SlideShare une entreprise Scribd logo
1  sur  59
CompTIA Security+ Guide to
Network Security Fundamentals,
Fifth Edition
Chapter 7
Network Security Fundamentals
© Cengage Learning 2015CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
Objectives
• List the different types of network security devices
and explain how they can be used
• Explain how network technologies can enhance
security
• Describe secure network design elements
2
© Cengage Learning 2015
Security Through Network Devices
• Layered security
– A defense that uses multiple types of security
devices to protect a network
– Also called defense in depth
• A network with layered security will make it more
difficult for an attacker
– He must have all the tools, knowledge, and skills to
break through the various layers
• Layered network security can be achieved by using
networking devices or hardware designed for
security
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
3
© Cengage Learning 2015
Standard Network Devices
• Security features found in network hardware
– Provide basic level of security
• Network devices can classified based on their
function in the OSI model
– Standards released in 1978, revised in 1983, still
used today
– Illustrates how a network prepares data for delivery
and how data is handled once received
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
4
© Cengage Learning 2015
Standard Network Devices
• OSI model breaks networking steps into seven
layers
– Each layer has different networking tasks
– Each layer cooperates with adjacent layers
• Standard network devices can be classified by the
OSI layer at which they function
• Some devices include:
– Switches, routers, load balancers, and proxies
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
5
© Cengage Learning 2015
Standard Network Devices
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
6
© Cengage Learning 2015
Standard Network Devices
• Switches
– A network switch is a device that connects network
devices together
– Operates at Data Link Layer (Layer 2)
– Can determine which device is connected to each
port
– Can forward frames sent to that specific device
(unicast) or frames sent to all devices (broadcast)
– Uses MAC addresses to identify devices
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
7
© Cengage Learning 2015
Standard Network Devices
• Switches (cont’d)
– An attacker attached to a switch will see only frames
that are directed to that device and not others
– Earlier networks used hubs to connect devices to a
network
• Hubs repeated all frames to all attached network
devices
– Attackers could use a protocol analyzer to capture all
packets
• Protocol analyzers could decode and analyze packet
contents
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
8
© Cengage Learning 2015
Standard Network Devices
• Network administrators should be able to monitor
network traffic
– Helps identify and troubleshoot network problems
• Traffic monitoring methods
– Port mirroring
• Allows administrator to configure the switch to copy
traffic that occurs on some or all ports to a designated
monitoring port on the switch
– Network tap (test access point)
• Separate device installed between two network
devices
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
9
© Cengage Learning 2015
Standard Network Devices
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
10
© Cengage Learning 2015
Standard Network Devices
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
11
© Cengage Learning 2015
Standard Network Devices
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
12
© Cengage Learning 2015
Standard Network Devices
• Routers
– Forward packets across different computer networks
– Operate at Network Layer (Layer 3)
– Can be set to filter out specific types of network
traffic
• Load balancers
– Help evenly distribute work across a network
– Allocate requests among multiple devices
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
13
© Cengage Learning 2015
Standard Network Devices
• Advantages of load-balancing technology
– Reduces probability of overloading a single server
– Optimizes bandwidth of network computers
– Reduces network downtime
• Load balancing is achieved through software or
hardware device (load balancer)
• Load balancers are grouped into two categories:
– Layer 4 load balancers - act upon data found in
Network and Transport layer protocols
– Layer 7 load balancers - distribute requests based on
data found in Application layer protocols
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
14
© Cengage Learning 2015
Standard Network Devices
• Security advantages of load balancing
– Can detect and stop attacks directed at a server or
application
– Can detect and prevent denial-of-service (DoS) and
protocol attacks
– Some can deny attackers information about the
network
• Hide HTTP error pages
• Remove server identification headers from HTTP
responses
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
15
© Cengage Learning 2015
Standard Network Devices
• Proxies - there are several types of proxies used in
computer networking
– Proxy server - a computer or an application program
that intercepts user requests from the internal
network and processes that request on behalf of the
user
– Application-aware proxy - a special proxy server that
“knows” the application protocols that it supports
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
16
© Cengage Learning 2015
Standard Network Devices
• Advantages of proxy servers:
– Increased speed
– Reduced costs
– Improved management
– Stronger security
• Reverse proxy
– Does not serve clients
– Routes incoming requests to the correct server
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
17
© Cengage Learning 2015
Standard Network Devices
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
18
© Cengage Learning 2015
Network Security Hardware
• Specifically designed security hardware devices
– Provide greater protection than standard networking
devices
• Network Firewalls
– Can be software-based or hardware-based
– Both types inspect packets and either accept or deny
entry
– Hardware firewalls are usually located outside the
network security perimeter
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
19
© Cengage Learning 2015
Network Security Hardware
• Methods of firewall packet filtering
– Stateless packet filtering
• Inspects incoming packet and permits or denies based
on conditions set by administrator
– Stateful packet filtering
• Keeps a record of the state of a connection
• Makes decisions based on the connection and
conditions
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
20
© Cengage Learning 2015
Network Security Hardware
• Firewall actions on a packet
– Allow (let packet pass through)
– Drop (prevent the packet from passing into the
network and send no response to sender)
– Reject (prevent the packet from passing into the
network but send a message to the sender)
• Rule-based firewalls
– Use a set of individual instructions to control actions,
called firewall rules
– Each rule is a separate instruction processed in
sequence telling the firewall what action to take
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
21
© Cengage Learning 2015
Network Security Hardware
• Application-Aware Firewalls
– Sometimes called a next-generation firewall (NGFW)
– Operate at a higher level by identifying applications
that send packets through the firewall and make
decisions about actions to take
• Web application firewall
– Special type of application-aware firewall that looks
deeply into packets that carry HTTP traffic
– Can block specific sites or specific types of HTTP
traffic
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
22
© Cengage Learning 2015
Network Security Hardware
• Spam filters
– Enterprise-wide spam filters block spam before it
reaches the host
• Email systems use two protocols
– Simple Mail Transfer Protocol (SMTP)
• Handles outgoing mail
– Post Office Protocol (POP)
• Handles incoming mail
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
23
© Cengage Learning 2015
Network Security Hardware
• Spam filters installed with the SMTP server
– Filter configured to listen on port 25
– Pass non-spam e-mail to SMTP server listening on
another port
– This method prevents SMTP server from notifying
spammer of failed message delivery
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
24
© Cengage Learning 2015
Network Security Hardware
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
25
© Cengage Learning 2015
Network Security Hardware
• Spam filters installed on the POP3 server
– All spam must first pass through SMTP server and
be delivered to user’s mailbox
– Can result in increased costs
• Storage, transmission, backup, deletion
• Third-party entity contracted to filter spam
– All email directed to third-party’s remote spam filter
– E-mail cleansed before being redirected to
organization
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
26
© Cengage Learning 2015
Network Security Hardware
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
27
© Cengage Learning 2015
Network Security Hardware
• Virtual private network (VPN) - enables
authorized users to use an unsecured public
network as if it were a secure private network
– All data transmitted between remote device and
network is encrypted
• Types of VPNs
– Remote-access VPN - a user-to-LAN connection
– Site-to-site - multiple sites can connect to other sites
over the Internet
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
28
© Cengage Learning 2015
Network Security Hardware
• Endpoints
– The end of the tunnel between VPN devices
