Uploaded by Akan Udoh

Network Security-1

advertisement
Network Security
The word "network security" refers to the tools, techniques, and policies used to monitor, detect,
and respond to illegal network intrusions and safeguard digital assets, such as network traffic.
When it comes to protecting any network, hardware and software solutions (and resources like
knowledgeable security analysts, hunters, and incident responders) are all part of the solution.
To protect the network against cyber-attacks, hackers, and staff irresponsibility, network security
is employed. Hardware, software, and cloud services all play a role in ensuring the safety of any
network. Using a variety of network security technologies creates a multi-layered defensive
mechanism in a competent network security system. This approach, known as defense-in-depth, is
based on the idea that even if a danger manages to get past one layer of protection, the others will
keep it out of the network. As a result of this, each layer can monitor, identify, and remediate
threats actively; it is dangerous to rely on a single line of defense. A cunning opponent can finally
overcome a single protective measure. Multiple defensive layers provide regulations and control
to ensure that only authorized users may access the network and its resources. Network
security should demonstrate the following three phases of security:
1. Protection: Correct system and network configuration
2. Detection: The capacity to recognize configuration changes or suspicious network traffic
3. Response: Immediate response to detected concerns to expeditiously ensure a safe
condition.
 Network Security Devices
Network Security devices are typically physical or virtualized hardware appliances, with vendor
specific software installed to perform lots of different jobs; some manage network traffic, others
detect threats, and still others provide secure remote access. Many security devices combine
functionality from multiple other devices, especially those that are intended for smaller businesses.
There are a lot of options when it comes to incorporating network security for secure network
services. This is by no means a complete list of security tools, but some examples include:
1. Firewall
Incoming and outgoing traffic on a network is controlled by firewalls, which have established
security policies. Firewalls protect computers within and outside a network from unwanted traffic
and are an essential component of any modern computing environment. Firewalls, particularly
Next-Generation Firewalls(NGFWs), play a critical role in network security, preventing malware
and application-layer attacks. Some types of firewall include;
 Packet-filtering firewall
The first and simplest type of firewall is one that filters packets. At the network layer, they merely
compare the source and destination IP addresses, protocol, and source/destination port of a data
packet against set rules to determine whether or not to allow or refuse it. Packet filtering
firewalls are inherently stateless, which means they monitor each packet independently without
keeping track of the established connection or packets that have gone through it previously. As a
result, the capacity of these firewalls to defend against sophisticated threats and assaults is
significantly compromised.
 Proxy firewall
Proxy firewalls, also known as application-level gateways, are constructed via an application-layer
proxy server. Instead of directly connecting to the internal network, the connection is established
through the proxy firewall. The proxy firewall will initially receive a request from an external
client. The proxy firewall then checks the request's legitimacy before sending it on behalf of the
client to one of the internal devices. An internal client may also request website access, with the
proxy device sending the request while concealing the client's name and location. Consequently,
one of the primary benefits of proxy firewalls is the provision of privacy.
 Stateful packet-filtering firewall
Stateful inspection firewalls inspect packets in addition to validating and recording existing
connections to provide more robust and comprehensive protection. After establishing a connection,
they generate a state table including the source/destination IP addresses and source/destination
ports. Rather than relying on a hard-coded set of rules based on this information, they generate
their own rules dynamically to enable the prediction of incoming network traffic. Not-belongingto-a-verified-active-connection data packets are conveniently refused. Stateful firewalls feature
significant logging capabilities that may be employed for monitoring and troubleshooting.
 Web application firewall (WAF)
A web application firewall or WAF aids in the protection of web applications by filtering and
monitoring HTTP traffic between a web application and the Internet. It generally protects online
applications from several threats, including cross-site forgery, cross-site scripting (XSS), file
inclusion, and SQL injection. A WAF is protection at protocol layer 7 (in the OSI model) and is
not meant to guard against all forms of assaults. Typically, this technique of attack mitigation is
part of a suite of technologies that, when combined, provide comprehensive protection against a
variety of attack vectors.
By placing a WAF in front of a web application, the application is protected from the Internet. A
proxy server protects the identity of a client machine by acting as an intermediary, whereas a WAF
is a form of reverse proxy that shields the server from exposure by requiring clients to pass through
it before contacting the server.
2. Antivirus
Malware and other potentially harmful applications may be detected and removed using an
antivirus tool. It was formerly possible to employ antivirus software to protect against only viruses.
As a result, they now protect from malware, ransomware, and spyware, among other threats. In
some cases, email phishing attempts can also be prevented by antivirus software. Network security
devices and tools should be able to detect threats from any source, including dangerous programs
and viruses via email.
3. Intrusion detection system (IDS)
IDS is a hardware or software program that monitors a network for harmful activities or policy
