Your SlideShare is downloading. ×
0
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Download It
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Download It

312

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
312
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
21
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Real world examples of security breaches go here
  • Transcript

    • 1. Introduction to Network Security November 20 th , 2007 Presented by Aliza Bailey and Phil Ames
    • 2. The Net is NOT the Web The Internet: TCP/IP, the “road” if you will that other protocols run on The Web: one of the “vehicles” that run on this road. Other vehicles would include email, chat programs, file transfer programs and protocols, etc.
    • 3. Introducing… Your Network Exploits
    • 4. Malware “ A generic term for a number of different types of malicious code, can include spyware, worms, viruses, etc created with the intent of infiltrating a system without permission and causing destruction, also called “Computer Contaminants””
    • 5. Virus “ A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting - i.e., inserting a copy of itself into and becoming part of - another program. A virus cannot run by itself; it requires that its host program be run to make the virus active “
    • 6. Trojans/Backdoors “ A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.”
    • 7. Keyloggers “ Programs designed to log key strokes entered by a user on a machine. When used negatively, this information is transmitted to a remote location to collect the personal data”
    • 8. Rootkits “A collection of tools (programs) that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.”
    • 9. Botnets “ A collection of compromised, broadband-enabled PC’s hijacked during a worm/virus attack and infected with software that links them to a server where they receive “instructions” from a botnet controller. These are then used to participate in further virus/worm/spam assaults and Denial of Service attacks”
    • 10.  
    • 11. Denial of Service aka DoS “ An event or series of events that prevents a system or network from performing its intended function” This can come from a botnet or a more direct attack. In the basic sense, more packets or data is sent to a victim than the victim can handle and the system crashes.
    • 12. Generic DoS
    • 13. Phishing & Spam “ The use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website. Typically the e-mail and the web site looks like they are part of a bank the user is doing business with. Spam is any unwanted unsolicited message. Spam is usually sent via email”
    • 14. Breaking Down Barriers Eliminate the “Does not apply to me” attitude with users
    • 15. Breaking Down Barriers <ul><li>Users need to be active members of your “security team” as they are certainly members of your “network abuse” squad </li></ul><ul><li>Educate them now on proper security practices and their benefits before they have to learn the hard way </li></ul><ul><li>One compromised machine in a network is all that is needed to affect the entire network </li></ul>
    • 16.  
    • 17. Getting to Know Your Network You can not defend what you do not understand.
    • 18. Getting to Know Your Network <ul><li>DOCUMENTATION IS KEY </li></ul><ul><ul><li>Baseline your network and core devices </li></ul></ul><ul><ul><li>Port to Jack conversion list </li></ul></ul><ul><ul><li>MAC Address inventory </li></ul></ul><ul><ul><li>Static IP address list </li></ul></ul><ul><ul><li>Knowing where to go when an event occurs is absolutely necessary </li></ul></ul><ul><ul><ul><li>Vendor information </li></ul></ul></ul><ul><ul><ul><li>Physical location of devices </li></ul></ul></ul>
    • 19. Getting to Know Your Network <ul><li>Understand the flow of traffic in your network </li></ul><ul><ul><li>Ingress traffic </li></ul></ul><ul><ul><ul><li>This is your inbound traffic </li></ul></ul></ul><ul><ul><li>Egress traffic </li></ul></ul><ul><ul><ul><li>This is your outbound traffic </li></ul></ul></ul><ul><ul><li>Traceroutes </li></ul></ul><ul><ul><ul><li>Is your network symmetrical? Do you have more than one internet presence? Are your packets traveling the correct route? </li></ul></ul></ul>
    • 20. Getting to Know Your Network <ul><li>RESEARCH YOUR PRODUCTS!!! </li></ul><ul><ul><li>What Operating Systems live in your environment? </li></ul></ul><ul><ul><li>Understand any products you want to introduce into your network, including their purpose, placement, and your expectations </li></ul></ul><ul><ul><li>Create a test environment mirroring your production network to fully test new equipment </li></ul></ul>
    • 21. Defense in Depth Multiple layers are always better than one.