– Used in communicating VPN transmissions
– May be software on local computer, a VPN
concentrator (hardware device), or integrated into
another networking device
• VPN concentrator - a dedicated hardware device
that aggregates hundreds or thousands of VPN
connections
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
29
© Cengage Learning 2015
Network Security Hardware
• Tunneling protocols enclose a packet within
another packet and are used for VPN
transmissions
• IPsec has two “subprotocols” that are used in VPN:
– Encapsulated Security Payload (ESP)
– Authentication Header (AH)
• A remote-access VPN generally uses either IPsec
or the Layer 2 Tunneling Protocol (L2TP)
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
30
© Cengage Learning 2015
Network Security Hardware
• Internet Content Filters
– Monitor Internet traffic
– Block access to preselected Web sites and files
– Unapproved sites can be restricted based on the
URL (URL filtering) or matching keywords (content
inspection)
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
31
© Cengage Learning 2015
Network Security Hardware
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
32
© Cengage Learning 2015
Network Security Hardware
• Web Security Gateways
– Can block malicious content in real time
– Block content through application level filtering
• Examples of blocked Web traffic
– Adware, spyware
– Cookies
– Instant messengers
– P2P (peer to peer) file sharing
– Script exploits
– TCP/IP malicious code attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
33
© Cengage Learning 2015
Network Security Hardware
• Intrusion detection system (IDS)
– Can detect attack as it occurs
– IDS systems use different methodologies for
monitoring for attacks
– Can be installed on either local hosts or networks
– An extension of IDS is an intrusion prevention
system (IPS)
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
34
© Cengage Learning 2015
Network Security Hardware
• Monitoring methodologies
– Anomaly-based monitoring
• Compares current detected behavior with baseline
– Signature-based monitoring
• Looks for well-known attack signature patterns
– Behavior-based monitoring
• Detects abnormal actions by processes or programs
• Alerts user who decides whether to allow or block
activity
– Heuristic monitoring
• Uses experience-based techniques
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
35
© Cengage Learning 2015
Network Security Hardware
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
36
© Cengage Learning 2015
Network Security Hardware
• Types of IDS - two basic types if IDS exist
• Host intrusion detection system (HIDS)
– A software-based application that can detect an
attack as it occurs
– Installed on each system needing protection
– Monitors:
• System calls and file system access
• Can recognize unauthorized Registry modification
• Host input and output communications
– Detects anomalous activity
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
37
© Cengage Learning 2015
Network Security Hardware
• Disadvantages of HIDS
– Cannot monitor network traffic that does not reach
local system
– All log data is stored locally
– Resource-intensive and can slow system
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
38
© Cengage Learning 2015
Network Security Hardware
• Network intrusion detection system (NIDS)
– Watches for attacks on the network
– NIDS sensors installed on firewalls and routers:
• Gather information and report back to central device
– Passive NIDS will sound an alarm
– An NIDS may use one or more of the evaluation
techniques listed in Table 7-5 (see the following
slide)
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
39
© Cengage Learning 2015
Network Security Hardware
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
40
© Cengage Learning 2015
Network Security Hardware
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
41
• Application-aware IDS
– A specialized IDS
– Capable of using “contextual knowledge” in real time
– It can know the version of the OS or which
application is running
• As well as what vulnerabilities are present in the
systems being protected
© Cengage Learning 2015
Network Security Hardware
• Intrusion Prevention System (IPS)
– Monitors network traffic to immediately block a
malicious attack
– Similar to NIDS
– NIPS is located “in line” on the firewall
– Allows the NIPS to more quickly take action to block
an attack
• Application-aware IPS
– Knows which applications are running as well as the
underlying OS
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
42
© Cengage Learning 2015
Network Security Hardware
• Unified Threat Management (UTM) Security
Appliances
– Network hardware that provides multiple security
functions, such as:
• Antispam, antiphishing, antivirus, and antispyware
• Bandwidth optimization
• Content filtering
• Encryption
• Firewall
• Instant messaging control and web filtering
• Intrusion protection
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
43
© Cengage Learning 2015
Security Through Network
Technologies
• Internet routers normally drop packet with a private
address
• Network address translation (NAT)
– Allows private IP addresses to be used on the public
Internet
– Replaces private IP address with public address
• Port address translation (PAT)
– Variation of NAT
• Outgoing packets given same IP address but different
TCP port number
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
44
© Cengage Learning 2015
Security Through Network
Technologies
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
45
© Cengage Learning 2015
Security Through Network
Technologies
• Advantage of NAT
– Masks IP addresses of internal devices
– An attacker who captures the packet on the Internet
cannot determine the actual IP address of sender
• Network Access Control (NAC)
– Examines current state of system or network device:
• Before allowing the network connection
– Device must meet set of criteria
• If not met, NAC allows connection to a “quarantine”
network until deficiencies corrected
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
46
© Cengage Learning 2015
Security Through Network
Technologies
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
47
© Cengage Learning 2015
Security Through Network Design
Elements
• Elements of a secure network design
– Demilitarized zones
– Subnetting
– Virtual LANs
– Remote access
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
48
© Cengage Learning 2015
Demilitarized Zone (DMZ)
• DMZ - a separate network located outside secure
network perimeter
• Untrusted outside users can access DMZ but not
secure network
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
49
© Cengage Learning 2015
Demilitarized Zone (DMZ)
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
50
© Cengage Learning 2015
Demilitarized Zone (DMZ)
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
51
© Cengage Learning 2015
Subnetting
• An IP address is used to identify a network and a
host on that network
– One part is a network address and one part is a host
address
• Subnetting allows a large network to be divided into
smaller subnets
• Each network can contain several subnets
– Each subnet is connected through different routers
• Each subnet can contain multiple hosts
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
52
© Cengage Learning 2015
Subnetting
• Improves network security by isolating groups of
hosts
• Administrators can utilize network security tools to
make it easier to regulate who has access in and
out of a particular subnetwork
• Allows network administrators to hide the internal
network layout
– Makes it more difficult for attackers to target their
attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
53
© Cengage Learning 2015
Subnetting
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
54
© Cengage Learning 2015
Subnetting
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
55
© Cengage Learning 2015
Virtual LANs (VLAN)
• Allow scattered users to be logically grouped
together
– Even if attached to different switches
• Can isolate sensitive data to VLAN members
• Communication on a VLAN
– If connected to same switch, switch handles packet
transfer
– A special “tagging” protocol is used for
communicating between switches
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
56
© Cengage Learning 2015
Remote Access
• Working away from the office commonplace today
– Telecommuters, traveling sales representatives, and
traveling workers
• Strong security for remote workers must be
maintained
• Remote Access
– Any combination of hardware and software that
enables remote users to access a local internal
network
– Provides same the functionality as local users
through a VPN or dial-up connection
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
57
© Cengage Learning 2015
Summary
• Standard network security devices provide a
degree of security
– Switches, router, load balancer, and proxies
• Hardware devices specifically designed for security
give higher protection level
– Hardware-based firewall, Web application firewall
• Virtual private networks (VPNs) use an unsecured
public network and encryption to provide security
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
58
© Cengage Learning 2015
Summary
• An intrusion detection system (IDS) is designed to
detect an attack as it occurs
• Network technologies can help secure a network
– Network address translation
– Network access control
• Methods for designing a secure network
– Demilitarized zones
– Virtual LANs
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
59