breaches, such as phishing. A security information and event management system is often used to
report or gather any harmful activity or violation. Some intrusion detection systems (IDS) can
respond immediately to intrusion detection. Two major kinds of intrusion detection software
systems exist host-based and network-based. These categories correspond to the placement of IDS
sensors (on a host/endpoint or a network). Some specialists categorize the market even further,
citing perimeter IDS, VM-based IDS, stack-based IDS, signature-based IDS, and anomaly-based
IDS (with acronyms matching the IDS' descriptive prefixes). Major types of IDS are;
 Intrusion Protection Systems (IPS)
When harmful behavior is detected on a network, an intrusion prevention system (IPS) takes action
to prevent it, such as reporting, blocking, or dropping it. IPSs can be hardware or software.
Intrusion detection systems (IDS) can only identify harmful behavior, but they can't do anything
about it other than inform an administrator. Next-generation firewalls and unified threat
management (UTM) solutions often include intrusion prevention systems as an optional
component. They must be strong enough to scan a large volume of traffic without slowing down
network performance, like many other network security systems.
 Host-based intrusion detection systems
HIDS is an acronym for "host-based intrusion detection system," a program that keeps an eye on
a computer or network for any unusual behavior, such as invasions from outside or internal misuse
of resources or data. HIDS software, like a home security system, tracks abnormal activities and
alerts network administrators. When using HIDS tools, you may easily search through the log files
created by your apps to look for indicators of an intrusion and other irregularities. Automated
detection is the primary purpose of HIDS tools, which eliminates the need to manually search
through log files once they've been sorted and processed.
 Network-based intrusion detection systems
A NIDS is a type of network intrusion detection system (NIDS) in which devices are intelligently
dispersed throughout a network and passively monitor the traffic passing over them. NIDS can be
hardware or software-based systems and can connect to various network media, such as Ethernet,
FDDI, and others, depending on the manufacturer of the system. NIDS typically feature two
network ports. Promiscuous mode listening and control and reporting are the primary functions of
these tools.
4. Unified Threat Management (UTM)
UTM is an information security word that refers to a single security solution, and typically a single
security appliance, that delivers numerous network security functions at a single location.
Antivirus, anti-spyware, anti-spam, network firewalling, intrusion detection and prevention,
content filtering, and leak protection are typical features of a UTM device. Some devices
additionally include remote routing, network address translation (NAT), and support for virtual
private networks (VPN). The solution's appeal is built on its simplicity, so enterprises that
previously had different suppliers or appliances for each security activity can now have them all
under a single vendor, backed by a single IT team or division, and managed from a single interface.
5. Wireless Intrusion Prevention and Detection System (WIDPS)
As specialized security equipment or integrated software program, the wireless intrusion
prevention system (WIPS) is responsible for keeping an eye on the radio spectrum in the vicinity
of the wireless network for any rogue access points or other dangers.
An administrator is alerted when a difference is identified between the MAC addresses of all
wireless access points on a network and the known signatures of pre-authorized, known wireless
access points. WIPS capable of analyzing the unique radio frequency signatures generated by
wireless devices can avoid MAC address spoofing by blocking unfamiliar radio fingerprints.
6. Network Access Control (NAC)
These NAC systems provide visibility and access management for business networks by enforcing
policies on devices and users. Because of the increasing number of mobile devices connecting to
networks and posing security concerns, businesses must have the tools necessary to monitor,
manage access to, and ensure compliance with their network security policies. Using
a NAC system, insecure nodes can't get access to the network by being blocked from using it,
isolated, or given only limited access to computing resources.
7. Network Load Balancer (NLB)
A Network Load Balancer operates at the Open Systems Interconnection (OSI) model's fourth
layer. It is capable of processing millions of queries per second. After receiving a connection
request, the load balancer picks a target from the target group for the default rule. It tries to
establish a TCP connection with the given destination on the port specified in the listener settings.
NLB is created particularly for high-performance online traffic that is not typical. NLB can handle
millions of queries per second while retaining extremely low latency.
8. Web Filter
The primary purpose of a web filtering device is to improve online security, but it also provides
some useful secondary benefits. A web content filter equipment stops Internet users from accessing
websites that host malware and ransomware. It protects organizations, networks, and users from a
variety of web-based threats and decreases the chance of a financial or data loss resulting from
acts of cybercriminals. In the workplace, web content filtering appliances can be configured to
prevent employees from visiting non-work-related websites and "cyber-slacking", thereby
increasing productivity. In any public Internet access location (such as a store, a school, or a
workplace), a web content filter appliance can prevent customers, students, diners, and employees
from being exposed to inappropriate online content.
9. Spam Filter
Spam filtering solutions were created to assist consumers to detect, identifying, and avoiding
unsolicited emails. Today, the majority of anti-spam companies utilize effective email filters to
classify messages, hence enhancing email deliverability. Here is a list of the most prevalent antispam filters:

Bayesian filters - one of the most powerful filters ever created - employ cutting-edge
technology to examine the statistical likelihood of every incoming communication.

Heuristic Analysis - examine the language and substance of communication to evaluate
the characteristics and behavior of incoming message to determine the likelihood of them
being spam or not.

Blacklist/ Whitelist filters – compares incoming emails against individualized list of
spammers, email addresses, IP addresses, or domains associated with spammers known as
a blacklist, and block any email that has been blacklisted. Or permits email only from
known and trusted senders found on the whitelist.

Challenge-response filters - the primary function of a challenge-response filter is to verify
that a human is transmitting the message. Before acquiring authorization to send an email,
a challenge-response filter requires the sender to provide a code or solve a CAPTCHA
puzzle.
10. Proxy Server
A proxy server is a system or router that gives access to the Internet to users. Consequently, it
prevents cybercriminals from infiltrating a private network. It is a server that acts as a middleman
between end-users and the websites they visit online. When a computer connects to the internet,
an IP address is utilized. This is analogous to your residence's street address, directing incoming
data to its destination and identifying outgoing data with a return address for other devices to
validate. A proxy server is simply a computer with its IP address on the Internet.
There is more than one kind of forward HTTP proxy to select from, based on your requirements.
The level of privacy they give is the key distinction between these proxy server categories:

Transparent proxy: A transparent proxy does not provide any enhanced privacy or
security. Web servers receive your true IP address and are aware of your proxy connection
when you use a proxy.

Anonymous proxies: Anonymous proxies guarantee that they will not transmit your IP
address to the websites and services that you use. Websites will receive a spoofed IP
address instead of your genuine one, which is why anonymous proxies are also known as
distorting proxies.

High anonymity proxies: Consider high anonymity proxies, also known as elite proxies,
an upgrade from your typical anonymous proxy. The foundations are the same, but high
anonymous proxies further conceal your usage of the proxy. If you use one of these, a
website will be unable to identify your proxy usage.
11. VPN Gateways
In a VPN system, a VPN gateway is a type of networking equipment that links two or more devices
or networks. It is intended to bridge the connection or communication between two or more distant
sites, networks, or devices, or to link several VPNs. A VPN gateway may be a router, server,
firewall, or any internetworking and data transmission-capable equipment. However, a VPN
gateway is often actual network equipment. Typically, the VPN gateway is situated at the central
VPN site or infrastructure. The VPN gateway is set up to allow, block, or divert VPN traffic. It
provides fundamental VPN networking services like IP address assignment and administration,
dynamic and static routing, and routing table maintenance.
12. Email Security Gateways
An email gateway is a type of email server that safeguards the internal email servers of an
organization or user. This server functions as a gateway through which all incoming and outgoing
emails must travel. A Secure Email Gateway (SEG) is hardware or piece of software used for
monitoring transmitted and received emails. Messages gateway protection is intended to block
spam and deliver legitimate emails. Unwanted messages include spam, phishing attempts, viruses,
and false information. It is possible to examine outgoing communications to prevent sensitive
material from leaving the business or to automatically encrypt emails containing sensitive data.
Depending on the needs, SEG functionality can be installed as a cloud service or an on-premises
appliance.
13. Content Filtering Devices
The definition of content filtering software is a program that blocks access to web material and
incoming content such as email that may be deemed unsuitable, offensive, or a security risk. It is
a component of a network firewall. In today's increasingly linked, content-driven world, content
filtering software solutions are essential for running any organization. Even the tiniest businesses
require safe email services. Email accounts for 94% of virus execution, which is rather interesting.
Therefore, no firm can afford to disregard content filtering software solutions in its infrastructure.
The initial stage in the search for a content filtering system is to determine the intended use cases.
Among the most frequently use cases of content filtering are as follows:

To avoid social engineering assaults that result in data breaches and malware downloads.

