+ All Categories
Home > Documents > Cryptography and Network Security

Cryptography and Network Security

Date post: 31-Oct-2014
Category:
Upload: raavan-ragav
View: 29 times
Download: 2 times
Share this document with a friend
Description:
This ppt says about the types of security models available in Network Security
Popular Tags:
33
SECURITY MODELS ~ R. Ragavan, and E. Adhithyan
Transcript
Page 1: Cryptography and Network Security

SECURITY MODELS~ R. Ragavan, and E. Adhithyan

Page 2: Cryptography and Network Security

TYPES:

•Host Security Model, and •Network Security Model

Page 3: Cryptography and Network Security

HOST SECURITY MODEL

Page 4: Cryptography and Network Security

Host Computer:

• Is nothing but a main or controlling computer connected to other computers or terminals to which it provides data or computing services via a network,.

• Example: A server in a client server architecture.

• In peer-to-peer networking, every computer is a peer and also a host to every other computer connected to the network.

Page 5: Cryptography and Network Security
Page 6: Cryptography and Network Security

Fig: Micro-Kernel Architecture

Page 7: Cryptography and Network Security

Secure host configuration

Unix-like systems

Page 8: Cryptography and Network Security

Common Unix Configuration Weaknesses:

• Password management issues:• weak passwords

• default passwords

• re-used passwords

• Exploitable services• FTP/TFTP

• Sendmail

• other services

• Improper file and directory permissions

• Improper use of setuid

• Improper network file configuration

• Unpatched known vulnerabilities

Page 9: Cryptography and Network Security

Available Options:

1. Basic UNIX access control

2. File permissions

3. Changing ownership and permissions

4. Effective ID

5. RPC Utilities

Page 10: Cryptography and Network Security

Host Security Tools:

• Expert – Tools “know about” and look for problems

– Based on past experience

– Won’t recognize “magic” security holes

• Audit and Monitoring– Good for damage control

– Useful for identifying well-known attacks in Progress.

Page 11: Cryptography and Network Security

Host Security Tools: (cont.)

•Reactive– Maintain information about proper state of

system and identify deviations from the norm.

• Information Security– Deny an attacker useful information

– This is NOT the same as “security by obscurity”

Page 12: Cryptography and Network Security

Host Security Tools: (cont.)

•Expert Tools: ISS (Internet Security Scanner )

scans for known host networking software weaknesses.

– Domain names

– Common login names

– RPC port-mapper reachability

– NFS reachability

– Send mail debug hole, etc, etc, etc...

Page 13: Cryptography and Network Security

Commercial Tools:

• Netprobe

– Runs up to 85 tests per host

– 2 modes, noisy and quiet

– New offering from Infostructure Services &

• Technologies - Pingware

– Analysis tool similar to SATAN

– Delivered as consulting service by Bellcore

Page 14: Cryptography and Network Security

Expert Tools: Crack

• Expert tool used for identifying “weak” passwords

• Attempts to find matching encryptions using a large dictionary

– Typically approximately 5% of any given password file is guessable

– Used by systems administrators to scan for weak passwords and warn users.

Page 15: Cryptography and Network Security

Pro’s:

•Maintaining strong security on host avoids the “crunchy shell around soft, chewy center” problem.

• If perimeter security fails, network is often wide open to attack.

•May rely on vendor-provided security features.

Page 16: Cryptography and Network Security

Is it safe to use a Host Security Model ????

Page 17: Cryptography and Network Security

Con’s:

• Vendors slow to respond to security holes.

• Effort scales with number of hosts being protected.

• Requires constant upkeep.

• Reduces host-to-host trust or increases dependency on common security policy between peer hosts.

Page 18: Cryptography and Network Security

NETWORK SECURITY MODEL

Page 19: Cryptography and Network Security

PHYSICAL

VLAN

ACL

SOFTWARE

USER

ADMINISTRATIVE

IT DEPARTMENT

Fig: Network Security Model

Page 20: Cryptography and Network Security

Why do we need a Network Security Model?

• A well structured NSM will give the security community a way to study, implement, and maintain network security that can be applied to any network.

• In study, it can be used as a tool to breakdown network security into seven simple layers with a logical process.

Page 21: Cryptography and Network Security

Why do we need a Network Security Model?

• It can also be used to detect where breaches have occurred so that an attack can be mitigated.

• The NSM provides the new professional with the knowledge to discover what has been implemented and what has not been implemented from a security standpoint.

Page 22: Cryptography and Network Security

Understanding the NSM Seven Layer Model

Page 23: Cryptography and Network Security

The Physical Layer

• The physical layer’s primary focus is on physical security.

• Physical security is applied to prevent attackers from accessing a facility to gain data stored on servers, computers, or other mediums.

• Physical security is the first chosen layer because it is a breaking point for any network.

Page 24: Cryptography and Network Security

The Physical Layer (contd.)

• The physical layer is one of the easiest layers to secure because it does not require advanced technical concepts to do so.

• Example: A company can be hired to install an alarm system.

• Elements of the Physical Layer: fencing, barbed wire, warning signs, metal or concrete barriers, and flood lights.

Page 25: Cryptography and Network Security

The VLAN Layer

• VLANs are used to segment networks for multiple reasons.

• The primary reason that you make VLANs is to group together common hosts for security purposes.

• For example, putting an accounting department on a separate VLAN from the marketing department is a smart decision because they should not share the same data.

Page 26: Cryptography and Network Security

The ACL Layer

• The ACL layer is focused on the creation and maintenance of Access Control Lists.

• ACLs are written on both routers and firewalls.

• ACLs are created to allow and deny access between hosts on different networks, usually between VLANs.

• If they are not created properly, the ACL may allow unauthorized traffic, but deny authorized traffic.

Page 27: Cryptography and Network Security

The Software Layer

• The software layer is focused on keeping software up to date with upgrades and patches in order to mitigate software vulnerabilities.

• Network security professionals should know what software is running on their hosts and what patch level they are currently running at to ensure that if something has happened that they can remove any unwanted software accordingly and know what vulnerabilities currently exist or have existed recently.

• They should also know what each new patch will do to the system it will be installed on.

Page 28: Cryptography and Network Security

The User Layer

•The user layer focuses on the user’s training and knowledge of security on the network.

•They should have an idea of how their system runs normally.

Page 29: Cryptography and Network Security

The Administrative Layer

• The administrative layer focuses on the training of administrative Users.

• Administrative users should be trained on what applications should not be installed on their systems and have an understanding of how their systems run normally.

• They should also be trained to identify problems with the user layer, such as recognizing an employee that installs Peer-to- Peer against security policy.

Page 30: Cryptography and Network Security

IT-Department Layer

• The IT department layer contains all of the network security professionals, network technicians, architects, and support specialists.

• These are all of the people that make a network operational, and maintain the network, and all of the hosts that reside on that network.

• For example, an IT department user can have read, write, and modify access to a database table structure, where an administrator or user only has read, write, and modify access to the records within that table structure.

Page 31: Cryptography and Network Security

How the Network Security Model can be used to mitigate an attack?

1)Initial Mitigation

2)Long-Term Mitigation

Page 32: Cryptography and Network Security

Any Queries?

Page 33: Cryptography and Network Security

Recommended