Internet Security
Internet Security
VPN stands for Virtual Private Network. It refers to a safe and encrypted network that
allows you to use network resources in a remote manner. Using VPN, you can create a
safe connection over a less secure network, e.g. internet. It is a secure network as it is
completely isolated from rest of the internet. The government, businesses, military can
use this network to use network resources securely.
VPN is free to use and it uses site-to-site and remote access methods to work. It uses an
arrangement of encryption services to establish a secure connection. It is an ideal tool
for encryption; it provides you strong AES256 encryption with an 8192bit key.
VPN protocols
There are several different VPN protocols that are used to create secure networks. Some
of such protocols are given below;
o IP security (IPsec)
o Point to Point Tunneling Protocol (PPTP)
o Layer 2 Tunneling Protocol (L2TP)
o Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
Requirements in SET :
The SET protocol has some requirements to meet, some of the important requirements
are :
1. Cardholder – customer
2. Issuer – customer financial institution
3. Merchant
4. Acquirer – Merchant financial
5. Certificate authority – Authority that follows certain standards and issues
certificates(like X.509V3) to all other participants.
SET functionalities :
Provide Authentication
Merchant Authentication – To prevent theft, SET allows customers to
check previous relationships between merchants and financial institutions.
Standard X.509V3 certificates are used for this verification.
Customer / Cardholder Authentication – SET checks if the use of a
credit card is done by an authorized user or not using X.509V3 certificates.
Provide Message Confidentiality: Confidentiality refers to preventing unintended
people from reading the message being transferred. SET implements confidentiality
by using encryption techniques. Traditionally DES is used for encryption purposes.
Provide Message Integrity: SET doesn’t allow message modification with the help
of signatures. Messages are protected against unauthorized modification using RSA
digital signatures with SHA-1 and some using HMAC with SHA-1,
Dual Signature :
The dual signature is a concept introduced with SET, which aims at connecting two
information pieces meant for two different receivers :
Order Information (OI) for merchant
Payment Information (PI) for bank
You might think sending them separately is an easy and more secure way, but sending
them in a connected form resolves any future dispute possible. Here is the generation of
dual signature:
Where,
Here,
PI, OIMD, OI all have the same meanings as before.
The new things are :
EP which is symmetric key encryption
Ks is a temporary symmetric key
KUbank is public key of bank
CA is Cardholder or customer Certificate
Digital Envelope = E(KUbank, Ks)
Purchase Request Validation on Merchant Side :
The Merchant verifies by comparing POMD generated through PIMD hashing with
POMD generated through decryption of Dual Signature as follows:
Since we used Customer’s private key in encryption here we use KUC which is the
public key of the customer or cardholder for decryption ‘D’.
Handshake Protocol:
Handshake Protocol is used to establish sessions. This protocol allows the
client and server to authenticate each other by sending a series of messages to
each other. Handshake protocol uses four phases to complete its cycle.
Phase-1: In Phase-1 both Client and Server send hello-packets to each
other. In this IP session, cipher suite and protocol version are exchanged for
security purposes.
Phase-2: Server sends his certificate and Server-key-exchange. The server
end phase-2 by sending the Server-hello-end packet.
Phase-3: In this phase, Client replies to the server by sending his certificate
and Client-exchange-key.
Phase-4: In Phase-4 Change-cipher suite occurred and after this
Handshake Protocol ends.
SSH(Secure Shell) is access credential that is used in the SSH Protocol. In other words,
it is a cryptographic network protocol that is used for transferring encrypted data over
network. It allows you to connect to a server, or multiple servers, without having you to
remember or enter your password for each system that is to login remotely from one
system into another.
It always comes in key pair:
1. Public key – Everyone can see it, no need to protect it. (for encryption function)
2. Private key – Stays in computer, must be protected. (for decryption function)
Key pairs can be of the following types:
1. User Key – If public key and private key remain with the user.
2. Host Key – If public key and private key are on a remote system.
3. Session key – Used when large amount of data is to be transmitted.
How SSH Works ?
