SlideShare a Scribd company logo
1 of 61
CompTIA Security+ Guide to
Network Security Fundamentals,
Fifth Edition
Chapter 8
Administering a Secure Network
© Cengage Learning 2015
Objectives
• List and describe the functions of common network
protocols
• Explain how network administration principles can
be applied
• Define different network applications and how they
can be secured
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
2
© Cengage Learning 2015
Common Network Protocols
• Protocols
– Rules for communication
– Essential for proper communication between
network devices
• Transmission Control Protocol/Internet Protocol
(TCP/IP)
– Most common protocol suite used for local area
networks and the Internet
– Comprises several protocols that all function
together
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
3
© Cengage Learning 2015
Common Network Protocols
• IP
– Protocol that functions primarily at Open Systems
Interconnection (OSI) Network Layer (Layer 3)
– Provides network addressing and routing
• TCP
– Transport Layer (Layer 4) protocol
– Establishes connections and ensures reliable data
transport between devices
• TCP/IP uses a four layer architecture
– Network Interface, Internet, Transport, Application
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
4
© Cengage Learning 2015
Common Network Protocols
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
5
© Cengage Learning 2015
Common Network Protocols
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
6
• Several basic TCP/IP Protocols:
– Internet Control Message Protocol (ICMP)
– Simple Network Management Protocol (SNMP)
– Domain Name System (DNS)
– File transfer and storage protocols
– NetBIOS
– Telnet
• A new and more secure version of IP is designed to
replace the current version
© Cengage Learning 2015
Internet Control Message Protocol
(ICMP)
• ICMP
– Used by devices to communicate updates or error
information to other devices
– ICMP messages are divided into two classes:
• Informational and query messages
• Error messages
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
7
© Cengage Learning 2015
Internet Control Message Protocol
(ICMP)
• ICMP message fields
– Type
• Identifies general message category
– Code
• Gives additional information about the Type field
– Checksum
• Verifies message integrity
– Message Body
• Contains information about the specific ICMP
message
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
8
© Cengage Learning 2015
Internet Control Message Protocol
(ICMP)
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
9
© Cengage Learning 2015
Internet Control Message Protocol
(ICMP)
• Attacks that that advantage of ICMP
– Network discovery
– Smurf attack
– ICMP redirect attack
– Ping of death
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
10
© Cengage Learning 2015
Simple Network Management Protocol
(SNMP)
• Used to manage network equipment and is
supported by most network equipment
manufacturers
• Allows administrators to remotely monitor, manage,
and configure network devices
• Functions by exchanging management information
between network devices
• Each SNMP-managed device has an agent or a
service
– Listens for and executes commands
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
11
© Cengage Learning 2015
Simple Network Management Protocol
(SNMP)
• Agents are password protected
– Password is known as a community string
• Security vulnerabilities were present in SMNP
versions 1 and 2
– Version 3 uses usernames and passwords along
with encryption to address vulnerabilities
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
12
© Cengage Learning 2015
Domain Name System (DNS)
• A TCP/IP protocol that maps IP addresses to their
symbolic name
• The DNS database is organized as a hierarchy
– Database consists of the name of a site and a
corresponding IP number
• Database is distributed to many different servers
on the Internet
– To prevent bottlenecking and to ensure efficiency
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
13
© Cengage Learning 2015
Domain Name System (DNS)
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
14
© Cengage Learning 2015
Domain Name System (DNS)
• DNS is often the focus of attacks
– DNS poisoning substitutes fraudulent IP address
• Can be done in local host table or external DNS
server
• Latest edition of DNS software prevents DNS
poisoning
– Attacker asks the valid DNS for a zone transfer
• A zone transfer allows attacker access to network,
hardware, and operating system information
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
15
© Cengage Learning 2015
File Transfer Protocols
• TCP/IP protocols are used for transferring files
– File transfer protocol (FTP) - used to connect to an
FTP server
– Trivial file transfer protocol (TFTP) - a “light” version
of FTP that uses a small amount of memory
• Methods for using FTP on local host computer
– From a command prompt
– Using a web browser
– Using an FTP client
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
16
© Cengage Learning 2015
File Transfer Protocols
• Using FTP behind a firewall can present challenges
– FTP uses two ports
• Port 21 is the FTP control part
• Port 20 is the data port
– FTP active mode
• Client’s firewall may sometimes drop packets on Port
20 (the data channel connection)
– FTP passive mode
• The client sends a PASV command to the command
channel and the server responds with the TCP port
number to use to establish the data channel
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
17
© Cengage Learning 2015
File Transfer Protocols
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
18
© Cengage Learning 2015
File Transfer Protocols
• FTP vulnerabilities
– Does not use encryption
– Files transferred using FTP are vulnerable to man-in-
the-middle attacks
• Secure transmission options over FTP
– Secure sockets layer (FTPS) encrypts commands
• Uses SSL or TLS to encrypt commands sent over the
control port (port 21); data port may not be encrypted
– Secure FTP (SFTP)
• Uses only a single TCP port instead of two ports
• All data and commands are encrypted
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
19
© Cengage Learning 2015
File Transfer Protocols (cont’d.)
• Secure Copy Protocol (SCP)
– An enhanced version of Remote Copy Protocol
(RCP)
– Encrypts files and commands
– File transfer cannot be interrupted and then resumed
in the same session
• Session must be completely terminated and restarted
– Found mainly on Linux and UNIX platforms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
20
© Cengage Learning 2015
Storage Protocols
• As storage capacities have grown, most
organizations have turned to using a storage area
network (SAN)
– A dedicated network storage facility that provides
access to data storage over a high-speed network
• iSCSI (Internet Small Computer System
Interface) - an IP-based storage networking
standard for linking data storage facilities
– Can transmit data over LANs, WANs, and the
Internet
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
21
© Cengage Learning 2015
Storage Protocols
• Fibre Channel (FC) - a high-speed storage
network protocol that can transmit up to 16 Gbps
• Fibre Channel over Ethernet (FCoE)
– A variation of FC that encapsulates Fibre Channel
frames over Ethernet networks
– Allows FC to use fast Ethernet networks while
preserving the FC protocol
• FC zones - a built-in security mechanism
– There are two types:
• FC hard zone
• FC soft zone
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
22
© Cengage Learning 2015
NetBIOS
• NetBIOS (Network Basic Input/Output System)
– A transport protocol used by Microsoft Windows
systems
– Allows applications on separate computers to
communicate over a LAN
– An attacker who determines that NetBIOS is running
can use an application to gather information
regarding the network in order to design an attack
– It is recommended to disable NetBIOS or used only
if necessary on specific devices that require it
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
23
© Cengage Learning 2015
Telnet
• Telnet
– An older TCP/IP protocol for text-based
communication
– Also a terminal emulation application that runs on a
local computer
• Connects to a server on a network
– Telnet does not encrypt data and many security
weaknesses have been uncovered within the
protocol
– It is recommended that Secure Shell (SSH) be used
instead of Telnet
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
24
© Cengage Learning 2015
IPv6
• Current version of IP protocol is version 4 (IPv4)
– Developed in 1981
– Number of available IP address is limited to 4.3
billion
• This is no longer sufficient for the number of devices
that are connected to the Internet
– Has security weaknesses
• Internet Protocol version 6 (IPv6)
– Next generation of IP protocol
– Addresses weaknesses of IPv4
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
25
© Cengage Learning 2015
IPv6
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
26
© Cengage Learning 2015
IPv6
• IPv6 provides enhanced security features
– Cryptographic protocols provide secure data
communication
– New authentication headers prevent IP packets from
being altered
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
27
© Cengage Learning 2015
IPv6
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
28
© Cengage Learning 2015
Network Administration Principles
• Administering a secure network can be challenging
• Rule-based management approach
– Relies on following procedures and rules
– Procedural rules are the authoritative and prescribed
direction for conduct
• Procedural rules dictate technical rules
– Technical rules address:
• Device security
• Monitoring and analyzing logs
• Network design management
• Port security
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
29
© Cengage Learning 2015
Device Security
• Device security involves:
– Establishing a secure router configuration
– Implementing flood guards
• Secure router configuration
– Router operates at Network Layer (Layer 3)
• Forwards packets across computer networks
– Routers can perform a security function
• Can be configured to filter out specific types of
network traffic
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
30
© Cengage Learning 2015
Device Security
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
31
© Cengage Learning 2015
Device Security
• Flood guard
– Protects against denial of service (DoS) attacks
– SYN flood attack
• A type of DoS attack that takes advantage of the
procedures for initiating a session
– A flood guard controls a device’s tolerance for
unanswered service requests
• Administrator can set a maximum number of
