firewalls in place.
- Internal firewalls are a new category of software 
 to handle internal attacks.
- Filters that work on the datalink, network, and 
 application layers to examine communications on
 coroprate internal network.
44Authentication and Access Control
- The overall purpose of Authentication is toe 
 ensure that users attempting to gain access to
 networks are really who they claim to be.
- Password protection  no longer sufficient. More 
 is needed
- Variety of Authentication Technology (AT) 
 developed to ensure authentication. Products fall
 into three main categories.
45Authentication and Access Control
- The categories are 
- What you know AT that delivers single sign-on 
 (SSO) access to multiple network-attached servers
 and resources via passwords.
- TrustBroker from CyberSafe 
- PassGo SSO from Axent Technologies 
- Global Sign On from IBM 
- What you have AT that uses one-time or session 
 passwords to authenticate user. This AT requires
 the user to possess some type of smart card or
 other token authentication device to generate
 these single use passwords
46Authentication and Access Control
- What you are AT that validates users based on 
 some physical characteristic such as finger
 prints, hand geometry, retinal scans etc.
47Token Authentication (TAu)  Smart Cards
- This technology provides one-time-use session 
 passwords that are authenticated by associated
 server software. TAu may take multiple forms
- HW based smart cards that are about the size of a 
 credit card with a numeric keypad.
- In-line TAu devices that connect to the serial 
 port of a computer for dial-in authentication
 thru a modem
- SW tokens that are installed on client PC and 
 authenticate with the server portion of the token
 authentication product transparently to the end
 user. PIN is required to activate authentication
 process
48Biometric Authentication (BA)
- BA can authenticate users based on 
- finger prints 
- palm prints 
- retinal patterns 
- hand geometry 
- facial geometry 
- voice recognition 
- Other physical characteristics 
- Not yet perfect or fool proof. 
- False rejects  BA device comparison algorithm 
 configured very sensitive
- False Accepts - BA device comparison algorithm 
 not detailed enough
49Authorization
- Can be seen as subset of authentication 
- Authorization ensures that only properly 
 authorized users are able to access particular
 network resources or corporate information
 resources
- The authorization security software can be either 
 
- Server based  also known as brokered 
 authorization
- Work-station based  also known as trusted node.
50Kerberos
- Probably the most well-known combination of 
 authentication/ authorization software
- Architecture consists of three key components 
- Kerberos client software 
- Kerberos authentication server software 
- Kerberos application server software