APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)



Similar documents
Network Security Fundamentals

Internet and Network Security Fundamentals

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

CS5008: Internet Computing

How To Understand And Understand The Security Of A Key Infrastructure

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

General Network Security

(d-5273) CCIE Security v3.0 Written Exam Topics

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Security vulnerabilities in the Internet and possible solutions

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Chapter 10. Network Security

Computer Networks. Secure Systems

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Networking: EC Council Network Security Administrator NSA

Security + Certification (ITSY 1076) Syllabus

Network Access Security. Lesson 10

Exam Questions SY0-401


Chapter 8 Security Pt 2

IINS Implementing Cisco Network Security 3.0 (IINS)

Securing Cisco Network Devices (SND)

Chapter 7 Transport-Level Security

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

A Very Incomplete Diagram of Network Attacks

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Network Security. Lecture 3

CCIE Security Written Exam ( ) version 4.0

Domain 6.0: Network Security

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Chapter 1 Network Security

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

CTS2134 Introduction to Networking. Module Network Security

Introduction to Computer Security

Implementing Cisco IOS Network Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Overview. Protocols. VPN and Firewalls

EXAM questions for the course TTM Information Security May Part 1

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Post-Class Quiz: Telecommunication & Network Security Domain

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Firewalls, Tunnels, and Network Intrusion Detection

Transport Level Security

Chapter 8 Phase3: Gaining Access Using Network Attacks

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Description: Objective: Attending students will learn:

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Securing IP Networks with Implementation of IPv6

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Introduction to Computer Security

Computer security Lecture 9

Case Study for Layer 3 Authentication and Encryption

Cornerstones of Security

Chapter 32 Internet Security

Chapter 17. Transport-Level Security

How To Pass A Credit Course At Florida State College At Jacksonville

Network Security Essentials Chapter 5

Gigabit SSL VPN Security Router

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Bypassing PISA AGM Theme Seminar Presented by Ricky Lou Zecure Lab Limited

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CS 4803 Computer and Network Security

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

A S B

Virtual Private Networks

Network Security Tutorial

Network Security and Firewall 1

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

CISCO IOS NETWORK SECURITY (IINS)

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Application Note: Onsight Device VPN Configuration V1.1

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Internet Security and the Advantages of Different Models

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Cisco CCNP Implementing Secure Converged Wide Area Networks (ISCW)

Transcription:

APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10)

Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing & Switching IPv6 DNS/DNSSEC Internet Resource Mgmt Network Security For technical assistance refer to: http://www.apnic.net/elearningsupport Reminder: please take time to fill-up the survey Acknowledgement to Cisco Systems

1 Goals of Information Security Confidentiality Integrity Availability prevents unauthorized use or disclosure of information safeguards the accuracy and completeness of information authorized users have reliable and timely access to information SECURITY

Why Security? The Internet was initially designed for connectivity Trust assumed We do more with the Internet nowadays Security protocols are added on top of the TCP/IP Fundamental aspects of information must be protected Confidential data Employee information Business models Protect identity and resources We can t keep ourselves isolated from the Internet Most business communications are done online We provide online services We get services from third-party organizations online

Attacks on Different Layers Application Presentation Session Transport Network Data Link Physical OSI Reference Model Layer 5: SMB, NFS, Socks Layer 2: PPTP, Token Ring Application Layer 7: DNS, DHCP, HTTP, FTP, IMAP, LDAP, NTP, Radius, SSH, SMTP, SNMP, Telnet, TFTP DNS Poisoning, Phishing, SQL injection, Spam/Scam Transport Layer 4: TCP, UDP TCP attacks, Routing attack, SYN flooding, Sniffing Layer 3: IPv4, IPv6, ICMP, Internet IPSec Ping/ICMP Flood Network Access ARP spoofing, MAC flooding TCP/IP Model

TCP Attacks Exploits the TCP 3-way handshake Attacker sends a series of SYN packets without replying with the ACK packet Finite queue size for incomplete connections SYN SYN+ACK ACK CONNECTION ESTABLISHED Server

TCP Attacks Exploits the TCP 3-way handshake Attacker sends a series of SYN packets without replying with the ACK packet Finite queue size for incomplete connections SYN SYN+ACK Attacker ACK? Server (Victim) OPEN CONNECTIONS

DNS Cache Poisoning 1 I want to access www.example.com 3 www.example.com 192.168.1.99 QID=64569 QID=64570 QID=64571 match! (pretending to be the authoritative zone) Client 2 DNS Caching Server QID=64571 Root/GTLD QID=64571 www.example.com 192.168.1.1 3 Webserver (192.168.1.1) ns.example.com