Contenu connexe

Tendances

Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)Netwax Lab
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2Tushar Anand
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentalsThang Man
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentialityCAS
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingVi Tính Hoàng Nam
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesVi Tính Hoàng Nam
 

Tendances (20)

Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Web security
Web securityWeb security
Web security
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Network security
Network securityNetwork security
Network security
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Firewalls
FirewallsFirewalls
Firewalls
 
information security management
information security managementinformation security management
information security management
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
 
Secure Coding and Threat Modeling
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat Modeling
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
 

En vedette

Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 PresentaionAmy McMullin
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 PresentationAmy McMullin
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 ReviewAmy McMullin
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 PresentationAmy McMullin
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 PresentationAmy McMullin
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 PresentationAmy McMullin
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 PresentationAmy McMullin
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08Amy McMullin
 
A+ Chapter 5 Review
A+ Chapter 5 ReviewA+ Chapter 5 Review
A+ Chapter 5 ReviewAmy McMullin
 
A+ Chapter 4 Review
A+ Chapter 4 ReviewA+ Chapter 4 Review
A+ Chapter 4 ReviewAmy McMullin
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceCengage Learning
 
How to hack the web
How to hack the webHow to hack the web
How to hack the webAmy McMullin
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectivessombat nirund
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureInformation Technology
 

En vedette (20)

Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 Review
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 Presentation
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 Presentation
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08
 
A+ Chapter 5 Review
A+ Chapter 5 ReviewA+ Chapter 5 Review
A+ Chapter 5 Review
 
A+ Chapter 4 Review
A+ Chapter 4 ReviewA+ Chapter 4 Review
A+ Chapter 4 Review
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 
hacker culture
hacker culturehacker culture
hacker culture
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
How to hack the web
How to hack the webHow to hack the web
How to hack the web
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 
Ch01
Ch01Ch01
Ch01
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 

