system and network security notes
system and network security notes
Key Concepts:
• Zero-Day Attacks:
• Capture and analyze all data packets in real time to identify suspicious
patterns.
Key Measures:
• Security Policies:
• Implement least privilege access controls, ensuring users can only access the
resources required for their role.
• Use IPS to actively block threats like malware or network exploits before they
compromise the system.
• Understand tools like SIEM and how they aggregate logs for real-time
monitoring.
• Focus on learning how firewalls, IPS, and access controls work together to
prevent intrusions.
Key Areas:
• Traditional Reconnaissance and Attacks:
• Reconnaissance: Attackers gather information about the network (e.g., IP
addresses, open ports, and services).
• Tools like Nmap and Wireshark can detect unauthorized scans.
• Attacks: Examples include Denial of Service (DoS), Man-in-the-Middle (MITM), and
SQL injection.
• Malicious Software:
• Includes viruses, worms, trojans, ransomware, and spyware.
• Preventive Measures:
• Use antivirus software.
• Regularly update patches and software to avoid exploits.
2. Defense in Depth
3. Preventive Measures
• Regular Audits: Identify and fix vulnerabilities in network configurations.
• Patch Management: Apply security updates to fix known vulnerabilities.
• Network Segmentation: Divide networks into smaller segments to limit the spread
of intrusions.
• Authentication Mechanisms:
• Multi-factor authentication (MFA) for stronger identity verification.
• Access Control Lists (ACLs): Limit access to resources based on roles.
5. Reactive Measures
• Isolate compromised systems to prevent lateral movement.
• Collect forensic evidence for post-incident analysis.
• Notify relevant stakeholders about detected threats and corrective actions.
6. Internet Security
• Internet Protocol Architecture:
• Understand layers (TCP/IP model) and their vulnerabilities.
• Threats: DDoS attacks, phishing, DNS poisoning, and session hijacking.
• Internet Security Checklist:
• Enforce HTTPS for secure communication.
• Use strong passwords and regularly rotate them.
• Implement email filtering to block phishing attempts.
1. Intranet Security
The intranet is the internal network of an organization, and securing it ensures the safety of
sensitive data and resources.
Key Topics:
• Smartphones and Tablets in the Intranet:
• These devices can introduce vulnerabilities like malware or unauthorized access.
• Use Mobile Device Management (MDM) tools to enforce policies, encryption, and
remote wiping.
• Security Considerations:
• Protect sensitive intranet data with firewalls, access controls, and encrypted
communication.
• Ensure devices connected to the intranet are free of malware and have updated
software.
• Plugging the Gaps:
• Network Access Control (NAC):
• Controls which devices can connect to the intranet based on their security
posture.
• Only devices meeting predefined policies (e.g., antivirus installed, patches
applied) are allowed access.
• Authentication and Encryption:
• Use strong authentication methods (e.g., MFA) and encryption protocols like
WPA2 or WPA3 for wireless communication.
• Wireless Network Security:
• Secure Wi-Fi networks with strong passwords and encryption.
• Disable WPS (Wi-Fi Protected Setup) to prevent brute-force attacks.
• User Training:
• Educate users on recognizing phishing attempts, avoiding malware, and following
security policies.
LANs are internal networks within an organization, connecting devices like computers,
printers, and servers. Ensuring LAN security prevents unauthorized access and attacks.
Key Topics:
• Identify Network Threats:
• Examples include ARP spoofing, unauthorized access, and malware propagation.
• Regular vulnerability assessments help identify and address these threats.
• Establish Network Access Controls:
• Implement role-based access control (RBAC) to restrict access based on user
roles.
• Use Access Control Lists (ACLs) to limit resource access.
• Incident-Handling Process:
• Steps:
• Detect and analyze the threat.
• Contain the incident to prevent further damage.
• Eradicate the root cause.
• Recover the affected systems.
• Conduct a post-incident review to prevent recurrence.
• Secure Design Through Network Access Controls:
• Use VLANs (Virtual LANs) to segment networks and isolate sensitive resources.
• Deploy firewalls and intrusion detection/prevention systems (IDS/IPS).
• Firewalls:
• Dynamic NAT Configuration:
• Use Network Address Translation (NAT) to mask internal IP addresses.
• Packet Filtering:
• Configure IP filtering routers to block unauthorized traffic.
• Application-Layer Firewalls (Proxy Servers):
• Inspect traffic at the application layer for enhanced security.
Unit 4: Local Area Network Security and Cellular Network Security from your syllabus:
LAN security focuses on protecting the resources and data within a local network from
unauthorized access, attacks, and disruptions.
Key Topics:
• Identify Network Threats:
• Examples:
• ARP spoofing: Attackers impersonate devices to intercept traffic.
• Packet sniffing: Monitoring network data for sensitive information.
• Malware propagation: Spread of malicious software across the LAN.
• Establish Network Access Controls:
• Use Access Control Lists (ACLs) to restrict access to critical resources.
• Implement Role-Based Access Control (RBAC) to assign permissions based on job
roles.
• Risk Assessment:
• List network resources, identify threats, and assess vulnerabilities.
