Unit 2 IS
Unit 2 IS
Unit 4
Network Security
By
Chaitali Vaghela
Lecturer,
Government Polytechnic for Girls,
Ahmedabad.
Contents
❖ Introduction
❖ Network Security
❖ Firewalls
❖ Security Topology
❖ Internet Protocol Security (IPSec)
❖ Email Security
Introduction
❖ There are many layers to consider when addressing network security across
an organization.
❖ Attacks can happen at any layer in the network security layers model, so
your network security hardware, software and policies must be designed to
address each area.
❖ Network security typically consists of three different controls:
➢ Physical Network Security
➢ Technical Network Security
➢ Administrative Network Security
Network Security (Cont.)
❖ Firewalls
❖ Email Security
❖ Anti-virus and Anti-malware software
❖ Access Control
❖ Virtual Private Networks (VPN)
❖ Application Security
❖ Intrusion Prevention System
❖ Web Security
❖ Wireless Security
Firewalls
❖ All traffic from inside to outside, and vice versa, must pass through the
firewall.
➢ This is achieved by physically blocking all access to the local network except via the firewall.
❖ Only authorized traffic, as defined by the local security policy, will be allowed
to pass.
➢ Various types of firewalls are used, which implement various types of security policies.
❖ The firewall itself is immune to penetration.
➢ This implies that use of a trusted system with a secure operating system.
Firewall Rules
❖ Firewalls analyze each block of data packets entering or leaving the Intranet or the
host computer.
❖ Firewalls intercept network traffic at a computer's entry point, known as a port.
❖ Firewalls perform this task by allowing or blocking specific data packets (units of
communication transferred over a digital network) based on predefined security
rules.
❖ Based on a defined set of security rules, a firewall can perform three actions:
1. Accept: Allow the transmission of data packets.
2. Drop: Block data packets with no reply.
3. Reject: Block data packets and send “unreachable error” to the source.
❖ Rule sets can be based on several things indicated by packet data, including their
source, destination, and their content.
Types of Firewalls
❖ Firewalls are either categorized by the way they filter data, or by the system
they protect.
➢ When categorizing by what they protect, the two types are:
■ Network-based
■ Host-based
➢ When categorizing by filtering method, the main types are:
■ Packet filtering
■ Proxy service
■ Stateful inspection
■ Next Generation Firewall (NGFW)
Packet Filtering Firewall
❖ As the most “basic” and oldest type of firewall architecture, packet-filtering firewalls basically
create a checkpoint at a traffic router or switch.
❖ A packet filtering firewall is an efficient, yet affordable, software that inspects incoming packets
and decides whether to allow them to pass or reject them based on predefined parameters.
❖ The firewall performs a simple check of the data packets coming through the router—inspecting
information such as the destination and origination IP address, packet type, port number, and other
surface-level information without opening up the packet to inspect its contents.
❖ If the information packet doesn’t pass the inspection, it is dropped.
❖ It examines each packet independently and does not know whether any given packet is part of an
existing stream of traffic.
❖ The packet-filtering firewall is effective, but because it processes each packet in isolation, it can be
vulnerable to IP spoofing attacks and has largely been replaced by stateful inspection firewalls.
Packet Filtering Firewall (Cont.)
❖ Advantages:
➢ Need only one router
■ The key advantage of using packet filtering is that it requires the use of only one screening router to protect an
entire network.
➢ Highly efficient and fast
■ The packet filtering router works very fast and effectively and accepts and rejects the packets quickly based
upon the destination and source ports and addresses.
■ However, other firewall techniques show more time-consuming performance.
➢ Transparent to users
■ Packet filtering works independently without any need for user knowledge or cooperation.
■ Users won’t get to know about the transmission of packets until there is something that got rejected.
■ On the contrary, other firewalls require custom software, the configuration of client machines, or specific
training or procedures for users.
➢ Built-in packet filtering in routers
■ Packet filtering capacities are inbuilt in widely used hardware and software routing products.
■ Additionally, now most websites possess packet filtering techniques available in their routers itself, which also
makes this technique the most inexpensive one.
Packet Filtering Firewall (Cont.)
❖ Disadvantages:
➢ Filtration based on IP address or Port Information
■ The biggest disadvantage of packet filtering is that it works on the authentication of IP
address and port number and not based on the information like context or application.
➢ Packet filtering is stateless
■ Another big disadvantage of packet filtering is that it does not remember any past invasions
or filtered packets.
■ It tests every packet in isolation and is stateless which allows hackers to break the firewall
easily.
➢ No safety from address spoofing
■ The packet filtering does not protect from IP spoofing, in which hackers can insert fake IP
addresses in packets to intrude the network.
➢ Not a perfect option for all networks
■ The packet filtering firewalls implementation in highly desirable filters becomes difficult or
highly time-consuming.
Packet Filtering Firewall (Cont.)
Circuit-Level Gateways
❖ Advantages:
➢ Only processes requested transactions; all other traffic is rejected.