Similaire à Chapter 7 Presentation

Similaire à Chapter 7 Presentation (20)

Cyber security Chapter 05 Network Defenses
Cyber security Chapter 05 Network DefensesCyber security Chapter 05 Network Defenses
Cyber security Chapter 05 Network Defenses
 
Lessson 2
Lessson 2Lessson 2
Lessson 2
 
9780840024220 ppt ch08
9780840024220 ppt ch089780840024220 ppt ch08
9780840024220 ppt ch08
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Lessson 3
Lessson 3Lessson 3
Lessson 3
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
 
Firewall
FirewallFirewall
Firewall
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
9780840024220 ppt ch04
9780840024220 ppt ch049780840024220 ppt ch04
9780840024220 ppt ch04
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 
Network security
 Network security Network security
Network security
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Lessson 1
Lessson 1Lessson 1
Lessson 1
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
 

Dernier

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 

Dernier (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 

Chapter 7 Presentation

  • 1. CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 7 Network Security Fundamentals
  • 2. © Cengage Learning 2015CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Objectives • List the different types of network security devices and explain how they can be used • Explain how network technologies can enhance security • Describe secure network design elements 2
  • 3. © Cengage Learning 2015 Security Through Network Devices • Layered security – A defense that uses multiple types of security devices to protect a network – Also called defense in depth • A network with layered security will make it more difficult for an attacker – He must have all the tools, knowledge, and skills to break through the various layers • Layered network security can be achieved by using networking devices or hardware designed for security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 3
  • 4. © Cengage Learning 2015 Standard Network Devices • Security features found in network hardware – Provide basic level of security • Network devices can classified based on their function in the OSI model – Standards released in 1978, revised in 1983, still used today – Illustrates how a network prepares data for delivery and how data is handled once received CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 4
  • 5. © Cengage Learning 2015 Standard Network Devices • OSI model breaks networking steps into seven layers – Each layer has different networking tasks – Each layer cooperates with adjacent layers • Standard network devices can be classified by the OSI layer at which they function • Some devices include: – Switches, routers, load balancers, and proxies CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 5
  • 6. © Cengage Learning 2015 Standard Network Devices CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 6
  • 7. © Cengage Learning 2015 Standard Network Devices • Switches – A network switch is a device that connects network devices together – Operates at Data Link Layer (Layer 2) – Can determine which device is connected to each port – Can forward frames sent to that specific device (unicast) or frames sent to all devices (broadcast) – Uses MAC addresses to identify devices CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 7
  • 8. © Cengage Learning 2015 Standard Network Devices • Switches (cont’d) – An attacker attached to a switch will see only frames that are directed to that device and not others – Earlier networks used hubs to connect devices to a network • Hubs repeated all frames to all attached network devices – Attackers could use a protocol analyzer to capture all packets • Protocol analyzers could decode and analyze packet contents CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 8
  • 9. © Cengage Learning 2015 Standard Network Devices • Network administrators should be able to monitor network traffic – Helps identify and troubleshoot network problems • Traffic monitoring methods – Port mirroring • Allows administrator to configure the switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch – Network tap (test access point) • Separate device installed between two network devices CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 9
  • 10. © Cengage Learning 2015 Standard Network Devices CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 10
  • 11. © Cengage Learning 2015 Standard Network Devices CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 11
  • 12. © Cengage Learning 2015 Standard Network Devices CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 12
  • 13. © Cengage Learning 2015 Standard Network Devices • Routers – Forward packets across different computer networks – Operate at Network Layer (Layer 3) – Can be set to filter out specific types of network traffic • Load balancers – Help evenly distribute work across a network – Allocate requests among multiple devices CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 13
  • 14. © Cengage Learning 2015 Standard Network Devices • Advantages of load-balancing technology – Reduces probability of overloading a single server – Optimizes bandwidth of network computers – Reduces network downtime • Load balancing is achieved through software or hardware device (load balancer) • Load balancers are grouped into two categories: – Layer 4 load balancers - act upon data found in Network and Transport layer protocols – Layer 7 load balancers - distribute requests based on data found in Application layer protocols CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 14
  • 15. © Cengage Learning 2015 Standard Network Devices • Security advantages of load balancing – Can detect and stop attacks directed at a server or application – Can detect and prevent denial-of-service (DoS) and protocol attacks – Some can deny attackers information about the network • Hide HTTP error pages • Remove server identification headers from HTTP responses CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 15
  • 16. © Cengage Learning 2015 Standard Network Devices • Proxies - there are several types of proxies used in computer networking – Proxy server - a computer or an application program that intercepts user requests from the internal network and processes that request on behalf of the user – Application-aware proxy - a special proxy server that “knows” the application protocols that it supports CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 16
  • 17. © Cengage Learning 2015 Standard Network Devices • Advantages of proxy servers: – Increased speed – Reduced costs – Improved management – Stronger security • Reverse proxy – Does not serve clients – Routes incoming requests to the correct server CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 17