• Perform regular vulnerability assessments to identify and mitigate security gaps.
• Security Policies:
• Establish and enforce comprehensive policies, such as:
• Password policies.
• Data sharing and transfer policies.
• Incident response plans.
• Incident-Handling Process:
• Steps to address network security incidents:
1. Detect the intrusion or threat.
2. Contain the incident to minimize damage.
3. Eradicate the source of the threat.
4. Recover affected systems.
5. Review and document the incident to improve future responses.
• Firewalls:
• Use IP filtering routers to block unwanted traffic.
• Employ proxy servers as application-layer firewalls for monitoring and controlling
traffic.
• Packet Filtering:
• Inspect incoming and outgoing packets based on IP, port, and protocol to allow or
block traffic.
• Dynamic NAT Configuration:
• Translate private IP addresses to a public IP to mask internal devices and prevent
direct access from outside.
Cellular networks introduce unique challenges due to their wide area coverage and diverse
devices.
Key Topics:
• The State of Cellular Network Security:
• Cellular networks are vulnerable to:
• Eavesdropping: Interception of calls or data.
• SMS spoofing: Sending fake messages to trick users.
• SIM cloning: Duplicating SIM cards to gain unauthorized access.
• Cellular Network Attack Taxonomy:
• Passive Attacks: Monitoring communication without altering it (e.g.,
eavesdropping).
• Active Attacks: Disrupting or manipulating communication (e.g., jamming, man-in-
the-middle attacks).
• Cellular Network Vulnerability Analysis:
• Common vulnerabilities include:
• Weak encryption algorithms in legacy networks (e.g., GSM).
• Lack of secure authentication mechanisms.
• RFID Security:
• Challenges:
• Data interception due to weak encryption.
• Unauthorized scanning of RFID tags.
• Protections:
• Use cryptographic techniques to secure data on RFID tags.
• Implement access control to limit scanning.
Unit 5: Cellular Network Security and RFID Security from your syllabus:
Cellular networks are essential for communication but are exposed to various
vulnerabilities and attack vectors. This section focuses on understanding these threats and
implementing protections.
Key Topics:
• State of the Art in Cellular Network Security:
• Modern cellular networks (e.g., 4G, 5G) have improved security compared to earlier
technologies (e.g., GSM).
• Enhanced features include:
• Stronger encryption (e.g., AES in LTE).
• Mutual authentication between devices and networks.
• Cellular Network Attack Taxonomy:
• Passive Attacks:
• Eavesdropping on calls or data due to weak encryption.
• Active Attacks:
• Jamming: Disrupting cellular signals to make the network unavailable.
• Spoofing: Pretending to be a legitimate base station to intercept
communication.
• Man-in-the-Middle (MITM): Intercepting and manipulating communication
between two parties.
• Cellular Network Vulnerability Analysis:
• Vulnerabilities:
• Legacy protocols (e.g., GSM) with weak or no encryption.
• Lack of robust authentication mechanisms.
• Solutions:
• Use secure protocols like LTE and 5G.
• Implement strong authentication mechanisms.
RFID systems are used in various applications like inventory management, access control,
and tracking. However, they have their own security challenges.
Key Topics:
• RFID Challenges:
• Eavesdropping: Interception of data transmitted between RFID tags and readers.
• Replay Attacks: An attacker reuses intercepted communication to gain
unauthorized access.
• Cloning: Copying an RFID tag to create a duplicate.
• RFID Protections:
• Encryption:
• Encrypt data stored on RFID tags to prevent unauthorized access.
• Authentication:
• Implement mutual authentication between RFID tags and readers.
• Access Control:
• Restrict access to RFID tags and ensure only authorized readers can interact
with them.
• Faraday Cages:
• Block RFID signals to prevent unauthorized scanning.
Text Mode:
1. Boot the system and access the terminal.
2. Enter the username and password.
3. Use commands like ls, pwd, and cd to explore the system.
Graphical Mode:
1. Boot the system and access the desktop environment (e.g., GNOME, KDE).
2. Login through the graphical login screen with your credentials.
zone "example.com" {
type master;
file "/etc/bind/db.example.com";
};
$TTL 604800
@ IN SOA ns1.example.com. admin.example.com. (
2 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire
604800 ) ; Negative Cache TTL
@ IN NS ns1.example.com.
ns1 IN A 192.168.1.10
www IN A 192.168.1.10
5. Test:
Use nslookup example.com.
4. Test FTP:
• Connect using an FTP client (e.g., FileZilla) or command line:
ftp localhost
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
User-agent: *
Disallow: /
import socket
while True:
data = conn.recv(1024).decode()
if not data:
break
conn.send(data.swapcase().encode())
conn.close()
import socket
while True:
msg = input("Enter message: ")
client.send(msg.encode())
print("Response:", client.recv(1024).decode())
text = "HELLO"
shift = 3
print("Encrypted:", caesar_cipher(text, shift))
Study Tip:
• Set up a Virtual Lab using tools like VirtualBox with Linux, Windows, and
Metasploitable VMs.
• Practice coding tasks for algorithms and client-server communication.