UNIT 4
UNIT 4
Understanding Firewalls
Before we explore the different types of firewalls, let’s briefly touch on what
they do. At its core, a firewall is a network security device that grants or rejects
network access to traffic flows between an untrusted zone (e.g., the Internet)
and a trusted zone (e.g., a private network), based on a defined set of security
rules. Firewalls are crucial for preventing unauthorized access and are
implemented in hardware, software or a combination of both.
i) STATEFUL FIREWALL:
A stateful firewall inspects everything inside data packets, the
characteristics of the data, and its channels of communication. Stateful
firewalls examine the behavior of data packets, and if anything seems off, they
can filter out the suspicious data. Also, a stateful firewall can track how the
data behaves, cataloging patterns of behavior.
If a data packet examination reveals suspicious behavior—even if that kind of
behavior has not been manually inputted by an administrator—the firewall can
recognize it and address the threat. A stateful firewall can be used at the edge
of a network or within, as is the case with an internal segmentation firewall
(ISFW), which protects specific segments of the network in the event malicious
code gets inside.
ii) STATELESS FIREWALL:
Stateless firewalls make use of a data packet's source, destination, and other
parameters to figure out whether the data presents a threat. These parameters
have to be entered by either an administrator or the manufacturer via rules
they set beforehand.
If a data packet goes outside the parameters of what is considered acceptable,
the stateless firewall protocol will identify the threat and then restrict or block
the data housing it.
iii) NEXT GENERATION FIREWALL:
A next-generation firewall (NGFW) augments traditional firewall
technology with other network device filtering functions, such as inline
application control, an integrated intrusion prevention system (IPS), threat
prevention capabilities, and advanced malware protection, to improve
enterprise network security.
Benefits of IDS
Detects Malicious Activity: IDS can detect any suspicious activities and
alert the system administrator before any significant damage is done.
Improves Network Performance: IDS can identify any performance
issues on the network, which can be addressed to improve network
performance.
Compliance Requirements: IDS can help in meeting compliance
requirements by monitoring network activity and generating reports.
Provides Insights: IDS generates valuable insights into network traffic,
which can be used to identify any weaknesses and improve network
security.
Detection Methods of IDS
1. Signature-Based Method:
o Detects attacks by identifying specific patterns (signatures) like the
number of bytes, 1s, or 0s in network traffic or known malicious
sequences.
o Effective for known threats but struggles to detect new malware
as their signatures are unknown.
2. Anomaly-Based Method:
o Uses machine learning to create a model of normal activity and
flags deviations as suspicious.
o Effective for detecting unknown malware and can adapt to
applications and hardware configurations, offering better
generalization than signature-based methods.
Network Segmentation
Network segmentation is the process of dividing a computer network into
smaller, isolated segments or subnets. Each segment contains specific devices
or resources and is separated from other segments by network devices like
routers, switches, or firewalls. For example, in an organization, the sales and
finance teams have separate networks and cannot access each other's files
unless traffic passes through a router and firewall.
Traffic Filtering: A firewall monitors traffic coming from the internet and
directs it to the appropriate servers in DMZ based on the predefined
rules.
Inbound and Outbound Access: The DMZ allows inbound access from
the external network to the DMZ servers but access to the internal
network from DMZ is tightly controlled or completely blocked.
VPN
A virtual private network (VPN) is a technology that creates a safe and
encrypted connection over a less secure network, such as the Internet. A
Virtual Private Network is a way to extend a private network using a public
network such as the Internet. The name only suggests that it is a “Virtual
Private Network”, i.e. user can be part of a local network sitting at a remote
location. It makes use of tuneling protocols to establish a secure connection.
1. Establishing a Connection:
o The client sends a request to the server, initiating a
handshake.
o During the handshake, the client and server exchange
cryptographic keys to establish a secure communication
channel.
2. Authentication:
The server verifies the client’s identity using password-based or
key-based methods.
3. Encrypted Communication:
Once authenticated, all data transferred between the client and
server is encrypted.
Endpoint Security
Endpoint security is the process of securing endpoints such as workstations,
and servers against threats and cyberattacks. Endpoint security software
allows enterprises to protect the devices used for business purposes, as well
as servers on a network or in the cloud, against cyber attacks.
Examples of Endpoints
Any computing device, usually a user-end device connected to an
organization’s network, is an endpoint.
Tablets
Mobile devices
Smartwatches
Endpoint Security Measures
Endpoint security focuses on protecting individual devices (endpoints) like
computers, laptops, servers, and mobile devices, as these are often the entry
points for cyberattacks. The three primary measures include antivirus, anti-
malware, and endpoint detection and response (EDR).
1. Antivirus
Antivirus software is a basic yet critical component of endpoint security.
Purpose: To detect, prevent, and remove known viruses and other
malicious programs.
How it Works:
o Scans files, software, and attachments for known malware
signatures (patterns of malicious code).
o Regularly updates its database to recognize new threats.
Advantages:
o Protects against common threats like worms, Trojans, and
adware.
o Provides real-time scanning of files during use, download, or
transfer.
Limitations:
o Ineffective against unknown or sophisticated threats that lack a
signature in its database.
2. Anti-Malware
Anti-malware is an advanced protection solution that extends beyond
traditional antivirus.
Purpose: To safeguard endpoints against a wider range of threats,
including:
o Spyware: Software that secretly collects user data.
o Ransomware: Malware that locks or encrypts data until a ransom
is paid.
o Trojans: Malware disguised as legitimate software.
o Rootkits: Malicious tools that grant attackers administrative
privileges.
How it Works:
o Uses behavior-based detection to identify suspicious activities
rather than relying solely on signatures.
o Analyzes code and execution patterns to block threats in real
time.
Advantages:
o Offers broader protection by detecting and eliminating threats
missed by antivirus software.
o Combats both known and zero-day threats (new vulnerabilities
not yet documented).