“developing” connections
– Commonly found on firewalls, IDSs, and IPSs
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
32
© Cengage Learning 2015
Monitoring and Analyzing Logs
• Security logs
– Can reveal types of attacks that are being directed at
the network and if attacks were successful
• Access logs
– Provide details regarding requests for specific files
• Audit logs
– Used to record which user performed an action
• Event logs
– Document any unsuccessful events and the most
significant successful events
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
33
© Cengage Learning 2015
Monitoring and Analyzing Logs
• A routine review of logs helps to:
– Identify security incidents
– Policy violations
– Fraudulent activity
– Operational problems
• Logs can be useful for:
– Performing auditing analysis
– Supporting the organization’s internal investigations
– Identifying operational trends and long-term
problems
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
34
© Cengage Learning 2015
Monitoring and Analyzing Logs
• Logs can provide documentation that the
organization is complying with laws and regulatory
requirements
• Firewall log items to be examined
– IP addresses rejected and dropped
– Probes to ports that have no application services on
them
– Source-routed packets
– Suspicious outbound connections
– Unsuccessful logins
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
35
© Cengage Learning 2015
Monitoring and Analyzing Logs
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
36
© Cengage Learning 2015
Monitoring and Analyzing Logs
• Problems with log management:
– Multiple devices generating logs
– Very large volumes of data
– Different log formats
• A solution to log management is to use a
centralized device log analyzer
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
37
© Cengage Learning 2015
Network Design Management
• Several network design management principles
should be followed to ensure a secure network
• Network separation
– Provides separation between different parts of the
network
– Example: order entry network segment cannot
access the network that controls heating and cooling
• Option to accomplish network separation
– Physically separate users by connecting them to
different switches and routers
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
38
© Cengage Learning 2015
Network Design Management
• Loop protection
– Refer to Figure 8-7 for a description of a broadcast
storm
– Host Z wants to send frames to Host X
– Switch A floods network with the packet
– Packet travels down the network segments to the
Switches B and C
– Switches B and C add Host Z to their lookup tables
– Both switches flood Segment 2 looking for Host X
• They receive each other’s packets and flood them
back out again
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
39
© Cengage Learning 2015
Network Design Management
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
40
© Cengage Learning 2015
Network Design Management
• Loop protection can prevent broadcast storms
– Uses IEEE 802.1d spanning tree algorithm (STA)
– Determines which switch has multiple ways to
communicate with host
– Determines best path and blocks other paths
• Virtual LAN (VLAN) management
– Network may be segmented into logical groups of
physical devices through VLAN
– Scattered users may be logically grouped together:
• Regardless of which switch they are attached to
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
41
© Cengage Learning 2015
Network Design Management
• General principles for managing VLANs
– Configure empty switch ports to connect to an
unused VLAN
– Change any default VLAN names
– Configure the ports on the switches that pass tagged
VLAN packets to explicitly forward specific tags
– Configure VLANs so that public devices are not on a
private VLAN
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
42
© Cengage Learning 2015
Port Security
• Disabling unused interfaces
– Turn off ports not required on a network device that
are not required
– A switch or router without port security allows
attackers to connect to unused ports and attack the
network
– All interfaces should be secured before switch is
deployed
– The network administrator should issue shutdown
command to each unused port
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
43
© Cengage Learning 2015
Port Security
• MAC limiting and filtering
– Filters and limits the number of media access control
(MAC) addresses allowed on a single port
– Port can be set to limit of 1
– Specific MAC address can be assigned to a port
• Enables only single authorized host to connect
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
44
© Cengage Learning 2015
Port Security
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
45
© Cengage Learning 2015
Port Security
• IEEE 802.1x
– Standard that provides the highest degree of port
security
– Implements port-based authentication
– Blocks all traffic on a port-by-port basis:
• Until client is authenticated
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
46
© Cengage Learning 2015
Port Security
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
47
© Cengage Learning 2015
Securing Network Applications and
Platforms
• Several network applications and platforms require
special security considerations:
– IP telephony
– Virtualization
– Cloud computing
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
48
© Cengage Learning 2015
IP Telephony
• A shift to an all digital technology infrastructure is
underway
– Converges voice and data traffic over a single IP
network
– IP telephony adds digital voice clients and new voice
applications to a data based network
• An IP telephony application can be easily
developed that personalizes the treatment of
incoming calls
– Calls can be selectively forwarded or blocked
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
49
© Cengage Learning 2015
IP Telephony
• IP telephony advantages
– Cost savings
– Simplified management
– Application development
– Reduced infrastructure requirements
– Reduced regulatory requirements
– Increased user productivity
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
50
© Cengage Learning 2015
IP Telephony
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
51
© Cengage Learning 2015
Virtualization
• Virtualization
– A means of managing and presenting computer
resources without regard to physical layout or
location
• Host virtualization
– An entire operating system environment is simulated
– Virtual machine - a simulated software-based
emulation of a computer
– The host system runs a hypervisor that manages the
virtual operating systems and supports one or more
guest systems
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
52
© Cengage Learning 2015
Virtualization
• Virtualization advantages
– New virtual server machines can be made available
(host availability) and resources can easily be
expanded or contracted as needed (host elasticity)
– Can reduce costs
• Fewer physical computers must be purchased and
maintained
– Can provided uninterrupted server access to users
• Supports live migration which allows a virtual machine
to be moved to a different physical computer with no
impact to users
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
53
© Cengage Learning 2015
Virtualization
• Virtualization advantages (cont’d.)
– Test latest patches by downloading on a virtual
machine before installing on production computers
– A snapshot of a particular state of a virtual machine
can be saved for later use
– Testing the existing security configuration (security
control testing) can be performed using a
simulated network environment
– A suspicious program can be loaded into an isolated
virtual machine and executed (sandboxing)
• If malware, only the virtual machine will be impacted
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
54
© Cengage Learning 2015
Virtualization
• Security for virtualized environments:
– A guest OS that has remained dormant may not
contain the latest patches and security updates
– Not all hypervisors have the necessary security
controls to keep out attackers
– Existing security tools were designed for single
physical servers and do not always adapt well to
multiple virtual machines
– Virtual machines must be protected from outside
network and other virtual machines on the same
computer
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
55
© Cengage Learning 2015
Cloud Computing
• Cloud computing
– A model for enabling convenient, on-demand
network access to a shared pool of configurable
computing resources
– It is a pay-per-use computing model
• Customers pay for only the resources they need
• Types of clouds
– Public cloud
– Community cloud
– Private cloud
– Hybrid cloud
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
56
© Cengage Learning 2015
Cloud Computing
• Three service models of cloud computing
– Software as a Service (SaaS)
• Vendor provides access to the vendor’s software
applications running on a cloud infrastructure
– Platform as a Service (PaaS)
• Consumers install and run their own specialized
applications on the cloud computing network
– Infrastructure as a Service (IaaS)
• Vendor allows customers to deploy and run their own
software, including OSs and applications
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
57
© Cengage Learning 2015
Cloud Computing
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
58
© Cengage Learning 2015
Cloud Computing
• Cloud computing security challenges
– Cloud provider must guarantee means to approve
authorized users and deny imposters
– Transmissions from the cloud must be protected
– Customers’ data must be isolated from other
customers
– The highest level of application availability and
security must be maintained
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
59
© Cengage Learning 2015
Summary
• TCP/IP is the most common protocol for LANs and
the Internet
• Protocols for transferring files
– FTP, FTPS, SFTP, SCP
• Storage area network (SAN) is a dedicated network
storage facility that provides access to data storage
over a high-speed network
• Router configuration must provide a secure
network environment
• Flood guard defends against denial-of-service
attacksCompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
60
© Cengage Learning 2015
Summary
• Networks can be configured to provide separation
and increased security
• Securing ports is an important step in network
management
– Unused ports should be disabled
• New network applications that have special
security considerations
– IP telephony
– Virtualization
– Cloud computing
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
61