    • 22. Defense in Depth <ul><li>Proactive Defense </li></ul><ul><ul><li>Preventing the fire from starting </li></ul></ul><ul><ul><ul><li>Firewalls </li></ul></ul></ul><ul><ul><ul><li>Content Filtering </li></ul></ul></ul><ul><ul><ul><li>Intrusion Prevention Devices </li></ul></ul></ul><ul><ul><ul><li>Traffic engineering </li></ul></ul></ul><ul><ul><ul><li>Network Monitoring </li></ul></ul></ul><ul><ul><ul><li>Base lining your network and core devices </li></ul></ul></ul><ul><ul><ul><li>Acceptable use policies </li></ul></ul></ul>
    • 23. Defense in Depth <ul><li>Reactive Defense </li></ul><ul><ul><li>Putting out the fires </li></ul></ul><ul><ul><ul><li>Intrusion Detection Systems </li></ul></ul></ul><ul><ul><ul><li>System backups </li></ul></ul></ul><ul><ul><ul><li>Forensic based programs </li></ul></ul></ul><ul><ul><ul><ul><li>Fport, nmap </li></ul></ul></ul></ul><ul><ul><ul><li>Network Monitoring tools </li></ul></ul></ul><ul><ul><ul><ul><li>TCPDump, WinDump, Ethereal, Snort </li></ul></ul></ul></ul>
    • 24. Defense in Depth Desktop Level
    • 25. Defense in Depth <ul><li>Antivirus </li></ul><ul><ul><li>The “flu shot” of the security world </li></ul></ul><ul><ul><ul><li>Anti virus is the most basic level of desktop security and should be present on all workstations, servers, laptops, etc </li></ul></ul></ul><ul><ul><ul><li>This is not a replacement for better security practices. Definitions need constant updating to meet the ever growing number of viruses present. The time between virus identification and definition distribution has shrunk as technology increases, however the gap still exists </li></ul></ul></ul>
    • 26. Defense in Depth <ul><li>Anti-Spyware </li></ul><ul><ul><li>Common programs available are spybot, ad-aware, and most antivirus suites now include anti-spyware options </li></ul></ul><ul><ul><li>As with anti virus software, these programs require regular updates to remain effective </li></ul></ul>
    • 27. Defense in Depth <ul><li>Host Based Firewalls </li></ul><ul><ul><li>Windows XP comes standard with a firewall, there are also popular options such as ZoneAlarm, Norton Personal Firewall, Black Ice, McAfee Personal Firewall, etc </li></ul></ul><ul><ul><li>Controls application access on machines while network based firewalls control the data flow to the machine </li></ul></ul><ul><ul><li>Learning curve: end users usually need assistance in configuring the rules properly to avoid blocking legitimate applications </li></ul></ul>
    • 28. Defense in Depth <ul><li>Physical Access </li></ul><ul><ul><li>Login: All machines should require authentication to the box or domain controller, no guest accounts! </li></ul></ul><ul><ul><li>Removable storage: unless otherwise needed, removable storage like thumb drives should be restricted from being introduced to your network </li></ul></ul><ul><ul><li>Location: Are your servers open to be accessed by anyone? Is your file server sitting on your desk? </li></ul></ul>
    • 29. Defense in Depth <ul><li>Passwords </li></ul><ul><ul><li>Passphrases: easier to remember, can be “fun” and more personal </li></ul></ul><ul><ul><li>Special Characters, Numbers, Case sensitivity </li></ul></ul><ul><ul><li>Length: longer = better </li></ul></ul><ul><ul><li>Set a minimum password policy! </li></ul></ul>
    • 30.  
    • 31. Defense in Depth <ul><li>Patching & Updating </li></ul><ul><ul><li>Set it and forget it! Setting up all machines to automatically download and install updates takes the guess work out of it </li></ul></ul><ul><ul><li>Do not forget to patch and update all softwares used, not just the OS. This includes Microsoft Office, Quicktime, antivirus, anti-malware, etc. </li></ul></ul>
    • 32. Network Level Defense Border Patrol Keeping the bad guys from reaching your users
    • 33. Network Level Defense <ul><li>Router Security </li></ul><ul><ul><li>Routers allow for more concise security measures to be implemented than their switch and hub brethren </li></ul></ul><ul><ul><li>Networks can be segregated by VLANS </li></ul></ul><ul><ul><li>Traffic can be engineered with access control lists </li></ul></ul>
    • 34. Network Level Defense <ul><li>Router Security </li></ul><ul><ul><li>Lock down access to the router </li></ul></ul><ul><ul><ul><li>Always require a login, be it a local account, RADIUS authentication, etc. </li></ul></ul></ul><ul><ul><ul><li>Restrict access only to those networks/IP addresses that should be accessing the device </li></ul></ul></ul><ul><ul><ul><ul><li>Do you access this router from outside your work network? </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Do you only access this router from one particular workstation? </li></ul></ul></ul></ul>
    • 35. Network Level Defense <ul><li>Router Security </li></ul><ul><ul><li>Lock down port access </li></ul></ul><ul><ul><ul><li>Restricting what can be plugged into your network and where reduces the occurrence of rogue routers/switches/hubs, wireless access points, and laptops </li></ul></ul></ul><ul><ul><ul><li>Usually accomplished by MAC address restrictions </li></ul></ul></ul>
    • 36. Network Level Defense <ul><li>Access Control Lists (ACL’s) </li></ul><ul><ul><li>A Standard ACL can restrict ingress and egress network traffic based upon the source IP, network, or subnet </li></ul></ul><ul><ul><li>An Extended ACL (Cisco) can restrict ingress and egress network traffic based upon source and destination networks, along with ports and protocols </li></ul></ul><ul><ul><li>Extremely important to map out EXACTLY what you want to allow/deny access to </li></ul></ul><ul><ul><li>As with Firewalls, better to maintain a “deny all, permit by exception” list </li></ul></ul>
    • 37. Network Level Defense · Routers apply lists sequentially in the order in which you type them into the router. · Routers apply lists to packets sequentially, from top down, one line at a time. · Packets are processed only until a match is made and then they are acted upon based on the access list criteria contained in the access list statements. · Lists always end with an implicit deny . Routers discard any packets that do not match any of the access list statements. · Access lists must be applied to an interface as either inbound or outbound traffic filters. · Only one list per direction can be applied to an interface.
