IS421 IT INFRASTRUCTURE AND NETWORK TECHNOLOGIES
Chapter 3: Focuses on Securing IT Infrastructure
Network Management and Security
Cybersecurity
Storage and Backup Architecture
Network security is complex and typically requires trained experts.
Increasing interconnectivity necessitates a broader understanding of network security basics.
Network Security: Measures, policies, and practices implemented to protect a computer network.
Objectives include protection from unauthorized access, misuse, data breaches, and cyberattacks.
Employs both hardware and software to maintain confidentiality, integrity, and availability of data.
Protects vital information while granting necessary access (e.g., trade secrets, medical records).
Ensures proper authentication and access control.
Guarantees resource availability.
Financial institutions
Internet service providers
Pharmaceutical companies
Government and defense agencies
Contractors and multinational corporations
ANYONE on the network
Identification
Authentication
Access Control
Unique identification of a user called UserID.
UserID may be a combination of:
User Name
User Student Number
User SSN
Process of verifying a user's identity based on:
Something the user knows: Password
Something the user has: Key, smart card
Something the user is: Biometrics (fingerprint, voice, retinal)
General Access Authentication: Controls overall access rights.
Functional Authentication: Determines actions authorized once identified.
Username/Password: Basic method (plaintext); vulnerable.
CHAP: Uses hashed passwords for secure transmission.
RADIUS: Central authentication method supporting various protocols.
Kerberos: Service authentication and authorization.
Two-party Authentication: User-Server authentication.
One-way Authentication: Only serves one entity.
Two-way Authentication: Mutual verification.
Third-party Authentication: Involves services like Kerberos and X.509.
Single Sign-On: Access multiple resources with one login.
Client: UserID & Password → Authenticate → Authenticated ServerID & Password.
Security Server → Exchange keys → Exchange data with clients.
Security features to manage who can access system resources.
Applications define and enforce access controls.
Confidentiality: Ensures authorized access only.
Integrity: Maintains data accuracy and reliability.
Availability: Ensures data is accessible when needed.
Protects sensitive data from unauthorized access.
Methods include:
Encryption
Access controls
Secure communications
Ensures data remains unchanged during storage and transmission.
Prevents unauthorized modification.
Methods include data validation, hashing, and digital signatures.
Ensures resources are available to authorized users.
Involves mitigating disruptions from failures or attacks.
Methods include:
Redundancy
Disaster recovery planning
Backup systems
Guides the implementation of security measures.
Balances the three core principles of security effectively.
Process of converting plaintext to ciphertext using algorithms.
Protects confidentiality and integrity of data.
Symmetric Encryption: Same key for encryption and decryption; challenges in key management.
Asymmetric Encryption: Uses public and private keys; more secure for key management.
Disk encryption software
File/folder encryption
Database encryption
Communication encryption
Network Traffic Encryption Tools
Simple encryption technique shifting letters by a number of positions.
Example: Plaintext HELLO shifted by 3 results in:
KHOOR
Alphabet shifts:
A → D, B → E, C → F, etc.
Result: KHOOR for HELLO
To decrypt, revert the shift:
K → H, H → E, O → L, R → O
Result: HELLO
The shift key is 3.
Easily broken by modern techniques, compared to more secure methods (e.g., AES, RSA).
Measures taken to protect wireless networks and their transmissions.
Vulnerable to interception, emphasizing the need for strong security.
Amendment to IEEE 802.11 standard for WLANs.
Ratified in 2004 to address vulnerabilities in older protocols (e.g., WEP).
WPA2: Implementation providing strong encryption and authentication.
Uses AES instead of insecure RC4 cipher for encrypting data.
Short-range wireless technology connecting devices (e.g., smartphones, computers).
Designed for quick connections over distances up to 100 meters.
Low power consumption
Short-range communication
Bluetooth pairing
Data encrypted with mechanisms like SSP and E0 cipher.
Bluetooth 4.0/4.2: Introduced low-energy capabilities for IoT.
Bluetooth 5.0/5.2: Enhanced range and speed for quicker transfers and larger capacities.
Standard allowing mobile devices access to internet content/services.
Developed for limited capability mobile devices.
HTTP and internet compatibility
Push and pull data services
XHTML support
Improved security features.
Technology | Focus/Functionality | Security Case/Applications |
---|---|---|
802.11i | Securing wireless LANs | WPA2 using AES for encryption & strong authentication |
Bluetooth | Short-range communication connections | Encryption via E0 and SSP |
WAP 2.0 | Mobile internet access protocol | WTLS security layer for early mobile web access |
Essential for maintaining data confidentiality, integrity, and availability.
Various strategies should combine technical measures and best practices.
Encryption: Encrypt data transmissions to protect confidentiality.
Network Firewalls: Monitor traffic to prevent unauthorized access.
Access Control: Implement RBAC, MFA, and network segmentation.
VPN: Encrypt remote connections to safeguard against eavesdropping.
Regular updates and patch management.
Adopt strong authentication policies.
Use DLP and antivirus solutions.
Authorized practice to identify and exploit vulnerabilities in systems.
Aims to enhance security by employing similar techniques as malicious hackers, legally.
Assess the security posture of systems/networks.
Identify weaknesses before they are exploited by malicious actors.
Reconnaissance: Gather information on the target system.
Scanning: Identify open ports and vulnerabilities.
Exploitation: Attempt to exploit vulnerabilities to evaluate impact.
Post-Exploitation: Evaluate potential actions post-access.
Reporting: Document vulnerabilities and suggest mitigations.
Certified Ethical Hacker (CEH): Validates knowledge and techniques.
Offensive Security Certified Professional (OSCP): Focuses on penetration testing skills.
CompTIA PenTest+: Covers penetration testing and vulnerability assessment.
Network security devices that monitor and control traffic based on rules.
Acts as a barrier between trusted and untrusted networks.
This can be hardware or software-based implementations.
Firewalls limit access to networked hosts and prevent unauthorized access.
Diagram: Shows the flow of traffic between the Internet, DMZ, and Intranet through firewalls.
Packet Filtering Firewalls: Examine packet headers and drop/block packets based on rules.
Stateful Inspection Firewalls: Track ongoing connections to allow/filter packets based on session state.
Proxy Firewalls: Intermediaries between user requests and the internet.
Next-Generation Firewalls (NGFW): Include additional security features (e.g., IPS, deep packet inspection).
Monitors network traffic for suspicious activities and threats.
Alerts administrators to potential security incidents.
Snort is an open-source IPS using defined rules to identify malicious activities.
Capable of packet sniffing and intrusion prevention.
NIDS: Monitor network-wide traffic for intrusion signs.
HIDS: Monitor individual devices for suspicious activities and analyze system integrity.
A method for breaking passwords using a list of common words.
Effective against users with weak passwords.
Create strong passwords with complexity.
Implement policies for complexity and regular changes to reduce risks.
Aims to disrupt normal service by overwhelming the target with traffic.
Causes significant downtime and financial losses.
DoS: Launches from a single source.
DDoS: Multiple compromised systems attack a single target.
Mitigations include rate limiting and DDoS protection services.
Shows the ICMP echo attack with spoofed addresses flooding the victim.
Capturing and analyzing data packets traveling over a network using sniffing tools.
Network Troubleshooting: Diagnose network issues and bandwidth analysis.
Security Monitoring: Identify malicious activity through traffic analysis.
Can capture sensitive data if not properly encrypted.
Plaintext data, especially passwords, can be compromised easily.
Use secure protocols (e.g., SSH, HTTPS) instead of unprotected methods (e.g., Telnet, FTP).
Implement network-layer confidentiality (e.g., IPsec).