More Related Content

What's hot

Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 PresentationAmy McMullin
 
A+ Chapter 4 Review
A+ Chapter 4 ReviewA+ Chapter 4 Review
A+ Chapter 4 ReviewAmy McMullin
 
A+ Chapter 5 Review
A+ Chapter 5 ReviewA+ Chapter 5 Review
A+ Chapter 5 ReviewAmy McMullin
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ GuideSmithjulia33
 
Module 7 (printing) Review
Module 7 (printing) ReviewModule 7 (printing) Review
Module 7 (printing) ReviewAmy McMullin
 
Security Framework for the IPv6 Era
Security Framework for the IPv6 EraSecurity Framework for the IPv6 Era
Security Framework for the IPv6 EraShinsuke SUZUKI
 
Security 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and DataSecurity 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and DataPrecisely
 
Security 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and DataSecurity 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and DataPrecisely
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsSam Bowne
 
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedDEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedFelipe Prado
 
Revolutionizing I4.0 Security and IT/OT Harmonization
Revolutionizing I4.0 Security and IT/OT HarmonizationRevolutionizing I4.0 Security and IT/OT Harmonization
Revolutionizing I4.0 Security and IT/OT HarmonizationSadatulla Zishan
 
IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best PracticesPrecisely
 
Best Practices in IBM i Security
Best Practices in IBM i SecurityBest Practices in IBM i Security
Best Practices in IBM i SecurityPrecisely
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglyAlgoSec
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...EnergySec
 
Key Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety NetworksKey Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety NetworksDesign World
 

What's hot (20)

Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
A+ Chapter 4 Review
A+ Chapter 4 ReviewA+ Chapter 4 Review
A+ Chapter 4 Review
 
A+ Chapter 5 Review
A+ Chapter 5 ReviewA+ Chapter 5 Review
A+ Chapter 5 Review
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ Guide
 
Module 7 (printing) Review
Module 7 (printing) ReviewModule 7 (printing) Review
Module 7 (printing) Review
 
Security Framework for the IPv6 Era
Security Framework for the IPv6 EraSecurity Framework for the IPv6 Era
Security Framework for the IPv6 Era
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
Security 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and DataSecurity 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and Data
 
Security 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and DataSecurity 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and Data
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
 
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedDEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
 
Revolutionizing I4.0 Security and IT/OT Harmonization
Revolutionizing I4.0 Security and IT/OT HarmonizationRevolutionizing I4.0 Security and IT/OT Harmonization
Revolutionizing I4.0 Security and IT/OT Harmonization
 
IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best Practices
 
Best Practices in IBM i Security
Best Practices in IBM i SecurityBest Practices in IBM i Security
Best Practices in IBM i Security
 
UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the Ugly
 
Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick Start
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
 
Key Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety NetworksKey Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety Networks
 

Viewers also liked

Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPointAmy McMullin
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 PresentationAmy McMullin
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 PresentationAmy McMullin
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 PresentationAmy McMullin
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 
How to hack the web
How to hack the webHow to hack the web
How to hack the webAmy McMullin
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceCengage Learning
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectivessombat nirund
 

Viewers also liked (14)

Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPoint
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 Presentation
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
hacker culture
hacker culturehacker culture
hacker culture
 
How to hack the web
How to hack the webHow to hack the web
How to hack the web
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 
Ch01
Ch01Ch01
Ch01
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Ch06
Ch06Ch06
Ch06
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 

Similar to Chapter 8 Presentaion

Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5APSU
 
Tcp ip management & security
Tcp ip management & securityTcp ip management & security
Tcp ip management & securityAsif Qureshi
 
The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) M Shamim Iqbal
 
Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Dr. Ahmed Al Zaidy
 
testppt ch01(1)
testppt ch01(1)testppt ch01(1)
testppt ch01(1)ryaekle
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraEmbarcados
 
Network protocol
Network protocolNetwork protocol
Network protocolOnline
 
Irati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA WorkshopIrati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA WorkshopEleni Trouva
 
Chapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.pptChapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.ppthoangdinhhanh88
 
Chapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.pptChapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.pptanwarkade1
 

Similar to Chapter 8 Presentaion (20)

Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Tcp ip management & security
Tcp ip management & securityTcp ip management & security
Tcp ip management & security
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP)
 
Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network
 
9780840024220 ppt ch08
9780840024220 ppt ch089780840024220 ppt ch08
9780840024220 ppt ch08
 
testppt ch01(1)
testppt ch01(1)testppt ch01(1)
testppt ch01(1)
 
Chapter 6 - Networking
Chapter 6 - NetworkingChapter 6 - Networking
Chapter 6 - Networking
 
Web Engineering Lecture2
Web Engineering Lecture2 Web Engineering Lecture2
Web Engineering Lecture2
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Overview of tcp ip
Overview of tcp ipOverview of tcp ip
Overview of tcp ip
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP segura
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Irati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA WorkshopIrati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA Workshop
 
tcp.pptx
tcp.pptxtcp.pptx
tcp.pptx
 
Chapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.pptChapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.ppt
 
Chapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.pptChapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.ppt
 