It uses asymmetric cipher for performing encryption and decryption. There are many
encryption methods:
Public keys from the local computers (system) are passed to the server which is to be
accessed.
Server then identifies if the public key is registered.
If so, the server then creates a new secret key and encrypts it with the public key
which was send to it via local computer.
This encrypted code is send to the local computer.
This data is unlocked by the private key of the system and is send to the server.
Server after receiving this data verifies the local computer.
SSH creates a route and all the encrypted data are transferred through it with no
security issues.
SSH is key based authentication that is not prone to brute-force attack.
It is more convenient and secure than login ids and passwords (which can be stolen in
middle). There is no exposure of valid credentials, if a server has been compromised.
Generating an SSH key pair:
Apart from that, there are cloud-based firewalls. They are commonly referred to as FaaS
(firewall as a service). A primary advantage of using cloud-based firewalls is that they
can be managed centrally. Like hardware firewalls, cloud-based firewalls are best known
for providing perimeter security.
Why Firewall
Firewalls are primarily used to prevent malware and network-based attacks. Additionally,
they can help in blocking application-layer attacks. These firewalls act as a gatekeeper or
a barrier. They monitor every attempt between our computer and another network. They
do not allow data packets to be transferred through them unless the data is coming or
going from a user-specified trusted source.
Firewalls are designed in such a way that they can react quickly to detect and counter-
attacks throughout the network. They can work with rules configured to protect the
network and perform quick assessments to find any suspicious activity. In short, we can
point to the firewall as a traffic controller.
Open Access
If a computer is running without a firewall, it is giving open access to other networks.
This means that it is accepting every kind of connection that comes through someone.
In this case, it is not possible to detect threats or attacks coming through our network.
Without a firewall, we make our devices vulnerable to malicious users and other
unwanted sources.
Network Crashes
In the absence of a firewall, anyone could access our network and shut it down. It may
lead us to invest our valuable time and money to get our network working again.
Therefore, it is essential to use firewalls and keep our network, computer, and data safe
and secure from unwanted sources.
Brief History of Firewall
Firewalls have been the first and most reliable component of defense in network security
for over 30 years. Firewalls first came into existence in the late 1980s. They were initially
designed as packet filters. These packet filters were nothing but a setup of networks
between computers. The primary function of these packet filtering firewalls was to check
for packets or bytes transferred between different computers.
Firewalls have become more advanced due to continuous development, although such
packet filtering firewalls are still in use in legacy systems.
As the technology emerged, Gil Shwed from Check Point Technologies introduced the
first stateful inspection firewall in 1993. It was named as FireWall-1. Back in
2000, Netscreen came up with its purpose-built firewall 'Appliance'. It gained
popularity and fast adoption within enterprises because of increased internet speed, less
latency, and high throughput at a lower cost.
The turn of the century saw a new approach to firewall implementation during the mid-
2010. The 'Next-Generation Firewalls' were introduced by the Palo Alto Networks.
These firewalls came up with a variety of built-in functions and capabilities, such as
Hybrid Cloud Support, Network Threat Prevention, Application and Identity-Based
Control, and Scalable Performance, etc. Firewalls are still getting new features as part of
continuous development. They are considered the first line of defense when it comes to
network security.
Typically, firewalls intercept network traffic at a computer's entry point, known as a port.
Firewalls perform this task by allowing or blocking specific data packets (units of
communication transferred over a digital network) based on pre-defined security rules.
Incoming traffic is allowed only through trusted IP addresses, or sources.
Functions of Firewall
As stated above, the firewall works as a gatekeeper. It analyzes every attempt coming to
gain access to our operating system and prevents traffic from unwanted or non-
recognized sources.
Since the firewall acts as a barrier or filter between the computer system and other
networks (i.e., the public Internet), we can consider it as a traffic controller. Therefore, a
firewall's primary function is to secure our network and information by controlling
network traffic, preventing unwanted incoming network traffic, and validating access by
assessing network traffic for malicious things such as hackers and malware.
Generally, most operating systems (for example - Windows OS) and security software
come with built-in firewall support. Therefore, it is a good idea to ensure that those
options are turned on. Additionally, we can configure the security settings of the system
to be automatically updated whenever available.