1 Common Types of Attack Ping sweeps and port scans - reconnaissance Sniffing capture packet as they travel through the network Man-in-the-middle attack intercepts messages that are intended for a valid device Spoofing - sets up a fake device and trick others to send messages to it Hijacking take control of a session Denial of Service (DoS) and Dynamic DoS (DDoS)

Trusted Network Standard defensive-oriented technologies Firewall first line of defense Intrusion Detection Build TRUST on top of the TCP/IP infrastructure Strong authentication Two-factor authentication something you have + something you know Public Key Infrastructure (PKI)

Access Control Access control - ability to permit or deny the use of an object by a subject. It provides 3 essential services (known as AAA): Authentication (who can login) Authorization (what authorized users can do) Accountability (identifies what a user did)

Cryptography Has evolved into a complex science in the field of information security Encryption process of transforming plaintext to ciphertext using a cryptographic key Symmetric key cryptography uses a single key to both encrypt and decrypt information. Also known as private key. Includes DES, 3DES, AES, IDEA, RC5 Asymmetric key cryptography separate keys for encryption and decryption (public and private key pairs) Includes RSA, Diffie-Hellman, El Gamal

2 Cryptography Plaintext ENCRYPTION ALGORITHM Ciphertext DECRYPTION ALGORITHM Plaintext Encryption Key Decryption Key Symmetric Key Cryptography Shared Key Shared Key Asymmetric Key Cryptography Public Key Private Key

Public Key Infrastructure Combines public key cryptography, digital signatures, to ensure confidentiality, integrity, authentication, nonrepudiation, and access control Digital certificate basic element of PKI; secure credential that identifies the owner Components: Certificate Authority (CA), Registration Authority (RA), repository, archive

Security on Different Layers Application Presentation Session Transport Network Data Link Physical Layer 7: DNS, DHCP, HTTP, FTP, IMAP, LDAP, NTP, Radius, SSH, SMTP, SNMP, Telnet, TFTP DNS HTTPS, Poisoning, DNSSEC, Phishing, PGP, SQL SMIME injection, Layer 5: Spam/Scam SMB, NFS, Socks Layer 4: TCP, UDP Layer 3: IPv4, IPv6, ICMP, IPSec Ping/ICMP IPSecFlood Layer 2: VTP, PPTP, Token Ring TCP attacks, TLS, SSL, Routing SSH attack, SYN flooding, Sniffing ARP IEEE 802.1X, spoofing, PPP MAC & PPTP flooding

Virtual Private Network Creates a secure tunnel over a public network Client-to-firewall, router-to-router, firewall-to-firewall VPN Protocol Standards PPTP (Point-to-Point tunneling Protocol) L2F (Layer 2 Forwarding Protocol) L2TP (Layer 2 Tunneling Protocol) IPSec (Internet Protocol Security)

Different Layers of Encryption Application Layer SSL, PGP, SSH, HTTPS Source Destination Network Layer - IPSec Link Layer Encryption

IPSec Provides Layer 3 security Tunnel or Transport mode Tunnel mode entire IP packet is encrypted Transport mode IPSec header is inserted in to the packet Combines different components: Security associations, Authentication headers (AH), Encapsulating security payload (ESP), Internet Key Exchange (IKE) A security context for the VPN tunnel is established via the ISAKMP

Internet Security Protocols Layer 4 security: TLS, SSL, SSH SSL/TLS (Secure Socket Layer / Transport Layer Security) Session-based encryption and authentication for secure communication (prevent eavesdropping) TLS is the IETF standard succeeding SSL Uses RSA asymmetric key system Secure Shell (SSH2) secure channel between devices, replaces telnet and rsh

Security Management Network security is a part of a bigger information security plan Policies vs. Standards vs. Guidelines Must develop and implement comprehensive security policy Minimum password length, frequency of password change Access of devices, host firewalls User creation/deletion process Data signing/encryption Encrypting all communication (remote access) Use of digital certificates Disaster Recovery and Attack Mitigation Plan

Whois Database Public network management database Tracks network resources IP addreses, ASNs, reverse domains, routing Records administrative info Contacts (person/role), authorization (maintainer) All Members must register their resources in the Whois database Must keep records up to date at all times

Questions Please remember to fill out the survey http://surveymonkey.com/s/ apnic-20130320-el1 Slide handouts will be available after completing the survey

APNIC Helpdesk Chat

Thank You! End of Session