Recently uploaded

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

Chapter 8 Presentaion

  • 1. CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 8 Administering a Secure Network
  • 2. © Cengage Learning 2015 Objectives • List and describe the functions of common network protocols • Explain how network administration principles can be applied • Define different network applications and how they can be secured CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 2
  • 3. © Cengage Learning 2015 Common Network Protocols • Protocols – Rules for communication – Essential for proper communication between network devices • Transmission Control Protocol/Internet Protocol (TCP/IP) – Most common protocol suite used for local area networks and the Internet – Comprises several protocols that all function together CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 3
  • 4. © Cengage Learning 2015 Common Network Protocols • IP – Protocol that functions primarily at Open Systems Interconnection (OSI) Network Layer (Layer 3) – Provides network addressing and routing • TCP – Transport Layer (Layer 4) protocol – Establishes connections and ensures reliable data transport between devices • TCP/IP uses a four layer architecture – Network Interface, Internet, Transport, Application CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 4
  • 5. © Cengage Learning 2015 Common Network Protocols CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 5
  • 6. © Cengage Learning 2015 Common Network Protocols CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 6 • Several basic TCP/IP Protocols: – Internet Control Message Protocol (ICMP) – Simple Network Management Protocol (SNMP) – Domain Name System (DNS) – File transfer and storage protocols – NetBIOS – Telnet • A new and more secure version of IP is designed to replace the current version
  • 7. © Cengage Learning 2015 Internet Control Message Protocol (ICMP) • ICMP – Used by devices to communicate updates or error information to other devices – ICMP messages are divided into two classes: • Informational and query messages • Error messages CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 7
  • 8. © Cengage Learning 2015 Internet Control Message Protocol (ICMP) • ICMP message fields – Type • Identifies general message category – Code • Gives additional information about the Type field – Checksum • Verifies message integrity – Message Body • Contains information about the specific ICMP message CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 8
  • 9. © Cengage Learning 2015 Internet Control Message Protocol (ICMP) CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 9
  • 10. © Cengage Learning 2015 Internet Control Message Protocol (ICMP) • Attacks that that advantage of ICMP – Network discovery – Smurf attack – ICMP redirect attack – Ping of death CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 10
  • 11. © Cengage Learning 2015 Simple Network Management Protocol (SNMP) • Used to manage network equipment and is supported by most network equipment manufacturers • Allows administrators to remotely monitor, manage, and configure network devices • Functions by exchanging management information between network devices • Each SNMP-managed device has an agent or a service – Listens for and executes commands CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 11
  • 12. © Cengage Learning 2015 Simple Network Management Protocol (SNMP) • Agents are password protected – Password is known as a community string • Security vulnerabilities were present in SMNP versions 1 and 2 – Version 3 uses usernames and passwords along with encryption to address vulnerabilities CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 12
  • 13. © Cengage Learning 2015 Domain Name System (DNS) • A TCP/IP protocol that maps IP addresses to their symbolic name • The DNS database is organized as a hierarchy – Database consists of the name of a site and a corresponding IP number • Database is distributed to many different servers on the Internet – To prevent bottlenecking and to ensure efficiency CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 13
  • 14. © Cengage Learning 2015 Domain Name System (DNS) CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 14
  • 15. © Cengage Learning 2015 Domain Name System (DNS) • DNS is often the focus of attacks – DNS poisoning substitutes fraudulent IP address • Can be done in local host table or external DNS server • Latest edition of DNS software prevents DNS poisoning – Attacker asks the valid DNS for a zone transfer • A zone transfer allows attacker access to network, hardware, and operating system information CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 15
  • 16. © Cengage Learning 2015 File Transfer Protocols • TCP/IP protocols are used for transferring files – File transfer protocol (FTP) - used to connect to an FTP server – Trivial file transfer protocol (TFTP) - a “light” version of FTP that uses a small amount of memory • Methods for using FTP on local host computer – From a command prompt – Using a web browser – Using an FTP client CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 16
  • 17. © Cengage Learning 2015 File Transfer Protocols • Using FTP behind a firewall can present challenges – FTP uses two ports • Port 21 is the FTP control part • Port 20 is the data port – FTP active mode • Client’s firewall may sometimes drop packets on Port 20 (the data channel connection) – FTP passive mode • The client sends a PASV command to the command channel and the server responds with the TCP port number to use to establish the data channel CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 17
  • 18. © Cengage Learning 2015 File Transfer Protocols CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 18
  • 19. © Cengage Learning 2015 File Transfer Protocols • FTP vulnerabilities – Does not use encryption – Files transferred using FTP are vulnerable to man-in- the-middle attacks • Secure transmission options over FTP – Secure sockets layer (FTPS) encrypts commands • Uses SSL or TLS to encrypt commands sent over the control port (port 21); data port may not be encrypted – Secure FTP (SFTP) • Uses only a single TCP port instead of two ports • All data and commands are encrypted CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 19
  • 20. © Cengage Learning 2015 File Transfer Protocols (cont’d.) • Secure Copy Protocol (SCP) – An enhanced version of Remote Copy Protocol (RCP) – Encrypts files and commands – File transfer cannot be interrupted and then resumed in the same session • Session must be completely terminated and restarted – Found mainly on Linux and UNIX platforms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 20
  • 21. © Cengage Learning 2015 Storage Protocols • As storage capacities have grown, most organizations have turned to using a storage area network (SAN) – A dedicated network storage facility that provides access to data storage over a high-speed network • iSCSI (Internet Small Computer System Interface) - an IP-based storage networking standard for linking data storage facilities – Can transmit data over LANs, WANs, and the Internet CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 21
  • 22. © Cengage Learning 2015 Storage Protocols • Fibre Channel (FC) - a high-speed storage network protocol that can transmit up to 16 Gbps • Fibre Channel over Ethernet (FCoE) – A variation of FC that encapsulates Fibre Channel frames over Ethernet networks – Allows FC to use fast Ethernet networks while preserving the FC protocol • FC zones - a built-in security mechanism – There are two types: • FC hard zone • FC soft zone CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 22
  • 23. © Cengage Learning 2015 NetBIOS • NetBIOS (Network Basic Input/Output System) – A transport protocol used by Microsoft Windows systems – Allows applications on separate computers to communicate over a LAN – An attacker who determines that NetBIOS is running can use an application to gather information regarding the network in order to design an attack – It is recommended to disable NetBIOS or used only if necessary on specific devices that require it CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 23
  • 24. © Cengage Learning 2015 Telnet • Telnet – An older TCP/IP protocol for text-based communication – Also a terminal emulation application that runs on a local computer • Connects to a server on a network – Telnet does not encrypt data and many security weaknesses have been uncovered within the protocol – It is recommended that Secure Shell (SSH) be used instead of Telnet CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 24
  • 25. © Cengage Learning 2015 IPv6 • Current version of IP protocol is version 4 (IPv4) – Developed in 1981 – Number of available IP address is limited to 4.3 billion • This is no longer sufficient for the number of devices that are connected to the Internet – Has security weaknesses • Internet Protocol version 6 (IPv6) – Next generation of IP protocol – Addresses weaknesses of IPv4 CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 25
  • 26. © Cengage Learning 2015 IPv6 CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 26
  • 27. © Cengage Learning 2015 IPv6 • IPv6 provides enhanced security features – Cryptographic protocols provide secure data communication – New authentication headers prevent IP packets from being altered CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 27
  • 28. © Cengage Learning 2015 IPv6 CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 28
  • 29. © Cengage Learning 2015 Network Administration Principles • Administering a secure network can be challenging • Rule-based management approach – Relies on following procedures and rules – Procedural rules are the authoritative and prescribed direction for conduct • Procedural rules dictate technical rules – Technical rules address: • Device security • Monitoring and analyzing logs • Network design management • Port security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 29
  • 30. © Cengage Learning 2015 Device Security • Device security involves: – Establishing a secure router configuration – Implementing flood guards • Secure router configuration – Router operates at Network Layer (Layer 3) • Forwards packets across computer networks – Routers can perform a security function • Can be configured to filter out specific types of network traffic CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 30
  • 31. © Cengage Learning 2015 Device Security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 31
  • 32. © Cengage Learning 2015 Device Security • Flood guard – Protects against denial of service (DoS) attacks – SYN flood attack • A type of DoS attack that takes advantage of the procedures for initiating a session – A flood guard controls a device’s tolerance for unanswered service requests • Administrator can set a maximum number of “developing” connections – Commonly found on firewalls, IDSs, and IPSs CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 32
