Network Security
Network Security
Security
Security Appliance
The term security appliance is a general term used to describe a network device that
performs some kind of security function. The most well-known security appliance is the
firewall. A firewall is a network device used to enforce certain security rules that govern
how traffic may flow, such as allowing certain types of traffic and denying other types of
traffic. Other types of security appliances include an intrusion detection system (IDS) or
intrusion prevention system (IPS).
Secure Protocols
Protocols that encrypt data as it traverses the network. The two most commonly used
secure protocols are:
A physical port is a physical slot on a computer or network device that another device or cable can be plugged
into.
A logical port is a numerical identifier that is mapped to a particular protocol to tell a receiving computer what
service is trying to be used.
• Well-known ports (0–1023) Several well-known ports are generally used for specific protocols that are part
of the TCP/IP suite of protocols, such as HTTP (80), HTTPS (443), DNS (53), SMTP (25) and more.
• Registered ports (1024–49151) Registered ports range from 1024 to 49151. These are ports that can be
registered with IANA for a specific purpose. Vendors sometimes register a port for their proprietary software.
With the goal in mind, cyber criminals, like any criminal, also each have their own modus
operandi (MO), or preferred method of working.
Not all cyberattacks are targeted ones. Sometimes the hacker doesn’t care who the victim is.
Instead, they launch attacks at random targets and see what they get.
Identifying Targets
During this phase, the cyber attacker pieces together the various bits of information collected in
the previous phase. The next step is to run scans against those assets to reveal information
about them.
There are three components of scanning:
• Network scanning: This seeks to enumerate (identify and list) what systems are within a
targeted range of IP addresses, identifying their IP address, operating system type, and version.
• Port scanning: This looks at the systems found during network scanning to reveal what ports
are open and therefore what services are running on them.
A firewall is a network device used to control access between two networks or two segments of a network. The
firewall permits certain kinds of traffic to flow through it while preventing other kinds of traffic.
Three general types of firewalls exist: packet filter, proxy, and stateful/dynamic packet filter, which are sometimes
referred to as firewall generations 1, 2, and 3, respectively
Packet Filter
Packet filters are the most basic and least expensive type of firewall. A packet filter is a kind of router. It screens
all traffic and makes decisions as to whether to allow or deny traffic to pass from one of its interfaces to another
based on the header information of each message. The firewall contains an access control list (ACL) which is
configured by the organization. The ACL contains the rules upon which the firewall allows or denies what traffic
can flow. The ACL contains information including:
• Source and destination IP addresses; Source and destination port numbers; Protocol; Direction
of traffic (ingress and egress)
Network Defenses
Proxy
Proxy firewalls do not allow direct communication between the networks they are installed between. The proxy
hides the IP address of the devices within the network it is protecting. The proxy intercepts and repackages all
traffic, applies a security policy, and prevents direct connections between the two networks. This makes it
harder for cyber criminals to discover information about what is on the other side of the proxy.
Instead of just using an ACL, they take into account the nature of the communication that is taking place to make
decisions about what connections to allow or deny. They do this by examining the messages going back and
forth and keeping track of what they previously learned about a conversation.
• IP address; Protocols and commands; Historical comparisons with previous packets; The
content of packets.
A stateful firewall monitors the state of network conversations and allows packets to flow through the firewall only
if they are part of existing authorized conversations.
Network Security Architecture
Organizations group the network into segments or security zones for which rules can be defined and access
controlled. One specific type of security zone is called a demilitarized zone (DMZ). Other architectural security
controls are virtual private networks (VPNs) and network access controls (NACs).
Network Segmentation
Network segmentation is a network design approach that allows organizations to group portions of the network
into segments, each acting like a small network.
● Improved Security
● Better Access Control
● Improved Monitoring
● Improved Performance
● Better Containment
Network Segmentation
Physical segmentation is a process of splitting a larger network into smaller physical components These
segments can communicate via intermediary devices such as switches, hubs, or routers Physical network
segmentation can be an easy approach to divide a network, but it is expensive as it occupies more space
Network Segmentation
Logical segmentation utilizes VLANs, which are isolated logically without considering the physical locations of
devices. Each VLAN is considered an independent logical unit, and the devices within a VLAN communicate as
though they are in their own isolated network. In this approach, firewalls are shared, and switches handle the
VLAN infrastructure It is easier to implement and flexible to operate.
Network Segmentation
Micro-segmentation takes the concept of isolating network segments and controlling who has access to what
one step further: by doing it at the application level. With micro-segmentation, anything on the network, any
device or any application, can be its own segment. That means access can be controlled for any device or
application.
SDN therefore provides better and more granular control and management of the network. SDNs provide
greater ability to automate, provision, control, and troubleshoot the network.
Network Segmentation
Demilitarised Zones - DMZ/Screened Subnet
One specific implementation of network segmentation is a DMZ. A DMZ is a network segment that is positioned
in between the organization’s connection to the Internet and their internal networks.
The purpose of the DMZ is to create a buffer zone between the organization’s internal network and the outside
world. The DMZ is bordered by two firewalls. Organizations usually place their e-mail, web, and DNS servers in
the DMZ, as these servers require access to the Internet.