  • 18. © Cengage Learning 2015 Standard Network Devices CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 18
  • 19. © Cengage Learning 2015 Network Security Hardware • Specifically designed security hardware devices – Provide greater protection than standard networking devices • Network Firewalls – Can be software-based or hardware-based – Both types inspect packets and either accept or deny entry – Hardware firewalls are usually located outside the network security perimeter CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 19
  • 20. © Cengage Learning 2015 Network Security Hardware • Methods of firewall packet filtering – Stateless packet filtering • Inspects incoming packet and permits or denies based on conditions set by administrator – Stateful packet filtering • Keeps a record of the state of a connection • Makes decisions based on the connection and conditions CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 20
  • 21. © Cengage Learning 2015 Network Security Hardware • Firewall actions on a packet – Allow (let packet pass through) – Drop (prevent the packet from passing into the network and send no response to sender) – Reject (prevent the packet from passing into the network but send a message to the sender) • Rule-based firewalls – Use a set of individual instructions to control actions, called firewall rules – Each rule is a separate instruction processed in sequence telling the firewall what action to take CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 21
  • 22. © Cengage Learning 2015 Network Security Hardware • Application-Aware Firewalls – Sometimes called a next-generation firewall (NGFW) – Operate at a higher level by identifying applications that send packets through the firewall and make decisions about actions to take • Web application firewall – Special type of application-aware firewall that looks deeply into packets that carry HTTP traffic – Can block specific sites or specific types of HTTP traffic CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 22
  • 23. © Cengage Learning 2015 Network Security Hardware • Spam filters – Enterprise-wide spam filters block spam before it reaches the host • Email systems use two protocols – Simple Mail Transfer Protocol (SMTP) • Handles outgoing mail – Post Office Protocol (POP) • Handles incoming mail CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 23
  • 24. © Cengage Learning 2015 Network Security Hardware • Spam filters installed with the SMTP server – Filter configured to listen on port 25 – Pass non-spam e-mail to SMTP server listening on another port – This method prevents SMTP server from notifying spammer of failed message delivery CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 24
  • 25. © Cengage Learning 2015 Network Security Hardware CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 25
  • 26. © Cengage Learning 2015 Network Security Hardware • Spam filters installed on the POP3 server – All spam must first pass through SMTP server and be delivered to user’s mailbox – Can result in increased costs • Storage, transmission, backup, deletion • Third-party entity contracted to filter spam – All email directed to third-party’s remote spam filter – E-mail cleansed before being redirected to organization CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 26
  • 27. © Cengage Learning 2015 Network Security Hardware CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 27
  • 28. © Cengage Learning 2015 Network Security Hardware • Virtual private network (VPN) - enables authorized users to use an unsecured public network as if it were a secure private network – All data transmitted between remote device and network is encrypted • Types of VPNs – Remote-access VPN - a user-to-LAN connection – Site-to-site - multiple sites can connect to other sites over the Internet CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 28
  • 29. © Cengage Learning 2015 Network Security Hardware • Endpoints – The end of the tunnel between VPN devices – Used in communicating VPN transmissions – May be software on local computer, a VPN concentrator (hardware device), or integrated into another networking device • VPN concentrator - a dedicated hardware device that aggregates hundreds or thousands of VPN connections CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 29
  • 30. © Cengage Learning 2015 Network Security Hardware • Tunneling protocols enclose a packet within another packet and are used for VPN transmissions • IPsec has two “subprotocols” that are used in VPN: – Encapsulated Security Payload (ESP) – Authentication Header (AH) • A remote-access VPN generally uses either IPsec or the Layer 2 Tunneling Protocol (L2TP) CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 30
  • 31. © Cengage Learning 2015 Network Security Hardware • Internet Content Filters – Monitor Internet traffic – Block access to preselected Web sites and files – Unapproved sites can be restricted based on the URL (URL filtering) or matching keywords (content inspection) CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 31
  • 32. © Cengage Learning 2015 Network Security Hardware CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 32
  • 33. © Cengage Learning 2015 Network Security Hardware • Web Security Gateways – Can block malicious content in real time – Block content through application level filtering • Examples of blocked Web traffic – Adware, spyware – Cookies – Instant messengers – P2P (peer to peer) file sharing – Script exploits – TCP/IP malicious code attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 33
  • 34. © Cengage Learning 2015 Network Security Hardware • Intrusion detection system (IDS) – Can detect attack as it occurs – IDS systems use different methodologies for monitoring for attacks – Can be installed on either local hosts or networks – An extension of IDS is an intrusion prevention system (IPS) CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 34
  • 35. © Cengage Learning 2015 Network Security Hardware • Monitoring methodologies – Anomaly-based monitoring • Compares current detected behavior with baseline – Signature-based monitoring • Looks for well-known attack signature patterns – Behavior-based monitoring • Detects abnormal actions by processes or programs • Alerts user who decides whether to allow or block activity – Heuristic monitoring • Uses experience-based techniques CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 35
  • 36. © Cengage Learning 2015 Network Security Hardware CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 36
  • 37. © Cengage Learning 2015 Network Security Hardware • Types of IDS - two basic types if IDS exist • Host intrusion detection system (HIDS) – A software-based application that can detect an attack as it occurs – Installed on each system needing protection – Monitors: • System calls and file system access • Can recognize unauthorized Registry modification • Host input and output communications – Detects anomalous activity CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 37
