Access Controls, Firewalls, and VPNs
Access Controls, Firewalls, and VPNs
Access Controls, Firewalls, and VPNs
and VPNs
SECURITY TECHNOLOGY: MODULE 8
Learning Objectives
• Discuss the role of access control in information systems, and identify and
discuss the four fundamental functions of access control systems
Study Outcomes
• Define authentication and explain the three commonly used authentication
Factors
• Define virtual private networks (VPNs) and discuss the technology that
enables them
• Identify and describe the categories and models of intrusion detection and
prevention systems
Access Control
Access Controls
• Mandatory access controls (MACs): A required, structured data
classification scheme that rates each collection of information as well
as each user.
Access Controls
• Identification: I am a user of the system.
• Authentication: The access control mechanism that requires the validation and verification of an
unauthenticated entity’s purported identity.
Authentication
• Authentication factors.
• Password: a private word or a combination of characters that only the user should know.
• Passphrase: a series of characters, typically longer than a password, from which a virtual password is
derived.
Authentication cont.
Authentication
information
• Synchronous tokens
• Asynchronous tokens
• Something you are
• Relies upon individual characteristics
• Strong authentication
Firewalls
Firewalls
• May be:
Firewalls
• IP source and destination address.
Firewalls
• Since proxy servers are often placed in unsecured area of the
network (e.g., DMZ), they are exposed to higher levels of risk from
less trusted networks.
Firewalls
• Make filtering decisions based on specific host computer’s identity.
• MAC addresses of specific host computers are linked to access control list
(ACL) entries that identify specific types of packets that can be sent to each
host; all other traffic is blocked.
Hybrid Firewalls
• Hybrid firewalls
Firewalls
firewall system, but connected to work in tandem.
• What features are included in the base price? What features are available at extra cost?
Firewalls
Are all cost factors known?
• How easy is it to set up and configure the firewall? Does the organization
have staff on hand that are trained to configure the firewall, or would the
hiring of additional employees be required?
• Can the firewall adapt to the growing network in the target organization?
VPNs
• Trusted VPN
• Secure VPN
VPNs
• Authentication of remote computer and perhaps remote user as well
• An intrusion occurs when an attacker attempts to gain entry into or disrupt the normal operations
of an organization’s information systems.
Intrusion
• Intrusion prevention consists of activities that deter an intrusion.
• Intrusion detection consists of procedures and systems that identify system intrusions.
• Intrusion correction activities complete restoration of operations to a normal state and seek to
identify source and method of intrusion.
Intrusion
• Intrusion detection systems detect a violation of its configuration and
activate alarm.
• Many IDPSs enable administrators to configure systems to notify them directly of trouble via e-
mail or pagers.
IDPs
• When examining packets, an NIDPS looks for attack patterns within network
Traffic
• Installed at specific place in the network where it can monitor traffic going
into and out of a particular network segment
• Wireless NIDPS
• Issues associated with it include physical security, sensor range, access point and wireless switch
locations, wired network connections, cost, AP, and wireless switch locations
IDPs
• Network behaviour analysis systems
• Types of events commonly detected include denial-of-service (DoS) attacks, scanning, worms,
unexpected application services, and policy violations
• Offer intrusion prevention capabilities that are passive, inline, and both passive and inline
Types of IDPSs cont.
• Resides on a particular computer or server (host) and monitors activity only on that system
• Benchmarks and monitors the status of key system files and detects when intruder creates,
IDPs
modifies, or deletes files
• Advantage over NIDPS: can access encrypted information traveling over network and make
decisions about potential/actual attacks
IDPs
• Widely used because many attacks have clear and distinct signatures
• Problem with this approach is that new attack patterns must continually be added to the IDPS’s
database of signatures.
IDPS Detection Methods cont.
IDPs
• When measured activity is outside the baseline parameters or clipping level, IDPS sends an alert
to the administrator
IDPs
• Stores and uses relevant data detected in a session to identify intrusions
involving multiple requests /responses; allows IDPS to better detect
specialized, multisession attacks (also called deep packet inspection)
• Reviews log files generated by servers, network devices, and even other IDPSs for patterns and
IDPs
signatures
• Patterns that signify an attack may be much easier to identify when the entire network and its
systems are viewed as a whole
Summary
authorization, and accountability.
• A firewall is any device that prevents a specific type of information from moving between the
outside network, known as the untrusted network, and the inside network, known as the trusted
network.
• Firewalls can be categorized into four groups: packet filtering, MAC layers, application gateways,
and hybrid firewalls.
Summary cont.
• VPNs enable remote offices and users to connect to private networks securely over public
Summary
networks.
• Intrusion detection system (IDPS) detects violation of its configuration and activates alarm.
KRISTEN HOFF