Virtual Private Networks
A VPN is a secure connection to a private network through a public network such as the Internet. The
connection is encrypted and secured virtually, extending the organization’s private network to authorized users
outside of it.
VPNs use tunneling technology that provides an encrypted channel through an untrusted network from the
user’s system to the VPN server. VPNs use tunneling protocols to protect the data and manage the connection.
Older protocols include Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP);
however, the de facto standard protocol for VPNs is IP Security (IPSec), which is a suite of protocols that
provides data integrity, authentication, and confidentiality.
An alternate and popular use of VPNs for home users is as a safer way to use the Internet. In this method,
instead of the VPN server providing a connection to a trusted network, it provides another connection to the
Internet. With this approach the VPN server acts as a proxy, hiding the user from a direct connection to Internet
resources. VPNs have become a popular option for home users because it allows them to use the Internet
safely and anonymously using an encrypted tunnel to the VPN server while hiding their IP address from Internet
traffic.
Network Access Control
NAC is a technology that allows organizations to implement controls that limit what devices can connect to their
network.
For example, if you want to connect to a corporate network that is configured for NAC, the network will not allow
your computer to connect until it first checks your computer to see if it meets certain criteria based on a policy.
The policy may say that only computers that have specific configuration settings or have antivirus software
installed or have up-to-date patches installed can connect to the network. This helps keep the network free of
devices that could introduce threats into the environment such as malware, hidden scripts, or software that is
otherwise not permitted on the network.
E-mail and Web Application Filtering
There are many specialized security appliances and services available used to defend
networks. Two of the most popular are e-mail and web application filters. Either can be
implemented as appliances, software running on a computer, or as services offered by vendors.
E-mail filters examine an organization’s inbound and outbound e-mail traffic looking for
evidence of phishing, spam, malware, suspicious links, disallowed attachments, and other
threats.
If a malicious e-mail is discovered, the filter blocks or quarantines the e-mail and automatically
deletes it or requires it to be manually inspected depending on how the filter is configured. Web
filters act as web firewalls. They monitor traffic between web applications and the Internet
based on a set of rules configurable by the organization to permit benign traffic while preventing
malicious traffic.
IDS and IPS
Both deploy sensors throughout the network that communicate with a centralized control or reporting system.
The centralized system allows the security staff to view indicators of malicious activity and take measures to
prevent security breaches.
IDS and IPS differ in that an IDS merely detects and reports on potential malicious activity, whereas an IPS not
only detects and reports but also automatically takes defensive action in response to what it sees, such as
blocking certain types of traffic.
A network-based IDS/IPS (NIDS) uses sensors deployed throughout the network in the form of specialized
appliances or computers running specialized NIDS software. A host-based IDS/IPS (HIDS) uses software
(called agents) installed on host computers that monitor for, and detect, malicious activity on the host. HIDS
agents look for host- or OS-specific activities that malware or cyber criminals are known to perform, such as
running processes, registry changes, file alteration, and so on. Whether network or host based, several
detection methods are employed by IDSs/IPSs.
Modern IDS/IPS products usually take advantage of more than one of these methods:
• Signature-based IDS/IPSs look for specific patterns in traffic, specific messages, or specific files on systems. These specific
patterns are called signatures. Usually IDS/IPS product vendors use a threat intelligence subscription service whereby the
products continually learn about new attacks and what kinds of signatures would be indicative of their presence. New signatures
are downloaded to the IDS/IPS products so they are continuously monitoring for and able to detect the latest attacks.
Signature-based IDSs are good at detecting already known attacks but not as good at detecting new kinds of attacks.
• Anomaly-based IDSs/IPSs are better at detecting unknown attacks. Whereas a signature-based IDS/IPS is good at knowing
“what bad looks like,” an anomaly-based IDS is good at knowing “what good looks like.” An anomaly-based IDS/IPS uses
statistical techniques such as artificial intelligence and machine learning to build a picture of what normal activity looks like on the
network or system. Then if the IDS/IPS sees activity that deviates from the norm, it passes an alert to indicate the activity should be
investigated. Anomaly-based IDSs are good at detecting previously unknown attacks for which signatures may not exist.
Whereas IDS and IPS products use the same technology and methods to detect potentially malicious activity, the difference lies in
what each one does about that activity. An IPS goes beyond mere detection and reporting by automatically taking action to try to
stop the attack or minimize its impact. Some of the actions an IPS may take include blocking traffic from a particular IP address,
turning off a port on a firewall, resetting a device such as a router, or even changing data to remove or replace malicious messages
or files.
Antivirus
It protects the device on which it is installed against attacks from viruses. Most antivirus products detect and remove
many types of malware and in addition protect computers against other threats, including spam and phishing attacks.
Most antivirus software works by looking for patterns of behavior that match similar patterns, or signatures, stored in its
database of known malware. However, antivirus software also uses machine learning and heuristics to detect variations
in known malware behaviors. Since the threat environment is ever-changing antivirus software must be kept up to date.
