1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Security+ Certification: Chapter 7 - Trung tâm Athena

76 35 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 76
Dung lượng 805,19 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Chapter 7 - Quản trị bảo mật cho hệ thống (Security management system). After studying this chapter you will be able to: Understand the purpose of a network firewall and the kinds of firewall technology available on the market; understand the role of routers, switches, and other networking hardware in security; determine when VPN or RAS technology works to provide a secure network connection.

Trang 1

Chương 7 Quản Trị Bảo Mật Cho Hệ Thống

Trang 2

Tóm tắt nội dung

Trang 3

Objectives in this Chapter

and the kinds of firewall technology available

on the market

other networking hardware in security

to provide a secure network connection

and the kinds of firewall technology available

on the market

other networking hardware in security

to provide a secure network connection

Trang 4

means of securing a computer or network fromunwanted intrusion

• Dedicated physical device that protects network from intrusion

• Software feature added to a router, switch, or other device that prevents traffic to or from part of a

network

means of securing a computer or network fromunwanted intrusion

• Dedicated physical device that protects network from intrusion

• Software feature added to a router, switch, or other device that prevents traffic to or from part of a

network

Trang 5

Three firewall technolog

Trang 6

Packet filtering firewall

layer of the Open Systems Interconnection(OSI) model and is designed to operate rapidly

by either allowing or denying packets

layer of the Open Systems Interconnection(OSI) model and is designed to operate rapidly

by either allowing or denying packets

Trang 7

Application layer gateways

Application layer of the OSI model, analyzingeach packet and verifying that it contains thecorrect type of data for the specific application

it is attempting to communicate with

Application layer of the OSI model, analyzingeach packet and verifying that it contains thecorrect type of data for the specific application

it is attempting to communicate with

Trang 8

Stateful inspection firewall

 A stateful inspection firewall checks each packet

to verify that it is an expected response to acurrent communications session This type offirewall operates at the Network layer, but isaware of the Transport, Session, Presentation,and Application layers and derives its state

table based on these layers of the OSI model

 A stateful inspection firewall checks each packet

to verify that it is an expected response to acurrent communications session This type offirewall operates at the Network layer, but isaware of the Transport, Session, Presentation,and Application layers and derives its state

table based on these layers of the OSI model

Trang 9

Management Cycle for

Firewall Protection

1 Draft a written security policy

2 Design the firewall/network to implement the policy

3 Implement the design by installing selected hardware

and software

4 Test the firewall

5 Review new threats, requirements for additional

security, and updates to systems and software; repeat process from first step

1 Draft a written security policy

2 Design the firewall/network to implement the policy

3 Implement the design by installing selected hardware

and software

4 Test the firewall

5 Review new threats, requirements for additional

security, and updates to systems and software; repeat process from first step

Trang 10

Drafting a Security Policy

over the network?

over the network?

Trang 11

Available Targets and

Who Is Aiming at Them

Trang 13

Services and Security

know how your network will be used

 Don’t install/use any service you don’t

absolutely need

know how your network will be used

 Don’t install/use any service you don’t

absolutely need

Trang 14

A Warning

security, and vice versa

 If something is too difficult, users will find away to circumvent it

security, and vice versa

 If something is too difficult, users will find away to circumvent it

Trang 15

Who Gets Access to Which Resources?

with files and file servers and databases anddatabase servers they need to access

the network

with files and file servers and databases anddatabase servers they need to access

the network

Trang 16

Who Gets Access to Which Resources?

internal users, remote users, etc

network to accomplish

site, access internal database server, remoteaccess, etc

internal users, remote users, etc

network to accomplish

site, access internal database server, remoteaccess, etc

Trang 17

Who Administers the Network?

management control

Trang 18

Designing the Firewall

to Implement the Policy

firewall

Trang 19

What Do Firewalls Protect Against?

Trang 20

How Do Firewalls Work?

• Network address translation (NAT)

• Basic packet filtering

• Stateful packet inspection (SPI)

• Application gateways

• Access control lists (ACL)

• Network address translation (NAT)

• Basic packet filtering

• Stateful packet inspection (SPI)

• Application gateways

• Access control lists (ACL)

Trang 21

Network Address Translation (NAT)

 Only technique used by basic firewalls

 Enables a LAN to use one set of IP addresses for

internal traffic and a second set for external traffic

 Each active connection requires a unique external

address for duration of communication

 Port address translation (PAT)

• Derivative of NAT

• Supports thousands of simultaneous connections on a single public IP address

 Only technique used by basic firewalls

 Enables a LAN to use one set of IP addresses for

internal traffic and a second set for external traffic

 Each active connection requires a unique external

address for duration of communication

 Port address translation (PAT)

