0% found this document useful (0 votes)
11 views34 pages

Network Security-P1

Network Security-p1

Uploaded by

abualaze3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views34 pages

Network Security-P1

Network Security-p1

Uploaded by

abualaze3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 34

Network Security

Course Outlines

 Introduction
 security architectures, designs and models
 L2 Security
 L3 Security
 Hardening Network devices
 Encryption techniques
 ACL
 AAA
 NAC
 VPN
 Firewall (ACL, Zones, etc.)
 IDS
References
Network security | Definition

 Information Security involves all type of


information (digital or non-digital)
 Network security is the protection of the
underlying networking infrastructure from
unauthorized access, misuse, or theft.
 Network security involves creating a secure
infrastructure for devices, applications, and
users to work in a secure manner.
 It consists of measures to deter, prevent, detect,
and correct security violations that involve the
transmission of information.
Network Security vs. Internet
Security

 Network Security: Measures to protect data during transmission


 Internet Security: Measures to protect data during transmission over a
collection of interconnected networks.
Computer Security | Key Objectives

 Confidentiality
 Integrity (changes only occur in a specified and authorized manner)
 Availability (service is not denied to authorized users)
Computer Security | Key Objectives

 Confidentiality (covers two related concepts)


 Data confidentiality : Assures that private or confidential information is not
made available or disclosed to unauthorized individuals.
 Privacy: Assures that individuals control or influence what information related to them may
be collected and stored and by whom and to whom that information may be disclosed.
 Integrity (changes only occur in a specified and authorized manner)
 Availability (service is not denied to authorized users)
Computer Security | Key Objectives

 Confidentiality
 Integrity (changes only occur in a specified and authorized manner)
 Data Integrity: data/programs (both stored and in transmit) are not altered/changed
 System Integrity: System performs its functions
 Availability
Computer Security | Key Objectives

 Confidentiality
CIA
 Integrity (changes only occur in a specified and authorized manner)
Triad
 Availability (systems works promptly and service is not denied to authorized users)
Computer Security | Key Objectives

FIPS 199 provides a useful characterization of the three CIA objectives in terms of
requirements and the definition of a loss of security in each category.

Objective Requirements Loss of Objective Indicators


Confidentiality Preserving authorized restrictions on unauthorized disclosure of
information access and disclosure, including information
means for protecting personal privacy and
proprietary information
Integrity Guarding against improper information unauthorized modification or
modification or destruction, including destruction of information
ensuring information nonrepudiation and
authenticity
Availability Ensuring timely and reliable access to and disruption of access to or use of
use of information information or an information
system
Computer Security | Key Objectives

 Confidentiality
 Integrity (changes only occur in a specified and authorized manner)
 Availability (service is not denied to authorized users)
Extra Objectives (as seen by some in the security field):
 Authenticity: The property of being genuine and being able to be verified and trusted.
 Accountability: trace a security breach to a responsible party. This support
nonrepudiation, deterrence, fault isolation, intrusion detection and prevention,
and after-action recovery and legal action
 Why Accountability is important? Since Since truly secure systems are not yet an achievable
truly secure systems are not yet an achievable goal,
goal, we must be able to trace a security breach toparty.
we must be able to trace a security breach to a responsible a responsible
Systems must party.
keepSystems
records ofmust
keepactivities
their recordstoofpermit
their later
activities to analysis
forensic permit later forensic
to trace analysis
security toortrace
breaches to aidsecurity breaches
in transaction
or to aid
disputes 1 in transaction disputes 1.
.
Computer Security | Key Objectives
Security Breach | Impact Level

 Low
 Moderate
 High
Security Breach | Impact Level

 Low
 Cause a degradation in mission capability to an extent and duration that
the
organization is able to perform its primary functions, but the effectiveness
of the
functions is noticeably reduced;
 Result in minor damage to organizational assets;
 Result in minor financial loss;
 Result in minor harm to individuals.
 Moderate
 High
Security Breach | Impact Level