Firewalls have become so powerful, and include a variety of functions and capabilities
with built-in features:
Limitations of Firewall
When it comes to network security, firewalls are considered the first line of defense. But
the question is whether these firewalls are strong enough to make our devices safe from
cyber-attacks. The answer may be "no". The best practice is to use a firewall system
when using the Internet. However, it is important to use other defense systems to help
protect the network and data stored on the computer. Because cyber threats are
continually evolving, a firewall should not be the only consideration for protecting the
home network.
The importance of using firewalls as a security system is obvious; however, firewalls have
some limitations:
o Proxy Firewall
o Packet-filtering firewalls
o Stateful Multi-layer Inspection (SMLI) Firewall
o Unified threat management (UTM) firewall
o Next-generation firewall (NGFW)
o Network address translation (NAT) firewalls
A packet filtering firewall is a network security feature that controls the flow of incoming
and outgoing network data. The firewall examines each packet, which comprises user
data and control information, and tests them according to a set of pre-established rules.
If the packet completes the test successfully, the firewall allows it to pass through to its
destination. It rejects those that don't pass the test. Firewalls test packets by examining
sets of rules, protocols, ports and destination addresses.
Headers: Packet headers direct the data to its desired destination. They contain
portions of internet protocol (IP), addressing and any other data required to get
the packets where they're meant to go.
Payloads: The payload is the user data within the packet. This is the information
that's trying to get to its destination.
A static packet filtering firewall requires you to establish firewall rules manually.
Similarly, internal and external network connections remain either open or closed unless
otherwise adjusted by an administrator. These firewall types allow users to define rules
and manage ports, access control lists (ACLs) and IP addresses. They're often simple and
practical, making them an apt choice for smaller applications or users without a lot of
criteria.
Dynamic firewalls allow users to adjust rules dynamically to reflect certain conditions.
You can set ports to remain open for specified periods of time and to close
automatically outside those established time frames. Dynamic packet filtering firewalls
offer more flexibility than static firewalls because you can set adjustable parameters and
automate certain processes.
3. Stateless packet filtering firewall
Stateless packet filtering firewalls are perhaps the oldest and most established firewall
option. While they're less common today, they do still provide functionality for
residential internet users or service providers who distribute low-power customer-
premises equipment (CPE). They protect users against malware, non-application-specific
traffic and harmful applications. If users host servers for multi-player video games, email
or live-streamed videos, for example, they often must manually configure firewalls if
they plan to deviate from default security policies. Manual configurations allow different
ports and applications through the packet filter.
Unlike stateless packet filtering options, stateful firewalls use modern extensions to track
active connections, like transmission control protocol (TCP) and user datagram protocol
(UDP) streams. By recognizing incoming traffic and data packets' context, stateful
firewalls can better identify the difference between legitimate and malicious traffic or
packages. Typically, new connections must introduce themselves to the firewall before
they gain access to the approved list of allowed connections.
Efficiency
One of the primary advantages of packet filtering firewalls is their efficiency. Routers
typically operate at high speeds, accepting and rejecting packets quickly based on their
destinations, source ports and addresses. Inbound and outbound packets are often only
held for a few milliseconds while the filter determines its destination and legitimacy.
Most other firewall techniques have performance overheads that exceed those of packet
filtering firewalls.
Transparency
Another benefit is transparency. While users are aware of firewalls when they reject a
packet, packet filters typically operate quickly and discreetly without interfering with
user functionality. Some other techniques require users to configure firewalls for specific
clients or servers manually. In this way, packet filtering firewalls are user-friendly and
easy to incorporate.
Affordability
Many routers offer built-in packet filtering, making them inexpensive. By providing built-
in functionality, software routing products and other widely used hardware offer cheap
and affordable security options. Many websites use packet filtering techniques in their
routers too. Packet filtering firewalls' ubiquitous use makes them one of the most
affordable security options.
Accessibility
Besides its affordability, the ease of its use makes packet filtering an appealing option.