Zero-day attacks are particularly troublesome because specific defenses against them are not yet in place. The term
zero-day applies to the following:
• Zero-day vulnerabilities: A recently discovered security vulnerability in a product, operating system, or application
that is unknown to the vendor or for which there is no available fix or patch.
• Zero-day exploits: A recently discovered exploit such as malware that is unknown to countermeasure organizations
(e.g., malware unknown to antivirus software vendors).
• Zero-day attacks: Any attack that takes advantage of zero-day vulnerabilities and/or zero-day exploits.
Internet of Things - IoT
Is a general term that refers to many different kinds of physical devices that connect to the Internet or IP networks. IoT
devices are sometimes called smart devices because they frequently contain processing capability, often in
combination with sensors, robotics, and automation technology.
IoT devices are used in home automation, manufacturing and associated control systems, medical and healthcare,
infrastructure and power control systems, environmental monitoring, military communications and weapons systems,
and many other applications. Any device that has an IP connection is an IoT device.
IoT devices present unique security issues because security is not typically built into these devices.
There are many types of backup that you can choose from, and the difference between the methods lies in how each
method handles a property of each file called the archive bit. This is a bit that is used to communicate to the backup
system whether a particular file has changed since the last backup. When the archive bit is cleared (0), it
communicates that the file has been backed up already and has not changed since. When the bit is on (1), it
communicates that the file has had changes since the last backup and should be backed up again.
Full Backup With a full or normal backup, all data is backed up. During the full backup, the current status of the
archive bit is ignored, everything is backed up, and the archive bit for each file is cleared. A full backup takes the
longest time and the most space to complete.
Incremental In an incremental backup, all files that have been changed since the last full or incremental backup will be
backed up. During the incremental backup process, the archive bit for each file is cleared. An incremental backup
usually takes the least amount of time and space to complete.
Differential In a differential backup, all files that have been changed since the last full backup will be backed up.
During the differential backup process, the archive bit for each file is not cleared.
Attacks
Buffer Overflows: When a program is expecting input, either from another program or from a user
entering text into a field, it stores the data in a buffer, or area of memory. The program usually
expects the data to be of a certain size and therefore creates a buffer of the correct size to accept the
expected data. If the data received is greater in size than the size of the buffer, the extra data
overflows into other buffers or areas of memory, which can cause erroneous operation.
Cross-Site Scripting: Cross-site scripting (XSS) is a type of attack whereby the attacker injects a
malicious script into a website that is trusted by the intended victim(s) of the attack. Then, when the
unsuspecting victim visits the site, the script is executed by the victim’s browser.
SQL Injection: Sometimes when a user visits a website and enters data into a form or web page, the
data is sent by the web server to a database such as one that uses Structured Query Language
(SQL).
Attacks
Timing and Race Conditions: A timing attack, also called a race condition attack, is an entire family
of attacks in which the attacker takes advantage of the time between a sequence of events. One
example is a time of check/time of use (TOC/TOU) attack. This occurs when the system checks to
see if a specific file exists for a later operation. In this case the attacker replaces that file with a
malicious one in between the time of the check and the time the file is used.
Brute force attack: Attempts to guess a password by systematically trying out every possible
combination of characters. It is slow and computationally intensive and can guess passwords of any
length.
Dictionary attack: Attempts to guess a password by systematically trying out every possible word in
a dictionary. It is fast but limited by the words in the dictionary.
Rainbow tables: Using a dictionary to create a list of hashes takes time and processing power. For efficiency,
hackers do this ahead of time and store the results in what are called rainbow tables. They are simply stores of
password and hash combinations that have already been computed that hackers can use to compare against
captured password hash databases. Hackers buy and sell rainbow tables to help each other in their malicious
activities.
A rainbow table attack seeks to mitigate the limitations of dictionary or brute force attacks by precomputing
the hash of passwords and storing them for later comparison.
A salt is random data fed as an additional input to a one-way function that hashes data, a password or
passphrase. Salting helps defend against attacks that use precomputed tables (e.g. rainbow tables), by vastly
growing the size of table needed for a successful attack.
On-Path Attack: In an on-path attack (previously known as a man-in-the-middle attack), the intruder places
himself between the sending and receiving devices and captures the communication as it passes by. The
interception of the data is invisible to those sending and receiving the data. The intruder can capture the
network data and manipulate it, change it, examine it, and then send it on.
Side Channel Attack
is a security exploit that attempts to extract secrets from a chip or a system. This can be achieved by
measuring or analyzing various physical parameters. Examples include supply current, execution time, and
electromagnetic emission. These attacks pose a serious threat to modules that integrate cryptographic
systems.
Timing attacks/race conditions are an example of a side-channel attack where the attacker measures precisely
how long cryptographic operations take to complete, gaining information about the cryptographic process that
may be used to undermine its security.
Application Scanning
Application scanning tools are commonly used as part of the software development process. These
● Static testing analyzes code without executing it. This approach points developers directly to
● Dynamic testing executes code as part of the test, running all the interfaces that the code
● Interactive testing combines static and dynamic testing, analyzing the source code while