 Low
 Moderate (Serious adverse effect on organizational operations, assets, or individuals. )
 cause a significant degradation in mission capability to an extent and duration that the
organization is able to perform its primary functions, but the effectiveness of the functions
is
significantly reduced;
 Result in significant damage to organizational assets;
 Result in significant financial loss;
 Result in significant harm to individuals that does not involve loss of life or serious, life-
threatening injuries.
 High
Security Breach | Impact Level

 Low
 Moderate
 High (a severe or catastrophic adverse effect on organizational operations, assets, or
individuals)
 Cause a severe degradation in or loss of mission capability to an extent and duration that the
organization is not able to perform one or more of its primary functions;
 Result in major damage to organizational assets;
 Result in major financial loss;
 Result in severe or catastrophic harm to individuals involving loss of life or serious, life-
threatening injuries.
Threats and Attacks (RFC 4949)

 Threat
 is a possible danger that might exploit a vulnerability.
 Attack
 An assault on system security that derives from an intelligent threat. That is,
an intelligent act that is a deliberate attempt (especially in the sense of a
method or technique) to evade security services and violate the security
policy of a system.
X.800 | OSI Security Architecture

 Is an OSI Security Architecture


 Define a systematic way for defining and providing security
requirements
 Defines security requirements and specifies means by which these
requirements might be satisfied
 Useful to managers as a way of organizing the tasks of providing
security
 Focuses on security attacks, mechanisms, and services.
X.800 | OSI Security Architecture

 Security attack: Any action that compromises the security of information


owned by an organization.
 Security mechanism: A process (or a device incorporating such a process) that
is designed to detect, prevent, or recover from a security attack.
 Security service: A processing or communication service that enhances the
security of the data processing systems and the information transfers of an
organization. The services are intended to counter security attacks, and
they make use of one or more security mechanisms to provide the service.
X.800 | Security Attack

 Passive attacks (eavesdropping or monitoring transmission to obtain information


-- are very difficult to detect)
 Active attack
X.800 | Security Attack | Passive

 Passive attacks (eavesdropping or monitoring transmission to obtain


information -- are very difficult to detect----Why?)
 release of message contents
 traffic analysis
X.800 | Security Attack | Attack

 Active attack:
 Masquerade (one entity pretends to be a different entity - impersonation)
 Replay
 Modification of messages (messages are delayed,
reordered, or altered to produce an unauthorized effect)
 Denial of Service
X.800 | Security Service

 A processing or communication service that is provided by a system to give a specific kind of


protection to system resources; security services implement security policies and are
implemented by security mechanisms.
 A service that is provided by a system to ensure adequate security of the systems or of data
transfers
 Services are intended to counter security attacks
 They use security mechanisms to provide the service.
 X.800 divides Security Service into five categories:
 Authentication
 Access Control
 Data Confidentiality
 Data Integrity
 Nonrepudiation
X.800 | Security Service Categories

 Authentication : Assures that a communication is authentic


 Peer entity Authentication: Used in association with a logical connection to provide
confidence in the identity of the entities connected.(provide confidence that an entity is
not performing either a masquerade or an unauthorized replay of a previous
connection.)
 Data-Origin Authentication: In a connectionless transfer, provides assurance that the
source of received data is as claimed (It does not provide protection against the
duplication or modification of data units)
 Access Control
 Data Confidentiality
 Data Integrity
 Nonrepudiation
X.800 | Security Service Categories

 Authentication
 Access Control:
 Who can have an access to a resource, under what condition, and what is allowed to be
done
 Data Confidentiality
 Data
 Nonrepudiation
X.800 | Security Service Categories

 Authentication
 Access Control
 Data Confidentiality
 Connection Confidentiality: (The protection of all user data on a connection)
 Connectionless Confidentiality: The protection of all user data in a single data block
 Selective-Field Confidentiality:
 Traffic-Flow Confidentiality: The protection of the information that might be derived
from observation of traffic flows (e.g. source and destination, frequency, length, etc.).
 Data Integrity
 Nonrepudiation
X.800 | Security Service Categories