With this security technique, you can protect an entire network with a single screening
router. Users don't need extensive knowledge, training or support to operate firewalls
because they won't be aware of packet transmission unless there's a rejection.
There are several potential drawbacks of packet filtering to be aware of, including:
Reduced security
One potential drawback of packet filtering firewalls is their reduced security. Because
they're so accessible and commonly used, hackers have exploited rules and invaded
systems. Stateless packet filtering firewalls can be vulnerable because they test each
packet on its own, creating more opportunities for hacks. Hackers can use fake IP
addresses in packets to intrude networks because most packet filters don't provide
safety from address spoofing. However, stateful options remove some of these risks.
And, in some applications, security isn't a top priority or concern.
Inflexibility
Inconsistent applicability
Application Layer
The application layer in the OSI model is the closest layer to the end user which means
that the application layer and end user can interact directly with the software
application. The application layer programs are based on client and servers.
o In Client-server architecture, clients do not directly communicate with each other. For
example, in a web application, two browsers do not directly communicate with each
other.
o A server is fixed, well-known address known as IP address because the server is always
on while the client can always contact the server by sending a packet to the sender's IP
address.
o P2P (peer-to-peer) architecture: It has no dedicated server in a data center. The peers
are the computers which are not owned by the service provider. Most of the peers reside
in the homes, offices, schools, and universities. The peers communicate with each other
without passing the information through a dedicated server, this architecture is known as
peer-to-peer architecture. The applications based on P2P architecture includes file
sharing and internet telephony.
In other words, we can say that the proxy server allows us to access any websites with a
different IP address. It plays an intermediary role between users and targeted websites
or servers. It collects and provides information related to user requests. The most
important point about a proxy server is that it does not encrypt traffic.
1. If the requested data or page already exists in the local cache, the proxy server itself
provides the required retrieval to the client.
2. If the requested data or page does not exist in the local cache, the proxy server forwards
that request to the destination server.
3. The proxy servers transfer the replies to the client and also being cached to them.
Therefore, it can be said that the proxy server acts as a client as well as the server.
1. Open or Forward Proxy Server: It is the most widely recognized type of intermediary
worker that is gotten to by the customer. An open or forward proxy server refers to
those sorts of intermediaries that get demands from web clients and afterward peruse
destinations to gather the mentioned information. After collecting the data from the
sites, it forwards the data to the internet users directly. It bypasses the firewall made by
authorities. The following image shows forward proxy configuration.
Headers: Packet headers direct the data to its desired destination. They
contain portions of internet protocol (IP), addressing and any other data
required to get the packets where they're meant to go.
Payloads: The payload is the user data within the packet. This is the
information that's trying to get to its destination.
Stateless packet filtering firewalls are perhaps the oldest and most
established firewall option. While they're less common today, they do still
provide functionality for residential internet users or service providers who
distribute low-power customer-premises equipment (CPE). They protect users
against malware, non-application-specific traffic and harmful applications. If
users host servers for multi-player video games, email or live-streamed
videos, for example, they often must manually configure firewalls if they plan
to deviate from default security policies. Manual configurations allow different
ports and applications through the packet filter.
Efficiency
Transparency
Another benefit is transparency. While users are aware of firewalls when they
reject a packet, packet filters typically operate quickly and discreetly without
interfering with user functionality. Some other techniques require users to
configure firewalls for specific clients or servers manually. In this way, packet
filtering firewalls are user-friendly and easy to incorporate.
Affordability
Many routers offer built-in packet filtering, making them inexpensive. By
providing built-in functionality, software routing products and other widely used
hardware offer cheap and affordable security options. Many websites use
packet filtering techniques in their routers too. Packet filtering firewalls'
ubiquitous use makes them one of the most affordable security options.
Accessibility
Besides its affordability, the ease of its use makes packet filtering an
appealing option. With this security technique, you can protect an entire
network with a single screening router. Users don't need extensive
knowledge, training or support to operate firewalls because they won't be
aware of packet transmission unless there's a rejection.
Reduced security
Inflexibility
Inconsistent applicability