    • 38. Network Level Defense IP access list 99 10 permit ip 64.251.55.0 0.0.0.15 any 20 deny ip any any interface Vlan2 ip address 64.251.55.1 255.255.255.240 ip access-group 100 in no ip unreachables Example: Restricting network access only to one network Permits any IP in the 64.251.55.0/28 network to go anywhere, denies all else Applied INBOUND to the VLAN interface. Inbound means traffic coming into that interface from machines internal to your network
    • 39. Network Level Defense ip access-list extended School_Security permit tcp 10.10.10.0 0.0.0.255 10.0.0.0 0.255.255.255 eq smtp permit tcp 10.10.10.0 0.0.0.255 160.241.0.0 0.0.255.255 eq smtp deny tcp any any eq smtp deny udp any any eq snmp permit tcp 10.10.10.0 0.0.0.255 any eq www permit tcp 10.10.10.0 0.0.0.255 any eq 8888 deny ip any any Example: Restricting traffic even more with extended ACL’s This ACL will allow SMTP access for the 10.10.10.0/24 network only to the two networks stated, deny all others. Next, access to WWW and TCP port 8888 is allowed, nothing else. This example works in direct conjunction with our HTTPS proxy
    • 40. Network Level Defense <ul><li>Firewalls </li></ul><ul><ul><li>A firewall is similar to a wall around a city or a wall around a building. It can prevent traffic from going into or out of the city except through designated gates. Another term for these gates would be ports. For example, if you want someone to be able to send you email, you would open up a specific gate and email could get into your network. </li></ul></ul>
    • 41. Network Level Defense <ul><li>Firewalls </li></ul><ul><ul><li>Network Layer </li></ul></ul><ul><ul><ul><li>Packet filtering usually based on source IP address, source port, destination IP address or port, destination service like WWW or FTP </li></ul></ul></ul><ul><ul><li>Application Layer </li></ul></ul><ul><ul><ul><li>Filters for applications, like XML/WWW/FTP, to provide more protection for the specified application </li></ul></ul></ul><ul><ul><li>Proxies </li></ul></ul><ul><ul><ul><li>May be used in a firewall fashion to hide internal networks </li></ul></ul></ul>
    • 42. Network Level Defense <ul><li>Wireless Security </li></ul><ul><ul><li>Restrict access! No public access should be available </li></ul></ul><ul><ul><ul><li>Disable SSID broadcasting </li></ul></ul></ul><ul><ul><ul><li>Restrict access to known users (by MAC) </li></ul></ul></ul><ul><ul><li>ENCRYPT ENCRYPT ENCRYPT!!! </li></ul></ul><ul><ul><ul><li>Even if you only use WEP, use it. </li></ul></ul></ul><ul><ul><ul><li>Consult your product documentation for instructions </li></ul></ul></ul>
    • 43. “ Best Practices” Summary <ul><li>Document your network </li></ul><ul><li>Research your products </li></ul><ul><li>Inform and educate your users </li></ul><ul><li>Set a security policy and follow it </li></ul><ul><li>Be proactive or suffer the consequences of only reacting to events </li></ul><ul><li>Multiple layers of security: Network and Desktop </li></ul><ul><li>Passwords! </li></ul><ul><li>Patch and Update everything </li></ul><ul><li>Secure ALL wireless connections!!! </li></ul><ul><li>DENY ALL PERMIT BY EXCEPTION </li></ul>

    ×