Uploaded by Ayomal UH

information security

advertisement
Herath HMAU
Assignment 1
ITE 3242
1.
I.
DHCP is a protocol that is based on a DHCP server and dynamically allocates an IP
address to each host connected to the network. various parameters such as subnet
mask, DNS, and so on default gateway, and so on
•
•
•
•
In this form of attack (Man in the Middle attack), the attacker creates and
installs a rogue DHCP server to the network that he controls. When a client
connects to the network (Myself, in this case), He sends request message in
order to communicate with the DHCP servers. The request is interpreted by
both the actual and rogue DHCP servers. But the client will be accepting the
server that responds the first, which will be the attackers rogue server.
Since the rogue server’s offer was received first, the client sends a DHCP
request accepting the attacker defined parameters from the rogue server. Both
the real and rogue server will receive the request.
Then the rogue server will reply to the client acknowledging the request. Real
server will cease to communicate with the client.
Therefore, attacker can intercept and manipulate client’s all network traffic &
communications.
II.
•
•
•
•
•
To mitigate these type of attacks, I can use DHCP snooping on trusted ports.
DHCP snooping can be used to exclude rogue DHCP servers and eliminate
malicious DHCP traffic. DHCP snooping builds and maintains a DHCP snooping
binding database to filter DHCP messages from untrusted sources. A DHCP
snooping binding table includes client MAC address, IP address, DHCP lease
time, binding type, VLAN number etc.
I can install a VPN to encrypt the clients web traffic. It will limit an attacker’s
ability to interpret client’s web traffic.
Also, I can prevent an attacker from compromising the DNS server by using a
secure router with a strong encryption mechanism and by changing the
router’s default password.
By enabling HTTPS encryption on every request.
Regularly analyze traffic logs to identify anomalies and unusual behavior.
2.
A next-gen firewall is a network security device that offers several security
features in addition to a traditional firewall such as including and IDS, intrusion prevention
1
Herath HMAU
Assignment 1
ITE 3242
system (IPS), a TLS/SSL proxy, web filtering, Bandwidth throttling, cloud-delivered threat
intelligence, VPN etc.
Traditional legacy firewall
Next-gen firewall
Provides partial application visibility and Provides full application visibility and
control
application control
Only works with layer 2-4
Doesn’t
support
awareness
application
Works with layer 2-7
level Supports application level awareness
Cannot decrypt and inspect SSL traffic
Can decrypt and inspect both inbound and
outbound SSL traffic
Integrated intrusion protection system IDS and IPS are fully integrated with the
(IPS) and intrusion detection system (IDS) next-gen firewalls
are separate.
Performance of NAT, VPN and stateful
protocol inspection
Proactive against internet threats
Restricting web and web application use
based on the reputation of the site
3.
•
Fencing and Barricades
Physical barriers are the outmost layer of security and they are publicly
visible. A perimeter system typically consists of perimeter fence system, security gate
system, Bollards, vehicle entry barriers, guard shelters. These type of security
systems need regular maintenance. Regular fence inspections are needed. It is
important that not to park vehicles too close to a fence system. It can assist an
intruder to climb over the fence. A typical fence system use following rules.
o 1 meter – only deter casual trespassers
o 2 meters – too high to climb by casual trespassers
o 2.5 meters – offer limited delay to a determined intruder
•
Biometrics
Biometrics are the automated methods of recognizing an individual based on
a physiological or behavioral characteristic. They include measurements of the face,
2
Herath HMAU
Assignment 1
ITE 3242
fingerprints, hand geometry, iris, retina, signature and voice. Biometrics provide
confidential financial transactions and personal data privacy. Accuracy, speed,
acceptability to users, resistance to counterfeiting, reliability, data storage
requirements, enrollment time etc. are some of the important factors to consider
when designing a biometric system.
•
Badges and Access Logs
An access badge allows an individual to gain access to an area with automated
entry points. An entry point can be a door, a turnstile, a gate or a barrier. They use
various technologies such as magnetic stripes, barcode or biometrics. A card reader
is used to read a number on an access badge then the system sends that number to a
computer where, it makes access control decisions based on the credentials provided.
The system logs each transaction and it can report entry details at later time.
•
Guards and Escorts
Security guards are the best solution for access control when a situation
requires immediate and appropriate responses. Guards control access to an
organization’s most sensitive areas like in highly secure information system facilities.
However, it is costly to use guards and not suitable for monitoring and recording high
volume of traffic because humans make errors often.
•
Video and Electronic Surveillance
These are a solid replacement for security guards in some cases. There are
several advantages of using video & surveillance systems such as the ability to
monitor places where no guard or personnel are present, they can record the data for
long periods and have the ability to incorporate motion detection and notification.
They are more accurate in capturing events after they have occurred. And it is
economical to implement compared to guards.
•
RFID (Radio Frequency Identification) and Wireless Surveillance
The use of RFID asset tags can be a great value to the security staff. An
organization can place RFID readers in the door frames of secure areas so that they
aren’t visible to individuals.
3
Download