  • 38. © Cengage Learning 2015 Network Security Hardware • Disadvantages of HIDS – Cannot monitor network traffic that does not reach local system – All log data is stored locally – Resource-intensive and can slow system CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 38
  • 39. © Cengage Learning 2015 Network Security Hardware • Network intrusion detection system (NIDS) – Watches for attacks on the network – NIDS sensors installed on firewalls and routers: • Gather information and report back to central device – Passive NIDS will sound an alarm – An NIDS may use one or more of the evaluation techniques listed in Table 7-5 (see the following slide) CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 39
  • 40. © Cengage Learning 2015 Network Security Hardware CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 40
  • 41. © Cengage Learning 2015 Network Security Hardware CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 41 • Application-aware IDS – A specialized IDS – Capable of using “contextual knowledge” in real time – It can know the version of the OS or which application is running • As well as what vulnerabilities are present in the systems being protected
  • 42. © Cengage Learning 2015 Network Security Hardware • Intrusion Prevention System (IPS) – Monitors network traffic to immediately block a malicious attack – Similar to NIDS – NIPS is located “in line” on the firewall – Allows the NIPS to more quickly take action to block an attack • Application-aware IPS – Knows which applications are running as well as the underlying OS CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 42
  • 43. © Cengage Learning 2015 Network Security Hardware • Unified Threat Management (UTM) Security Appliances – Network hardware that provides multiple security functions, such as: • Antispam, antiphishing, antivirus, and antispyware • Bandwidth optimization • Content filtering • Encryption • Firewall • Instant messaging control and web filtering • Intrusion protection CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 43
  • 44. © Cengage Learning 2015 Security Through Network Technologies • Internet routers normally drop packet with a private address • Network address translation (NAT) – Allows private IP addresses to be used on the public Internet – Replaces private IP address with public address • Port address translation (PAT) – Variation of NAT • Outgoing packets given same IP address but different TCP port number CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 44
  • 45. © Cengage Learning 2015 Security Through Network Technologies CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 45
  • 46. © Cengage Learning 2015 Security Through Network Technologies • Advantage of NAT – Masks IP addresses of internal devices – An attacker who captures the packet on the Internet cannot determine the actual IP address of sender • Network Access Control (NAC) – Examines current state of system or network device: • Before allowing the network connection – Device must meet set of criteria • If not met, NAC allows connection to a “quarantine” network until deficiencies corrected CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 46
  • 47. © Cengage Learning 2015 Security Through Network Technologies CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 47
  • 48. © Cengage Learning 2015 Security Through Network Design Elements • Elements of a secure network design – Demilitarized zones – Subnetting – Virtual LANs – Remote access CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 48
  • 49. © Cengage Learning 2015 Demilitarized Zone (DMZ) • DMZ - a separate network located outside secure network perimeter • Untrusted outside users can access DMZ but not secure network CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 49
  • 50. © Cengage Learning 2015 Demilitarized Zone (DMZ) CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 50
  • 51. © Cengage Learning 2015 Demilitarized Zone (DMZ) CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 51
  • 52. © Cengage Learning 2015 Subnetting • An IP address is used to identify a network and a host on that network – One part is a network address and one part is a host address • Subnetting allows a large network to be divided into smaller subnets • Each network can contain several subnets – Each subnet is connected through different routers • Each subnet can contain multiple hosts CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 52
  • 53. © Cengage Learning 2015 Subnetting • Improves network security by isolating groups of hosts • Administrators can utilize network security tools to make it easier to regulate who has access in and out of a particular subnetwork • Allows network administrators to hide the internal network layout – Makes it more difficult for attackers to target their attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 53
  • 54. © Cengage Learning 2015 Subnetting CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 54
  • 55. © Cengage Learning 2015 Subnetting CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 55
  • 56. © Cengage Learning 2015 Virtual LANs (VLAN) • Allow scattered users to be logically grouped together – Even if attached to different switches • Can isolate sensitive data to VLAN members • Communication on a VLAN – If connected to same switch, switch handles packet transfer – A special “tagging” protocol is used for communicating between switches CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 56
  • 57. © Cengage Learning 2015 Remote Access • Working away from the office commonplace today – Telecommuters, traveling sales representatives, and traveling workers • Strong security for remote workers must be maintained • Remote Access – Any combination of hardware and software that enables remote users to access a local internal network – Provides same the functionality as local users through a VPN or dial-up connection CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 57
  • 58. © Cengage Learning 2015 Summary • Standard network security devices provide a degree of security – Switches, router, load balancer, and proxies • Hardware devices specifically designed for security give higher protection level – Hardware-based firewall, Web application firewall • Virtual private networks (VPNs) use an unsecured public network and encryption to provide security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 58
  • 59. © Cengage Learning 2015 Summary • An intrusion detection system (IDS) is designed to detect an attack as it occurs • Network technologies can help secure a network – Network address translation – Network access control • Methods for designing a secure network – Demilitarized zones – Virtual LANs CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 59