  • 33. © Cengage Learning 2015 Monitoring and Analyzing Logs • Security logs – Can reveal types of attacks that are being directed at the network and if attacks were successful • Access logs – Provide details regarding requests for specific files • Audit logs – Used to record which user performed an action • Event logs – Document any unsuccessful events and the most significant successful events CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 33
  • 34. © Cengage Learning 2015 Monitoring and Analyzing Logs • A routine review of logs helps to: – Identify security incidents – Policy violations – Fraudulent activity – Operational problems • Logs can be useful for: – Performing auditing analysis – Supporting the organization’s internal investigations – Identifying operational trends and long-term problems CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 34
  • 35. © Cengage Learning 2015 Monitoring and Analyzing Logs • Logs can provide documentation that the organization is complying with laws and regulatory requirements • Firewall log items to be examined – IP addresses rejected and dropped – Probes to ports that have no application services on them – Source-routed packets – Suspicious outbound connections – Unsuccessful logins CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 35
  • 36. © Cengage Learning 2015 Monitoring and Analyzing Logs CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 36
  • 37. © Cengage Learning 2015 Monitoring and Analyzing Logs • Problems with log management: – Multiple devices generating logs – Very large volumes of data – Different log formats • A solution to log management is to use a centralized device log analyzer CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 37
  • 38. © Cengage Learning 2015 Network Design Management • Several network design management principles should be followed to ensure a secure network • Network separation – Provides separation between different parts of the network – Example: order entry network segment cannot access the network that controls heating and cooling • Option to accomplish network separation – Physically separate users by connecting them to different switches and routers CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 38
  • 39. © Cengage Learning 2015 Network Design Management • Loop protection – Refer to Figure 8-7 for a description of a broadcast storm – Host Z wants to send frames to Host X – Switch A floods network with the packet – Packet travels down the network segments to the Switches B and C – Switches B and C add Host Z to their lookup tables – Both switches flood Segment 2 looking for Host X • They receive each other’s packets and flood them back out again CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 39
  • 40. © Cengage Learning 2015 Network Design Management CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 40
  • 41. © Cengage Learning 2015 Network Design Management • Loop protection can prevent broadcast storms – Uses IEEE 802.1d spanning tree algorithm (STA) – Determines which switch has multiple ways to communicate with host – Determines best path and blocks other paths • Virtual LAN (VLAN) management – Network may be segmented into logical groups of physical devices through VLAN – Scattered users may be logically grouped together: • Regardless of which switch they are attached to CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 41
  • 42. © Cengage Learning 2015 Network Design Management • General principles for managing VLANs – Configure empty switch ports to connect to an unused VLAN – Change any default VLAN names – Configure the ports on the switches that pass tagged VLAN packets to explicitly forward specific tags – Configure VLANs so that public devices are not on a private VLAN CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 42
  • 43. © Cengage Learning 2015 Port Security • Disabling unused interfaces – Turn off ports not required on a network device that are not required – A switch or router without port security allows attackers to connect to unused ports and attack the network – All interfaces should be secured before switch is deployed – The network administrator should issue shutdown command to each unused port CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 43
  • 44. © Cengage Learning 2015 Port Security • MAC limiting and filtering – Filters and limits the number of media access control (MAC) addresses allowed on a single port – Port can be set to limit of 1 – Specific MAC address can be assigned to a port • Enables only single authorized host to connect CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 44
  • 45. © Cengage Learning 2015 Port Security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 45
  • 46. © Cengage Learning 2015 Port Security • IEEE 802.1x – Standard that provides the highest degree of port security – Implements port-based authentication – Blocks all traffic on a port-by-port basis: • Until client is authenticated CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 46
  • 47. © Cengage Learning 2015 Port Security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 47
  • 48. © Cengage Learning 2015 Securing Network Applications and Platforms • Several network applications and platforms require special security considerations: – IP telephony – Virtualization – Cloud computing CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 48
  • 49. © Cengage Learning 2015 IP Telephony • A shift to an all digital technology infrastructure is underway – Converges voice and data traffic over a single IP network – IP telephony adds digital voice clients and new voice applications to a data based network • An IP telephony application can be easily developed that personalizes the treatment of incoming calls – Calls can be selectively forwarded or blocked CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 49
  • 50. © Cengage Learning 2015 IP Telephony • IP telephony advantages – Cost savings – Simplified management – Application development – Reduced infrastructure requirements – Reduced regulatory requirements – Increased user productivity CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 50
  • 51. © Cengage Learning 2015 IP Telephony CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 51
  • 52. © Cengage Learning 2015 Virtualization • Virtualization – A means of managing and presenting computer resources without regard to physical layout or location • Host virtualization – An entire operating system environment is simulated – Virtual machine - a simulated software-based emulation of a computer – The host system runs a hypervisor that manages the virtual operating systems and supports one or more guest systems CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 52
  • 53. © Cengage Learning 2015 Virtualization • Virtualization advantages – New virtual server machines can be made available (host availability) and resources can easily be expanded or contracted as needed (host elasticity) – Can reduce costs • Fewer physical computers must be purchased and maintained – Can provided uninterrupted server access to users • Supports live migration which allows a virtual machine to be moved to a different physical computer with no impact to users CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 53
  • 54. © Cengage Learning 2015 Virtualization • Virtualization advantages (cont’d.) – Test latest patches by downloading on a virtual machine before installing on production computers – A snapshot of a particular state of a virtual machine can be saved for later use – Testing the existing security configuration (security control testing) can be performed using a simulated network environment – A suspicious program can be loaded into an isolated virtual machine and executed (sandboxing) • If malware, only the virtual machine will be impacted CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 54
  • 55. © Cengage Learning 2015 Virtualization • Security for virtualized environments: – A guest OS that has remained dormant may not contain the latest patches and security updates – Not all hypervisors have the necessary security controls to keep out attackers – Existing security tools were designed for single physical servers and do not always adapt well to multiple virtual machines – Virtual machines must be protected from outside network and other virtual machines on the same computer CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 55
  • 56. © Cengage Learning 2015 Cloud Computing • Cloud computing – A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources – It is a pay-per-use computing model • Customers pay for only the resources they need • Types of clouds – Public cloud – Community cloud – Private cloud – Hybrid cloud CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 56
  • 57. © Cengage Learning 2015 Cloud Computing • Three service models of cloud computing – Software as a Service (SaaS) • Vendor provides access to the vendor’s software applications running on a cloud infrastructure – Platform as a Service (PaaS) • Consumers install and run their own specialized applications on the cloud computing network – Infrastructure as a Service (IaaS) • Vendor allows customers to deploy and run their own software, including OSs and applications CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 57
  • 58. © Cengage Learning 2015 Cloud Computing CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 58
  • 59. © Cengage Learning 2015 Cloud Computing • Cloud computing security challenges – Cloud provider must guarantee means to approve authorized users and deny imposters – Transmissions from the cloud must be protected – Customers’ data must be isolated from other customers – The highest level of application availability and security must be maintained CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 59
  • 60. © Cengage Learning 2015 Summary • TCP/IP is the most common protocol for LANs and the Internet • Protocols for transferring files – FTP, FTPS, SFTP, SCP • Storage area network (SAN) is a dedicated network storage facility that provides access to data storage over a high-speed network • Router configuration must provide a secure network environment • Flood guard defends against denial-of-service attacksCompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 60
  • 61. © Cengage Learning 2015 Summary • Networks can be configured to provide separation and increased security • Securing ports is an important step in network management – Unused ports should be disabled • New network applications that have special security considerations – IP telephony – Virtualization – Cloud computing CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 61