• Derivative of NAT

• Supports thousands of simultaneous connections on a single public IP address

Trang 22

Basic Packet Filtering

 Firewall system examines each packet that enters it and allows through only those packets that match a predefined set of rules

 Can be configured to screen information based on many data fields:

• Protocol type

• IP address

• TCP/UDP port

• Source routing information

Routers can also do this

 Firewall system examines each packet that enters it and allows through only those packets that match a predefined set of rules

 Can be configured to screen information based on many data fields:

• Protocol type

• IP address

• TCP/UDP port

• Source routing information

Routers can also do this

Trang 23

Stateful Packet Inspection (SPI)

 Stateful packet filters record specific

information about network connections,including which ports are being used on theclient and the server

 Enhances security by allowing the filter todistinguish on which side of firewall a

connection was initiated

allowed

 Stateful packet filters record specific

information about network connections,including which ports are being used on theclient and the server

 Enhances security by allowing the filter todistinguish on which side of firewall a

connection was initiated

allowed

Trang 24

Access Control Lists (ACL)

 Packet filtering is made possible by the use ofACLs

 ACLs are lists of rules built according to

organizational policy that defines who canaccess portions of the network

 access-list 101 permit tcp any 111.222.111.222

 ACLs are lists of rules built according to

organizational policy that defines who canaccess portions of the network

 access-list 101 permit tcp any 111.222.111.222

0.0.0.0 eq 80

 Access-list 101 deny ip any 111.222.111.222

0.0.0.0 – r u

Trang 25

Access Control Lists (ACL)

until it matches one

 There is an implicit deny at the end of the list (ifthere’s not a match by then, throw the packet

away)

until it matches one

 There is an implicit deny at the end of the list (ifthere’s not a match by then, throw the packet

away)

Trang 26

between network segments and routes trafficfrom one network to another

another

 Act as digital traffic cop (with addition of

packet filtering)

between network segments and routes trafficfrom one network to another

another

 Act as digital traffic cop (with addition of

packet filtering)

Trang 27

How a Router Moves Information

packet; compares destination IP address to list

of IP addresses contained in router’s lookup(routing) tables

next, based on changing network conditions

packet; compares destination IP address to list

of IP addresses contained in router’s lookup(routing) tables

next, based on changing network conditions

Trang 28

How a Router Moves Information

Trang 29

Beyond the Firewall

that are publicly accessible, but still need asmuch protection as possible

 Bastion hosts (potentially) – a server that

resides on the DMZ and hosts Web, mail, DNS,and/or ftp services

that are publicly accessible, but still need asmuch protection as possible

 Bastion hosts (potentially) – a server that

resides on the DMZ and hosts Web, mail, DNS,and/or ftp services

Trang 30

Demilitarized Zone

 Area set aside for servers that are publicly accessible

or have lower security requirements

 Sits between the Internet and internal network’s line

of defense

• Stateful device fully protects other internal systems

• Packet filter allows external traffic only to services provided

by DMZ servers

 Allows a company to host its own Internet services without sacrificing unauthorized access to its private

 Area set aside for servers that are publicly accessible

or have lower security requirements

 Sits between the Internet and internal network’s line

of defense

• Stateful device fully protects other internal systems

• Packet filter allows external traffic only to services provided

by DMZ servers

 Allows a company to host its own Internet services without sacrificing unauthorized access to its private

Trang 33

Application Gateways

 Also known as proxy servers (actually reverse proxies)

 Monitor specific applications (FTP, HTTP, Telnet)

 Traffic destined for web server goes to web proxy

instead

 Web proxy forwards packet to the web server, and

relays the reply back to the requesting browser

 Also known as proxy servers (actually reverse proxies)

 Monitor specific applications (FTP, HTTP, Telnet)

 Traffic destined for web server goes to web proxy

instead

 Web proxy forwards packet to the web server, and

relays the reply back to the requesting browser

Trang 34

Application Gateways

and filtered by the proxy

 Proxy itself is not running web service and isnot vulnerable to exploit

and filtered by the proxy

 Proxy itself is not running web service and isnot vulnerable to exploit

Trang 35

Application Gateways

• Information hiding

• Robust authentication and logging

• Simpler filtering rules

• Protects actual server from exploits

• Robust authentication and logging

• Simpler filtering rules

• Protects actual server from exploits

• Two steps are required to connect inbound or outbound traffic; can increase processor overhead

