Network Security. A Quick Overview. Joshua Hill josh-web@untruth.org http://www.untruth.org



Similar documents
NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

IINS Implementing Cisco Network Security 3.0 (IINS)

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Using BroadSAFE TM Technology 07/18/05

CISCO IOS NETWORK SECURITY (IINS)

VPN. Date: 4/15/2004 By: Heena Patel

How To Protect Your Network From Attack

Tim Bovles WILEY. Wiley Publishing, Inc.

United States Trustee Program s Wireless LAN Security Checklist

CCNA Security 2.0 Scope and Sequence

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CTS2134 Introduction to Networking. Module Network Security

Developing Network Security Strategies

Chapter 10. Network Security

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

CMPT 471 Networking II

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

8. Firewall Design & Implementation

Lecture 17 - Network Security

Implementing Cisco IOS Network Security

Network Access Security. Lesson 10

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

ITL BULLETIN FOR JANUARY 2011

Client Server Registration Protocol

Network Security Topologies. Chapter 11

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Network Security Technology Network Management

McAfee Firewall Enterprise 8.2.1

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview. SSL Cryptography Overview CHAPTER 1

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Networking Devices. Lesson 6

Case Study for Layer 3 Authentication and Encryption

SSL A discussion of the Secure Socket Layer

McAfee Firewall Enterprise 8.3.1

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

Standard: Event Monitoring

Information Security Basic Concepts

Chap. 1: Introduction

Network Security Part II: Standards

Secure SCADA Network Technology and Methods

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Protocol Rollback and Network Security

CCNA Security v1.0 Scope and Sequence

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab

CS 758: Cryptography / Network Security

Table: Security Services (X.800)

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

CSE/EE 461 Lecture 23

Network System Design Lesson Objectives

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CSCI 454/554 Computer and Network Security. Final Exam Review

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Securing IP Networks with Implementation of IPv6

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Firewall Environments. Name

Bachelor of Information Technology (Network Security)

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Cisco Which VPN Solution is Right for You?

Understanding and evaluating risk to information assets in your software projects

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Application Note. Onsight TeamLink And Firewall Detect v6.3

GE Measurement & Control. Cyber Security for NEI 08-09

Chapter 37. Secure Networks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Security vulnerabilities in the Internet and possible solutions

Lecture 9: Application of Cryptography

Securing Data on Microsoft SQL Server 2012

Firewalls, Tunnels, and Network Intrusion Detection

EXAM questions for the course TTM Information Security May Part 1

Latest IT Exam Questions & Answers

Security Goals Services

Cornerstones of Security

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

TABLE OF CONTENTS NETWORK SECURITY 2...1

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Fundamentals of Network Security - Theory and Practice-

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Transcription:

Network Security A Quick Overview Joshua Hill josh-web@untruth.org http://www.untruth.org

Security Engineering What is Security Engineering? "Security Engineering is about building systems to remain dependable in the face of malice, error or mischance." -- Ross Anderson

Goals What are the goals of security engineering? Depends on system Traditionally things like: confidentiality, data integrity, entity authentication, message authentication, signatures, authorization, validation, access control, certification, timestamping, witnessing, receipt, confirmation, ownership, anonymity, non-repudiation, revocation, assurance...

Assurance: What you say? Security Actual resistance to attack What sort of attack? What sort of attacker? Complex to quantify (intangible) Assurance Degree of belief that Security level is correct. Also intangible

Snake Oil, Inc. Ridiculous claims One Time Pad! 1,000,000 bit keys! Completely Unbreakable! Revolutionary! Inverse N-dimensional permutation matrix routed through the exhaust manifold and the main deflector dish, with a twist of lemon. No assurance at all. Secret/Unevaluated/Under-evaluated systems

Assurance for Dummies (Competent) Peer Review Standards Compliance Common Criteria FIPS PUBS FIPS 140-2, FIPS 180-2, FIPS 186-2... Good Practice Independent Evaluation

OK... So Now What? How can the general system security goals be satisfied in reasonable (verifiable/quantifiable) ways, particularly in distributed settings? Generally a Hard Problem Good understanding of the problem and security engineering is important

Security Engineering Patterns Simplicity Complete Mediation Separation of Privilege Least Privilege Least Common Mechanism Defense in Depth Open Design Auditability Physiological Acceptability

Policy Auditability CONOPS Security Policy Corporate Network Design Documentation Procedure Administration

Network Security Policy What are the Security Domains? What are the rules for each domain? What connections are allowed? What sort of information exchange is permitted? How can security domains interact?

NSP Application How can it be applied? Architecturally Network Design should make domains natural Device/Host configuration should be consistent with NSP Enforcement of the NSP Firewalls Verification of the NSP IDSes Where? Most critical at Security Domain Boundaries

Network Design Ethernet Hubs 1 Collision Domain / 1 Broadcast Domain No security benefit Ethernet Switches (Normal) Multiple Collision Domains / 1 Broadcast Domain Limited security benefit Ethernet Switches (VLAN) Multiple Collision / Broadcast Domains Limited security benefit Routers Multiple Collision / Broadcast Domains Multiple independent segments Reasonable security segmentation

Firewalls Stateless (basic packet filter) Complex rulesets Simplest design Least granularity Stateful Basic Understands some underlying protocols More symbolic (generally simpler) rulesets Moderate Complexity Proxy Most control over traffic Most complex Understands all protocols in use

Host based IDSes Analysis of host logging information Network based Network monitoring (sniffing) Interactions with switches

Common Failures Switches as security devices Incorrectly placed firewalls Misplaced trust in IDSes Logging trauma Lack of understanding of underlying protocols

Trust Management System design in terms of trust Extending trust Policy/Procedures Laws/Regulation Technical Solutions

Technical Measures Cryptography can help Has primitives to help establish Confidentiality Data integrity Authentication Non-repudiation

Cryptographic Primitives Random number generation Stream ciphers Block ciphers Public key encryption Cryptographic hash functions MACs Public key signatures

Trust Extension Each primitive has a set of attributes Primitives are used in a Security Protocol Security Protocol can be used to extend trust in various ways

SSL/TLS Client has: CA public certificate Possibly client certificate Server has: Server certificate Trust relationships Client and Server trust CA Client Trusts Real Server Server may trust Client Trust is extended through RNGs, Hashes, PK Signatures, PK encryption, Block (or stream) ciphers, MACs

IPSec/IKE Endpoints have Authentication data (various sorts) Trust relationships Endpoints trust each other Endpoints trust authentication data (and associated infrastructure) Trust is extended through RNGs, Hashes, MACs, Block Ciphers Other Stuff for IKE

There and Back Again A Packet s Tale VPNs attempt to emulate trusted connections Can encapsulate complete packets Can provide confidentiality, data authentication Virtual trusted piece of wire

Crypto-Modules Offer crypto-in-a-box Can be more secure than integrated crypto Smaller More fully evaluated Can be leveraged to make big, complex systems more secure

Quantifying Security What sort of attackers? How well funded are they? What resources do they have access to? How risk adverse are they? How much time do they have? Where in the system do they start? What expertise/information do they have?

Attacker Modeling Computationally unbounded (IT model) Computationally bounded Monetarily / Time bounded

General Analysis Risk Analysis Attack Trees

Summary Security is Hard It is intangible It is complex Its goals are difficult to define Assurance is often ignored There are several Techniques to help Network security is even more hard and complex