➢ Easy to set up and manage
➢ Low cost and minimal impact on end-user experience
❖ Disadvantages:
➢ If they aren't used in conjunction with other security technology, circuit-level gateways offer
no protection against data leakage from devices within the firewall.
➢ No application layer monitoring.
➢ Requires ongoing updates to keep rules current.
Circuit-Level Gateways (Cont.)
Proxy Firewalls (Application-level Gateways)
❖ Proxy firewalls operate at the application layer to filter incoming traffic between your network and
the traffic source—hence, the name “application-level gateway.”
❖ These firewalls are delivered via a cloud-based solution or another proxy device.
❖ It works at Application Layer of OSI model.
❖ Rather than letting traffic connect directly, the proxy firewall first establishes a connection to the
source of the traffic and inspects the incoming data packet.
❖ This check is similar to the stateful inspection firewall in that it looks at both the packet and at the
TCP handshake protocol.
❖ However, proxy firewalls may also perform deep-layer packet inspections, checking the actual
contents of the information packet to verify that it contains no malware.
❖ Once the check is complete, and the packet is approved to connect to the destination, the proxy
sends it off.
❖ If there’s one drawback to proxy firewalls, it’s that they can create significant slowdown because of
the extra steps in the data packet transferal process.
Proxy Firewalls (Application-level Gateways)
Stateful Inspection Firewall
❖ A stateful firewall is a firewall that monitors the full state of active network
connections.
❖ Stateful packet inspection is also known as the dynamic packet filtering.
❖ Stateful inspection firewalls, in addition to verifying and keeping track of
established connections, also perform packet inspection to provide better,
more comprehensive security.
❖ Rely on algorithms to recognize and process application layer data instead
of running application specific proxies.
Stateful Inspection Firewall (Con.)
❖ They filter packets at Network Layer, determine whether session packets are
legitimate and evaluate contents of packet at the application layer.
❖ It allows direct connection between client & host.
❖ For example, when you connect to a Web server and that Web server must respond
to you, the stateful firewall has the proper access open and ready for the
responding connection. When the connection ends, that opening is closed.
❖ Advantages:
➢ high level of security,
➢ good performance,
➢ transparency to end users.
❖ Disadvantage:
➢ Expensive
Stateful Inspection Firewall (Con.)
Stateful vs Stateless Firewalls
❖ One way to enhance the ability of a system to defend against intruders and
malicious programs is to implement trusted system technology.
❖ A system on which we rely to enforce the security policies and strategies is
referred as a trusted system.
❖ Once a trusted system is breached, it leads to the compromise of security
policies governing the whole system setup.
❖ Thus, a trusted system is the central figure to implement an organization’s
security policies and provides assurance, trust and security.
Trusted systems (Cont.)
❖ The security topology of your network defines the network design and
implementation from a security perspective.
❖ A security topology is the arrangement of hardware devices on a network
with respect to internal security requirements and needs for public access.
❖ Unlike a network topology, Security topology is more concerned with access
methods, security, and technologies being used.
❖ Topologies are created by dividing networks into security zones providing
both a multi-layered defense strategy and different levels of security
corresponding with the purpose of each specific zone.
Security Topology (Cont.)
❖ Everyone in a network does not need to have access to all of the assets in the network.
❖ Networks can be isolated from each other using hardware and software.
❖ Some machines on the network can be configured to be in a certain address ranges and
others to be in a different address range.
❖ This separation makes the two networks invisible to each other unless a router connects
them.
❖ Some of the newer data switches also allows partition of networks into smaller networks
or private zones.
❖ Followings are the four most common security zones:
➢ Internet
➢ Intranet
➢ Extranet
➢ DMZ
Internet
❖ Any service that is being provided to users on the Internet should be placed
in the DMZ.
❖ The most common services are:
➢ Web server
➢ Mail server
➢ FTP server
➢ VoIP server
DMZ (Cont.)
DMZ Designs
❖ VLANs are also important because they can help improve the overall
performance of a network by grouping together devices that communicate
most frequently.
❖ VLANs also provide security on larger networks by allowing a higher degree
of control over which devices have access to each other.
❖ VLANs tend to be flexible because they are based on logical connections,
rather than physical.
❖ Many organizations have a WAN (wide area network) due to their expansive
offices and large teams. In these scenarios, having multiple VLANs would
greatly expedite network operations.
VLAN: Virtual Local Area Network (Cont.)
❖ Advantages:
➢ Security:
■ Groups that have sensitive data are separated from the rest of the network, decreasing the
chance of confidential breaches.
➢ Cost reduction
■ Cost savings result from reduced need for expensive network upgrades and more efficient
use of existing bandwidth and uplinks.
➢ Better performance
■ Dividing flat Layer 2 networks into multiple logical workgroups (broadcast domains) reduces
unnecessary traffic on the network and boosts performance.