Editor's Notes

  1. CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 8 Administering a Secure Network
  2. Objectives List and describe the functions of common network protocols Explain how network administration principles can be applied Define different network applications and how they can be secured
  3. Common Network Protocols Protocols Rules for communication Essential for proper communication between network devices Transmission Control Protocol/Internet Protocol (TCP/IP) Most common protocol suite used for local area networks and the Internet Comprises several protocols that all function together
  4. Common Network Protocols IP Protocol that functions primarily at Open Systems Interconnection (OSI) Network Layer (Layer 3) Provides network addressing and routing TCP Transport Layer (Layer 4) protocol Establishes connections and ensures reliable data transport between devices TCP/IP uses a four layer architecture Network Interface, Internet, Transport, Application
  5. Common Network Protocols Figure 8-1 OSI model vs. TCP/IP model
  6. Common Network Protocols Several basic TCP/IP Protocols: Internet Control Message Protocol (ICMP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) File transfer and storage protocols NetBIOS Telnet A new and more secure version of IP is designed to replace the current version
  7. Internet Control Message Protocol (ICMP) ICMP Used by devices to communicate updates or error information to other devices ICMP messages are divided into two classes: Informational and query messages Error messages
  8. Internet Control Message Protocol (ICMP) ICMP message fields Type Identifies general message category Code Gives additional information about the Type field Checksum Verifies message integrity Message Body Contains information about the specific ICMP message
  9. Internet Control Message Protocol (ICMP) Table 8-1 Common ICMP code values for Type 3, Destination Unreachable
  10. Internet Control Message Protocol (ICMP) Attacks that that advantage of ICMP Network discovery Smurf attack ICMP redirect attack Ping of death
  11. Simple Network Management Protocol (SNMP) Used to manage network equipment and is supported by most network equipment manufacturers Allows administrators to remotely monitor, manage, and configure network devices Functions by exchanging management information between network devices Each SNMP-managed device has an agent or a service Listens for and executes commands
  12. Simple Network Management Protocol (SNMP) Agents are password protected Password is known as a community string Security vulnerabilities were present in SMNP versions 1 and 2 Version 3 uses usernames and passwords along with encryption to address vulnerabilities
  13. Domain Name System (DNS) A TCP/IP protocol that maps IP addresses to their symbolic name The DNS database is organized as a hierarchy Database consists of the name of a site and a corresponding IP number Database is distributed to many different servers on the Internet To prevent bottlenecking and to ensure efficiency
  14. Domain Name System (DNS) Figure 8-2 DNS look up
  15. Domain Name System (DNS) DNS is often the focus of attacks DNS poisoning substitutes fraudulent IP address Can be done in local host table or external DNS server Latest edition of DNS software prevents DNS poisoning Attacker asks the valid DNS for a zone transfer A zone transfer allows attacker access to network, hardware, and operating system information
  16. File Transfer Protocols TCP/IP protocols are used for transferring files File transfer protocol (FTP) - used to connect to an FTP server Trivial file transfer protocol (TFTP) - a “light” version of FTP that uses a small amount of memory Methods for using FTP on local host computer From a command prompt Using a web browser Using an FTP client
  17. File Transfer Protocols Using FTP behind a firewall can present challenges FTP uses two ports Port 21 is the FTP control part Port 20 is the data port FTP active mode Client’s firewall may sometimes drop packets on Port 20 (the data channel connection) FTP passive mode The client sends a PASV command to the command channel and the server responds with the TCP port number to use to establish the data channel
  18. File Transfer Protocols Figure 8-3 FTP client
  19. File Transfer Protocols FTP vulnerabilities Does not use encryption Files transferred using FTP are vulnerable to man-in-the-middle attacks Secure transmission options over FTP Secure sockets layer (FTPS) encrypts commands Uses SSL or TLS to encrypt commands sent over the control port (port 21); data port may not be encrypted Secure FTP (SFTP) Uses only a single TCP port instead of two ports All data and commands are encrypted
  20. File Transfer Protocols (cont’d.) Secure Copy Protocol (SCP) An enhanced version of Remote Copy Protocol (RCP) Encrypts files and commands File transfer cannot be interrupted and then resumed in the same session Session must be completely terminated and restarted Found mainly on Linux and UNIX platforms
  21. Storage Protocols As storage capacities have grown, most organizations have turned to using a storage area network (SAN) A dedicated network storage facility that provides access to data storage over a high-speed network iSCSI (Internet Small Computer System Interface) - an IP-based storage networking standard for linking data storage facilities Can transmit data over LANs, WANs, and the Internet
  22. Storage Protocols Fibre Channel (FC) - a high-speed storage network protocol that can transmit up to 16 Gbps Fibre Channel over Ethernet (FCoE) A variation of FC that encapsulates Fibre Channel frames over Ethernet networks Allows FC to use fast Ethernet networks while preserving the FC protocol FC zones - a built-in security mechanism There are two types: FC hard zone FC soft zone
  23. NetBIOS NetBIOS (Network Basic Input/Output System) A transport protocol used by Microsoft Windows systems Allows applications on separate computers to communicate over a LAN An attacker who determines that NetBIOS is running can use an application to gather information regarding the network in order to design an attack It is recommended to disable NetBIOS or used only if necessary on specific devices that require it
  24. Telnet Telnet An older TCP/IP protocol for text-based communication Also a terminal emulation application that runs on a local computer Connects to a server on a network Telnet does not encrypt data and many security weaknesses have been uncovered within the protocol It is recommended that Secure Shell (SSH) be used instead of Telnet
  25. IPv6 Current version of IP protocol is version 4 (IPv4) Developed in 1981 Number of available IP address is limited to 4.3 billion This is no longer sufficient for the number of devices that are connected to the Internet Has security weaknesses Internet Protocol version 6 (IPv6) Next generation of IP protocol Addresses weaknesses of IPv4
  26. IPv6 Figure 8-5 IPv4 and IPv6 headers
  27. IPv6 IPv6 provides enhanced security features Cryptographic protocols provide secure data communication New authentication headers prevent IP packets from being altered
  28. IPv6 Table 8-3 Comparison of IPv4 and IPv6 headers
  29. Network Administration Principles Administering a secure network can be challenging Rule-based management approach Relies on following procedures and rules Procedural rules are the authoritative and prescribed direction for conduct Procedural rules dictate technical rules Technical rules address: Device security Monitoring and analyzing logs Network design management Port security
  30. Device Security Device security involves: Establishing a secure router configuration Implementing flood guards Secure router configuration Router operates at Network Layer (Layer 3) Forwards packets across computer networks Routers can perform a security function Can be configured to filter out specific types of network traffic
  31. Device Security Table 8-4 Secure router configuration tasks
  32. Device Security Flood guard Protects against denial of service (DoS) attacks SYN flood attack A type of DoS attack that takes advantage of the procedures for initiating a session A flood guard controls a device’s tolerance for unanswered service requests Administrator can set a maximum number of “developing” connections Commonly found on firewalls, IDSs, and IPSs