Trang 36

OSI Reference Model

 Architecture that classifies most network functions

Trang 38

The OSI Stack

Trang 39

Limitations of

Packet-Filtering Routers

knowledge of required network traffic

difficult to manage and comprehend

being processed increases

knowledge of required network traffic

difficult to manage and comprehend

being processed increases

Trang 40

Limitations of

Packet-Filtering Routers

of packets at layers 3 through 5

 Packet filtering is typically all or none

 No concept of state, of connections initiated

on the inside

of packets at layers 3 through 5

 Packet filtering is typically all or none

 No concept of state, of connections initiated

on the inside

Trang 41

 Provide same function as bridges (divide collision

domains), but employ application-specific integrated circuits (ASICs) that are optimized for the task

 Reduce collision domain to two nodes (switch and host)

 Broadcasts are still forwarded to all ports

 Main benefit over hubs

• Separation of collision domains limits the possibility of sniffing

 Provide same function as bridges (divide collision

domains), but employ application-specific integrated circuits (ASICs) that are optimized for the task

 Reduce collision domain to two nodes (switch and host)

 Broadcasts are still forwarded to all ports

 Main benefit over hubs

• Separation of collision domains limits the possibility of sniffing

Trang 42

Switches

Trang 43

Switch Security

 ACLs

 Separation of collision domains limits sniffing(but remember dsniff)

Trang 44

Virtual Local Area Network

“virtual” LAN

– limits broadcasts to members of VLANs

• Increases security from hackers

• Reduces possibility of broadcast storm

“virtual” LAN

– limits broadcasts to members of VLANs

• Increases security from hackers

• Reduces possibility of broadcast storm

Trang 45

Security Problems with Switches

person is able to obtain administrative access to

a switch

• Try default passwords which may not have been changed

• Sniff network to get administrator password via SNMP or Telnet

person is able to obtain administrative access to

a switch

• Try default passwords which may not have been changed

• Sniff network to get administrator password via SNMP or Telnet

Trang 46

Securing a Switch

serial port or through secure shell (SSH) orother encrypted method

physically isolate them from the network andprevent VLAN jumping

serial port or through secure shell (SSH) orother encrypted method

physically isolate them from the network andprevent VLAN jumping

Trang 47

Securing a Switch

 Maintain the switch; install latest version ofsoftware and security patches

 Maintain the switch; install latest version ofsoftware and security patches

Trang 48

Example of a Compromised VLAN

Trang 49

network communication

communicating with wireless technology

enough

network communication

communicating with wireless technology

enough

Trang 50

Modems

Trang 51

DSL versus Cable Modem Security

 DSL

• Direct connection between computer/network and the Internet

 Cable modem

• Connected to a shared segment; party line

• Most have basic firewall capabilities to prevent files from being viewed or downloaded

• Most implement the Data Over Cable Service Interface Specification (DOCSIS) for authentication and packet filtering

 DSL

• Direct connection between computer/network and the Internet

 Cable modem

• Connected to a shared segment; party line

• Most have basic firewall capabilities to prevent files from being viewed or downloaded

• Most implement the Data Over Cable Service Interface Specification (DOCSIS) for authentication and packet filtering

Trang 52

Dynamic versus Static IP Addressing

 Static IP addresses

• Provide a fixed target for potential hackers

 Dynamic IP addresses

• Provide enhanced security

• By changing IP addresses of client machines, DHCP server makes them moving targets for potential hackers

• Assigned by the Dynamic Host Configuration Protocol (DHCP)

 Static IP addresses

• Provide a fixed target for potential hackers

 Dynamic IP addresses

• Provide enhanced security

• By changing IP addresses of client machines, DHCP server makes them moving targets for potential hackers

• Assigned by the Dynamic Host Configuration Protocol (DHCP)

Trang 53

Dynamic versus Static IP Addressing

get the same IP address

• Always on

• High bandwidth

• Users not thinking about security

• Favorite target of hackers

get the same IP address

• Always on

• High bandwidth

• Users not thinking about security

• Favorite target of hackers

Trang 54

Remote Access Service (RAS)

securely dial in to another computer

the network

you to open up a hole in your firewall

securely dial in to another computer

the network

you to open up a hole in your firewall

Trang 55

Security Problems with RAS

to be compromised

as features to enhance security

Trang 56

Telecom/Private Branch Exchange

(PBX)

 PBX

• Private phone system that offers features such as voicemail, call forwarding, and conference calling

• Failure to secure a PBX can result in toll fraud, theft

of information, denial of service, and enhanced susceptibility to legal liability

 PBX

• Private phone system that offers features such as voicemail, call forwarding, and conference calling

• Failure to secure a PBX can result in toll fraud, theft

of information, denial of service, and enhanced susceptibility to legal liability

Ngày đăng: 30/01/2020, 11:29

TỪ KHÓA LIÊN QUAN