➢ Shrink broadcast domains
■ Dividing a network into VLANs reduces the number of devices in the broadcast domain.
➢ Better network management
■ VLANs make it easier to manage the network because users with similar network
requirements share the same VLAN.
VLAN: Virtual Local Area Network (Cont.)
❖ Disadvantages:
➢ A packet can leak from one VLAN to other.
➢ An injected packet may lead to a cyber-attack.
➢ Threat in a single system may spread a virus through a whole logical network.
➢ You require an additional router to control the workload in large networks.
➢ You can face problems in interoperability.
➢ A VLAN cannot forward network traffic to other VLANs.
Tunneling
❖ Within the term "IPsec," "IP" stands for "Internet Protocol" and "sec" for
"Security."
❖ The Internet Protocol is the main routing protocol used on the Internet.
❖ It designates where data will go using IP addresses.
❖ IPsec is secure because it adds encryption and authentication to this
process.
❖ IPsec is a group of protocols that are used together to set up encrypted
connections between devices.
❖ It helps keep data sent over public networks secure.
❖ IPsec is often used to set up VPNs, and it works by encrypting IP packets,
along with authenticating the source where the packets come from.
IPSec (Cont.)
❖ Authentication
➢ The authentication mechanism assures that a received packet was transmitted
by the party identified as the source in the packet header, and that the packet has
not been altered in transit.
❖ Confidentiality
➢ The confidentiality facility enables communicating nodes to encrypt messages
to prevent eavesdropping by third parties.
❖ Key Management
➢ The key management facility is concerned with the secure exchange of keys.
IPSec Architecture
IPSec Architecture (Cont.)
❖ IPSec (IP Security) architecture uses two protocols to secure the traffic or
data flow.
➢ ESP (Encapsulation Security Payload)
➢ AH (Authentication Header).
❖ IPSec Architecture include protocols, algorithms, DOI, and Key Management.
❖ All these components are very important in order to provide the three main
services:
➢ Confidentiality
➢ Authentication
➢ Integrity
IPSec Architecture Component
❖ AH Protocol
➢ AH (Authentication Header) Protocol provides both Authentication and Integrity
service.
➢ Authentication Header is implemented in one way only: Authentication along with
Integrity.
❖ Authentication Algorithm
➢ Authentication Algorithm contains the set of the documents that describe
authentication algorithm used for AH and for the authentication option of ESP.
❖ DOI (Domain of Interpretation):
➢ DOI is the identifier which support both AH and ESP protocols.
➢ It contains values needed for documentation related to each other.
❖ Key Management
➢ Key Management contains the document that describes how the keys are exchanged
between sender and receiver.
IPSec Services
❖ In virtually all distributed environments, electronic mail is the most heavily used
network-based application.
❖ It is also the only distributed application that is widely used across all
architectures and vendor platforms.
❖ Because of its ubiquity and inherent vulnerabilities, email is a popular vector for
cyber attacks.
❖ These attacks include spamming, phishing and Malware, such as viruses, worms,
Trojan horses, and spyware.
❖ Email is also a common entry point for attackers looking to gain a foothold in an
enterprise network and obtain valuable company data.
❖ Email security is the set of methods used for keeping email correspondence and
accounts safe from these attacks.
Email Security (Cont.)
❖ Password Cycling
➢ Require employees to use strong passwords and mandate frequent password changes.
➢ This helps to ensure that, even if a password is compromised, its use can be limited.
❖ Secure Login
➢ Ensure that webmail applications use encryption.
➢ This is standard functionality, but critical to prevent emails from being intercepted by
malicious actors.
❖ Spam Filtering
➢ Implement scanners and other tools to scan messages and block emails containing
malware or other malicious files before they reach end users.
➢ Even relatively benign spam – such as marketing offers – can hamper productivity if
employees have to manually remove it from their inboxes.
Recommended policies and procedures for Email Security
❖ Spyware Protection
➢ A robust cyber security program or a dedicated spyware removal service that can dispose of
malicious email attachments and repair altered files/settings.
❖ Email Encryption
➢ Encryption technologies such as OpenPGP let users encrypt emails between sender and
recipient.
➢ This is a necessity for businesses where sensitive information is shared frequently via
communication platforms like email.
❖ Employee Education
➢ Engage employees in ongoing security education around email security risks and how to
avoid falling victim to phishing attacks over email.
➢ Some companies send their own employees mock phishing emails in order to test their
resistance to these attacks
References
❖ https://www.javatpoint.com/firewall
❖ https://searchsecurity.techtarget.com/definition/firewall
❖ https://www.varonis.com/blog/kerberos-authentication-explained/
❖ https://phoenixnap.com/blog/kerberos-authentication
❖ https://www.fortinet.com/resources/cyberglossary/what-is-dmz
❖ https://www.cloudflare.com/en-in/learning/network-layer/what-is-tunneling/
❖ https://www.proofpoint.com/us/threat-reference/email-security
❖