  33. Monitoring and Analyzing Logs Security logs Can reveal types of attacks that are being directed at the network and if attacks were successful Access logs Provide details regarding requests for specific files Audit logs Used to record which user performed an action Event logs Document any unsuccessful events and the most significant successful events
  34. Monitoring and Analyzing Logs A routine review of logs helps to: Identify security incidents Policy violations Fraudulent activity Operational problems Logs can be useful for: Performing auditing analysis Supporting the organization’s internal investigations Identifying operational trends and long-term problems
  35. Monitoring and Analyzing Logs Logs can provide documentation that the organization is complying with laws and regulatory requirements Firewall log items to be examined IP addresses rejected and dropped Probes to ports that have no application services on them Source-routed packets Suspicious outbound connections Unsuccessful logins
  36. Monitoring and Analyzing Logs Table 8-5 Device logs with beneficial security data
  37. Monitoring and Analyzing Logs Problems with log management: Multiple devices generating logs Very large volumes of data Different log formats A solution to log management is to use a centralized device log analyzer
  38. Network Design Management Several network design management principles should be followed to ensure a secure network Network separation Provides separation between different parts of the network Example: order entry network segment cannot access the network that controls heating and cooling Option to accomplish network separation Physically separate users by connecting them to different switches and routers
  39. Network Design Management Loop protection Refer to Figure 8-7 for a description of a broadcast storm Host Z wants to send frames to Host X Switch A floods network with the packet Packet travels down the network segments to the Switches B and C Switches B and C add Host Z to their lookup tables Both switches flood Segment 2 looking for Host X They receive each other’s packets and flood them back out again
  40. Network Design Management Figure 8-7 Broadcast storm
  41. Network Design Management Loop protection can prevent broadcast storms Uses IEEE 802.1d spanning tree algorithm (STA) Determines which switch has multiple ways to communicate with host Determines best path and blocks other paths Virtual LAN (VLAN) management Network may be segmented into logical groups of physical devices through VLAN Scattered users may be logically grouped together: Regardless of which switch they are attached to
  42. Network Design Management General principles for managing VLANs Configure empty switch ports to connect to an unused VLAN Change any default VLAN names Configure the ports on the switches that pass tagged VLAN packets to explicitly forward specific tags Configure VLANs so that public devices are not on a private VLAN
  43. Port Security Disabling unused interfaces Turn off ports not required on a network device that are not required A switch or router without port security allows attackers to connect to unused ports and attack the network All interfaces should be secured before switch is deployed The network administrator should issue shutdown command to each unused port
  44. Port Security MAC limiting and filtering Filters and limits the number of media access control (MAC) addresses allowed on a single port Port can be set to limit of 1 Specific MAC address can be assigned to a port Enables only single authorized host to connect
  45. Port Security Table 8-6 MAC limiting and filtering configuration options
  46. Port Security IEEE 802.1x Standard that provides the highest degree of port security Implements port-based authentication Blocks all traffic on a port-by-port basis: Until client is authenticated
  47. Port Security Figure 8-8 IEEE 802.1x process
  48. Securing Network Applications and Platforms Several network applications and platforms require special security considerations: IP telephony Virtualization Cloud computing
  49. IP Telephony A shift to an all digital technology infrastructure is underway Converges voice and data traffic over a single IP network IP telephony adds digital voice clients and new voice applications to a data based network An IP telephony application can be easily developed that personalizes the treatment of incoming calls Calls can be selectively forwarded or blocked
  50. IP Telephony IP telephony advantages Cost savings Simplified management Application development Reduced infrastructure requirements Reduced regulatory requirements Increased user productivity
  51. IP Telephony Table 8-7 IP technology vulnerabilities
  52. Virtualization Virtualization A means of managing and presenting computer resources without regard to physical layout or location Host virtualization An entire operating system environment is simulated Virtual machine - a simulated software-based emulation of a computer The host system runs a hypervisor that manages the virtual operating systems and supports one or more guest systems
  53. Virtualization Virtualization advantages New virtual server machines can be made available (host availability) and resources can easily be expanded or contracted as needed (host elasticity) Can reduce costs Fewer physical computers must be purchased and maintained Can provided uninterrupted server access to users Supports live migration which allows a virtual machine to be moved to a different physical computer with no impact to users
  54. Virtualization Virtualization advantages (cont’d.) Test latest patches by downloading on a virtual machine before installing on production computers A snapshot of a particular state of a virtual machine can be saved for later use Testing the existing security configuration (security control testing) can be performed using a simulated network environment A suspicious program can be loaded into an isolated virtual machine and executed (sandboxing) If malware, only the virtual machine will be impacted
  55. Virtualization Security for virtualized environments: A guest OS that has remained dormant may not contain the latest patches and security updates Not all hypervisors have the necessary security controls to keep out attackers Existing security tools were designed for single physical servers and do not always adapt well to multiple virtual machines Virtual machines must be protected from outside network and other virtual machines on the same computer
  56. Cloud Computing Cloud computing A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources It is a pay-per-use computing model Customers pay for only the resources they need Types of clouds Public cloud Community cloud Private cloud Hybrid cloud
  57. Cloud Computing Three service models of cloud computing Software as a Service (SaaS) Vendor provides access to the vendor’s software applications running on a cloud infrastructure Platform as a Service (PaaS) Consumers install and run their own specialized applications on the cloud computing network Infrastructure as a Service (IaaS) Vendor allows customers to deploy and run their own software, including OSs and applications
  58. Cloud Computing Table 8-8 Cloud computing characteristics
  59. Cloud Computing Cloud computing security challenges Cloud provider must guarantee means to approve authorized users and deny imposters Transmissions from the cloud must be protected Customers’ data must be isolated from other customers The highest level of application availability and security must be maintained
  60. Summary TCP/IP is the most common protocol for LANs and the Internet Protocols for transferring files FTP, FTPS, SFTP, SCP Storage area network (SAN) is a dedicated network storage facility that provides access to data storage over a high-speed network Router configuration must provide a secure network environment Flood guard defends against denial-of-service attacks
  61. Summary Networks can be configured to provide separation and increased security Securing ports is an important step in network management Unused ports should be disabled New network applications that have special security considerations IP telephony Virtualization Cloud computing