Notes de l'éditeur

  1. CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 7 Network Security Fundamentals
  2. Objectives List the different types of network security devices and explain how they can be used Explain how network technologies can enhance security Describe secure network design elements
  3. Security Through Network Devices Layered security A defense that uses multiple types of security devices to protect a network Also called defense in depth A network with layered security will make it more difficult for an attacker He must have all the tools, knowledge, and skills to break through the various layers Layered network security can be achieved by using networking devices or hardware designed for security
  4. Standard Network Devices Security features found in network hardware Provide basic level of security Network devices can classified based on their function in the OSI model Standards released in 1978, revised in 1983, still used today Illustrates how a network prepares data for delivery and how data is handled once received
  5. Standard Network Devices OSI model breaks networking steps into seven layers Each layer has different networking tasks Each layer cooperates with adjacent layers Standard network devices can be classified by the OSI layer at which they function Some devices include: Switches, routers, load balancers, and proxies
  6. Standard Network Devices Table 7-1 OSI references model
  7. Standard Network Devices Switches A network switch is a device that connects network devices together Operates at Data Link Layer (Layer 2) Can determine which device is connected to each port Can forward frames sent to that specific device (unicast) or frames sent to all devices (broadcast) Uses MAC addresses to identify devices
  8. Standard Network Devices Switches (cont’d) An attacker attached to a switch will see only frames that are directed to that device and not others Earlier networks used hubs to connect devices to a network Hubs repeated all frames to all attached network devices Attackers could use a protocol analyzer to capture all packets Protocol analyzers could decode and analyze packet contents
  9. Standard Network Devices Network administrators should be able to monitor network traffic Helps identify and troubleshoot network problems Traffic monitoring methods Port mirroring Allows administrator to configure the switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch Network tap (test access point) Separate device installed between two network devices
  10. Standard Network Devices Figure 7-1 Port mirroring
  11. Standard Network Devices Figure 7-2 Network tap
  12. Standard Network Devices Table 7-2 Protecting the switch
  13. Standard Network Devices Routers Forward packets across different computer networks Operate at Network Layer (Layer 3) Can be set to filter out specific types of network traffic Load balancers Help evenly distribute work across a network Allocate requests among multiple devices
  14. Standard Network Devices Advantages of load-balancing technology Reduces probability of overloading a single server Optimizes bandwidth of network computers Reduces network downtime Load balancing is achieved through software or hardware device (load balancer) Load balancers are grouped into two categories: Layer 4 load balancers - act upon data found in Network and Transport layer protocols Layer 7 load balancers - distribute requests based on data found in Application layer protocols
  15. Standard Network Devices Security advantages of load balancing Can detect and stop attacks directed at a server or application Can detect and prevent denial-of-service (DoS) and protocol attacks Some can deny attackers information about the network Hide HTTP error pages Remove server identification headers from HTTP responses
  16. Standard Network Devices Proxies - there are several types of proxies used in computer networking Proxy server - a computer or an application program that intercepts user requests from the internal network and processes that request on behalf of the user Application-aware proxy - a special proxy server that “knows” the application protocols that it supports
  17. Standard Network Devices Advantages of proxy servers: Increased speed Reduced costs Improved management Stronger security Reverse proxy Does not serve clients Routes incoming requests to the correct server
  18. Standard Network Devices Figure 7-3 Proxy server
  19. Network Security Hardware Specifically designed security hardware devices Provide greater protection than standard networking devices Network Firewalls Can be software-based or hardware-based Both types inspect packets and either accept or deny entry Hardware firewalls are usually located outside the network security perimeter
  20. Network Security Hardware Methods of firewall packet filtering Stateless packet filtering Inspects incoming packet and permits or denies based on conditions set by administrator Stateful packet filtering Keeps a record of the state of a connection Makes decisions based on the connection and conditions
  21. Network Security Hardware Firewall actions on a packet Allow (let packet pass through) Drop (prevent the packet from passing into the network and send no response to sender) Reject (prevent the packet from passing into the network but send a message to the sender) Rule-based firewalls Use a set of individual instructions to control actions, called firewall rules Each rule is a separate instruction processed in sequence telling the firewall what action to take
  22. Network Security Hardware Application-Aware Firewalls Sometimes called a next-generation firewall (NGFW) Operate at a higher level by identifying applications that send packets through the firewall and make decisions about actions to take Web application firewall Special type of application-aware firewall that looks deeply into packets that carry HTTP traffic Can block specific sites or specific types of HTTP traffic
  23. Network Security Hardware Spam filters Enterprise-wide spam filters block spam before it reaches the host Email systems use two protocols Simple Mail Transfer Protocol (SMTP) Handles outgoing mail Post Office Protocol (POP) Handles incoming mail
  24. Network Security Hardware Spam filters installed with the SMTP server Filter configured to listen on port 25 Pass non-spam e-mail to SMTP server listening on another port This method prevents SMTP server from notifying spammer of failed message delivery
  25. Network Security Hardware Figure 7-7 Spam filter with SMTP server
  26. Network Security Hardware Spam filters installed on the POP3 server All spam must first pass through SMTP server and be delivered to user’s mailbox Can result in increased costs Storage, transmission, backup, deletion Third-party entity contracted to filter spam All email directed to third-party’s remote spam filter E-mail cleansed before being redirected to organization
  27. Network Security Hardware Figure 7-8 Spam filter on POP3 server
  28. Network Security Hardware Virtual private network (VPN) - enables authorized users to use an unsecured public network as if it were a secure private network All data transmitted between remote device and network is encrypted Types of VPNs Remote-access VPN - a user-to-LAN connection Site-to-site - multiple sites can connect to other sites over the Internet