 Authentication
 Access Control
 Data Confidentiality
 Data Integrity : The assurance that data received contain no duplication,
modification, insertion, deletion, reordering or replay)
 Connection Integrity with Recovery
 Connection Integrity without Recovery
 Selective-Field Connection Integrity
 Connectionless Integrity (protect messages from modification only)
 Selective-Field Connectionless Integrity
 Nonrepudiation (Nonrepudiation-Origin, Nonrepudiation-Destination)
X.800 | Security Service Categories

 Authentication
 Access Control
 Data Confidentiality
 Data Integrity
 Nonrepudiation
 Nonrepudiation (Origin)
 Nonrepudiation(Destination)
X.800 | Security Mechanisms

 A process(or a device incorporating such a process) that is designed to detect,


prevent, or recover from a security attack.
 The security mechanisms are divided into those that are implemented in a
specific protocol layer, such as TCP or an application-layer protocol, and those
that are not specific to any particular protocol layer or security service.
 Specific security mechanisms
 Are incorporated into the appropriate protocol layer in order to provide some of the OSI
security services.
 Pervasive security mechanisms
 Are not specific to any particular OSI security service or protocol layer.
X.800 | Security Mechanisms

 Specific security mechanisms


 Encipherment: The use of mathematical algorithms to transform data into a form that is not readily
intelligible.
 Digital Signature: Data appended to allow recipient to prove the source and data integrity.
 Access Control: A variety of mechanisms that enforce access rights to resources
 Data Integrity: A variety of mechanisms used to assure the integrity of a data unit or stream of data units.
 Authentication exchange: A mechanism intended to ensure the identity of an entity by means of
information exchange.
 Traffic Padding: to frustrate traffic analysis attempts
 Routing Control
 Notarization: The use of a trusted third party to assure certain properties of a data exchange.
 Pervasive security mechanisms
X.800 | Security Mechanisms

 Specific security mechanisms


 Pervasive security mechanisms
 Trusted Functionality: That which is perceived to be correct with respect to some
criteria (e.g., as established by a security policy). Any functionality that directly provides,
or provides access to, security mechanisms should be trustworthy.
 Security Label
 Event Detection
 Security Audit Trail: Data collected and potentially used to facilitate a security audit,
which is an independent review and examination of system records and activities.
 Security Recovery: Deals with requests from mechanisms, such as event handling and
management functions, and takes recovery actions.
Security Services and Mechanisms |
Relationship
Fundamental Security Design
Principles

 Economy of mechanism: Eliminate unnecessary complexity. small design is easier to test


and verify thoroughly
 Fail-safe defaults: (default situation is lack of access) access decisions should be based
on permission rather than exclusion. What if there is any mistakes?
 Complete mediation:
 Open design: open designs/algorithms can be reviewed by experts and therefore we can
have high confidence in them.
 Separation of privilege: is defined in [SALT75] as a practice in which multiple privilege
attributes are required to achieve access to a restricted resource.
 Least privilege: Only limited and essential privileges should be assigned to the user to
perform the desired task.
 Least common mechanism: The design should minimize the functions shared by
different users reduce the number of unintended communication paths.
Fundamental Security Design
Principles

 Least common mechanism: The design should minimize the functions shared by different users reduce the
number of unintended communication paths
 Psychological acceptability: (introduce minimum hurdles to the user)The design should not interfere with
the working of the user unduly. Users may opt to disable those mechanisms if it became irritating. security
mechanisms should be transparent to the users of the system or at most introduce minimal obstruction.
 Isolation: Isolate public access systems from critical resources (physically or logically), users’ files and
process from one another except when explicitly desired, and finally isolate security mechanisms from
unwanted access.
 Encapsulation:
 Modularity: support migration to new technology or upgrade of new features without requiring an entire
system redesign.
 Layering(defense in depth): the failure or circumvention of any individual protection approach (in an
overlapping protection approach) will not leave the system unprotected
 Least astonishment: a program or user interface should always respond in the way that is least likely to
astonish the user

You might also like