  29. Network Security Hardware Endpoints The end of the tunnel between VPN devices Used in communicating VPN transmissions May be software on local computer, a VPN concentrator (hardware device), or integrated into another networking device VPN concentrator - a dedicated hardware device that aggregates hundreds or thousands of VPN connections
  30. Network Security Hardware Tunneling protocols enclose a packet within another packet and are used for VPN transmissions IPsec has two “subprotocols” that are used in VPN: Encapsulated Security Payload (ESP) Authentication Header (AH) A remote-access VPN generally uses either IPsec or the Layer 2 Tunneling Protocol (L2TP)
  31. Network Security Hardware Internet Content Filters Monitor Internet traffic Block access to preselected Web sites and files Unapproved sites can be restricted based on the URL (URL filtering) or matching keywords (content inspection)
  32. Network Security Hardware Table 7-3 Internet content filter features
  33. Network Security Hardware Web Security Gateways Can block malicious content in real time Block content through application level filtering Examples of blocked Web traffic Adware, spyware Cookies Instant messengers P2P (peer to peer) file sharing Script exploits TCP/IP malicious code attacks
  34. Network Security Hardware Intrusion detection system (IDS) Can detect attack as it occurs IDS systems use different methodologies for monitoring for attacks Can be installed on either local hosts or networks An extension of IDS is an intrusion prevention system (IPS)
  35. Network Security Hardware Monitoring methodologies Anomaly-based monitoring Compares current detected behavior with baseline Signature-based monitoring Looks for well-known attack signature patterns Behavior-based monitoring Detects abnormal actions by processes or programs Alerts user who decides whether to allow or block activity Heuristic monitoring Uses experience-based techniques
  36. Network Security Hardware Table 7-4 Methodology comparisons to trap port scanning application
  37. Network Security Hardware Types of IDS - two basic types if IDS exist Host intrusion detection system (HIDS) A software-based application that can detect an attack as it occurs Installed on each system needing protection Monitors: System calls and file system access Can recognize unauthorized Registry modification Host input and output communications Detects anomalous activity
  38. Network Security Hardware Disadvantages of HIDS Cannot monitor network traffic that does not reach local system All log data is stored locally Resource-intensive and can slow system
  39. Network Security Hardware Network intrusion detection system (NIDS) Watches for attacks on the network NIDS sensors installed on firewalls and routers: Gather information and report back to central device Passive NIDS will sound an alarm An NIDS may use one or more of the evaluation techniques listed in Table 7-5 (see the following slide)
  40. Network Security Hardware Table 7-5 NDIS evaluation techniques
  41. Network Security Hardware Application-aware IDS A specialized IDS Capable of using “contextual knowledge” in real time It can know the version of the OS or which application is running As well as what vulnerabilities are present in the systems being protected
  42. Network Security Hardware Intrusion Prevention System (IPS) Monitors network traffic to immediately block a malicious attack Similar to NIDS NIPS is located “in line” on the firewall Allows the NIPS to more quickly take action to block an attack Application-aware IPS Knows which applications are running as well as the underlying OS
  43. Network Security Hardware Unified Threat Management (UTM) Security Appliances Network hardware that provides multiple security functions, such as: Antispam, antiphishing, antivirus, and antispyware Bandwidth optimization Content filtering Encryption Firewall Instant messaging control and web filtering Intrusion protection
  44. Security Through Network Technologies Internet routers normally drop packet with a private address Network address translation (NAT) Allows private IP addresses to be used on the public Internet Replaces private IP address with public address Port address translation (PAT) Variation of NAT Outgoing packets given same IP address but different TCP port number
  45. Security Through Network Technologies Table 7-6 Private IP addresses
  46. Security Through Network Technologies Advantage of NAT Masks IP addresses of internal devices An attacker who captures the packet on the Internet cannot determine the actual IP address of sender Network Access Control (NAC) Examines current state of system or network device: Before allowing the network connection Device must meet set of criteria If not met, NAC allows connection to a “quarantine” network until deficiencies corrected
  47. Security Through Network Technologies Figure 7-10 Network access control (NAC) framework
  48. Security Through Network Design Elements Elements of a secure network design Demilitarized zones Subnetting Virtual LANs Remote access
  49. Demilitarized Zone (DMZ) DMZ - a separate network located outside secure network perimeter Untrusted outside users can access DMZ but not secure network
  50. Demilitarized Zone (DMZ) Figure 7-11 DMZ with one firewall
  51. Demilitarized Zone (DMZ) Figure 7-12 DMZ with two firewalls
  52. Subnetting An IP address is used to identify a network and a host on that network One part is a network address and one part is a host address Subnetting allows a large network to be divided into smaller subnets Each network can contain several subnets Each subnet is connected through different routers Each subnet can contain multiple hosts
  53. Subnetting Improves network security by isolating groups of hosts Administrators can utilize network security tools to make it easier to regulate who has access in and out of a particular subnetwork Allows network administrators to hide the internal network layout Makes it more difficult for attackers to target their attacks
  54. Subnetting Figure 7-13 Subnets
  55. Subnetting Table 7-7 Advantages of subnetting
  56. Virtual LANs (VLAN) Allow scattered users to be logically grouped together Even if attached to different switches Can isolate sensitive data to VLAN members Communication on a VLAN If connected to same switch, switch handles packet transfer A special “tagging” protocol is used for communicating between switches
  57. Remote Access Working away from the office commonplace today Telecommuters, traveling sales representatives, and traveling workers Strong security for remote workers must be maintained Remote Access Any combination of hardware and software that enables remote users to access a local internal network Provides same the functionality as local users through a VPN or dial-up connection
  58. Summary Standard network security devices provide a degree of security Switches, router, load balancer, and proxies Hardware devices specifically designed for security give higher protection level Hardware-based firewall, Web application firewall Virtual private networks (VPNs) use an unsecured public network and encryption to provide security
  59. Summary An intrusion detection system (IDS) is designed to detect an attack as it occurs Network technologies can help secure a network Network address translation Network access control Methods for designing a secure network Demilitarized zones Virtual LANs