To adhere to industry-specific standards, like the Children's Internet Protection Act (CIPA)
for schools and libraries.

Observance of business policy: To enforce corporate regulations, such as prohibiting
gambling or social media usage on company property.

To liberate the company's network of the unwanted payload by blocking streaming
websites.

Restrictions on violent and adult material to filter and block inflammatory and
pornographic content.
14. Network Device Backup and Recovery
Every company relies heavily on its network to perform day-to-day operations and conduct
business in the contemporary digital era. For this reason, any network outage caused by hardware
failure or configuration settings can have a significant negative impact on the organization's
productivity and revenue. It is essential, then, that you have robust recovery solutions that allow
you to return to the Internet in the quickest time possible. With so many unique network devices,
it might be difficult to implement and undo configuration changes. Additionally, it is difficult to
recover a large number of different devices fast in the case of a tragedy. Because of these benefits,
centralized backup and recovery for network devices is highly advantageous. By storing the
configuration and state of network devices in a safe location, network configuration management
systems automate the backup process and facilitate rollback or restore procedures.
15. Tripwire
A tripwire in network security tool, refers to a security mechanism or system that detects and alerts
administrators to potential unauthorized access or changes in the network. It takes its name from
a physical tripwire used in the military, which triggers an alarm when someone crosses it. In the
context of cybersecurity, a network tripwire serves a similar purpose by acting as an intrusion
detection system.
Here's how a network tripwire typically works:

Baseline Establishment: Before deploying a tripwire system, administrators establish a
baseline or normal state of the network. This includes normal traffic patterns, system
configurations, file integrity, and other relevant parameters.

Monitoring: The tripwire continuously monitors the network for any deviations from the
established baseline. This can include changes in file contents, system settings, user behavior,
or network traffic.

Alert Generation: When the tripwire detects a deviation or anomaly that could indicate a
security threat, it generates an alert. These alerts can take various forms, such as notifications
sent to administrators, log entries, or even automated responses like blocking suspicious traffic.

Response and Investigation: Upon receiving an alert, security personnel or administrators
investigate the event to determine whether it's a legitimate change or an unauthorized activity.
This may involve analyzing logs, reviewing security policies, and assessing the severity of the
incident.

Prevention or Mitigation: Depending on the nature of the detected event, administrators take
appropriate actions to prevent further damage or compromise. This could involve isolating
affected systems, blocking malicious traffic, or applying security patches.
Types of Network Tripwires:

File Integrity Monitoring (FIM): Monitors changes to critical system files or configurations.
Unexpected modifications can be indicative of unauthorized access or a malware infection.

Intrusion Detection System (IDS): Analyzes network traffic for patterns or behaviors that
may indicate a security threat. This can include detecting known attack signatures or anomalies
in network behavior.

Host-based Tripwire: Focuses on monitoring individual devices (hosts) for changes in file
integrity, system logs, or configurations.

Network-based Tripwire: Monitors network traffic and focuses on identifying unusual
patterns or behaviors that could indicate a security incident.

Behavioral Analysis: Analyzes user behavior, looking for deviations from normal patterns of
activity. This can include unusual login times, access patterns, or resource usage.

Endpoint Detection and Response (EDR): Combines continuous monitoring of endpoints
(devices) with automated response capabilities. It is particularly effective against advanced
threats.
Benefits:

Early Detection: Tripwires enable early detection of potential security incidents, allowing
organizations to respond quickly and mitigate risks before significant damage occurs.

Continuous Monitoring: They provide continuous monitoring, offering a proactive security
approach against evolving threats.

Forensic Analysis: Tripwires often provide detailed logs and information, aiding in forensic
analysis to understand the nature and extent of a security incident.

Compliance: Tripwire systems can assist organizations in meeting regulatory compliance
requirements by ensuring the integrity and security of their systems.
While network tripwires are valuable components of a comprehensive cybersecurity strategy, it's
important to note that they work best when integrated into a layered security approach alongside
firewalls, antivirus solutions, and other security measures. Additionally, regular updates to
baseline configurations and continuous refinement of detection rules are essential to maintaining
the effectiveness of tripwire systems.
 Network Security Design
Regardless of whether it’s a LAN, data center, or WAN, some of the key considerations for
security in network design are
 Network segmentation
While using different VLANs can provide benefits such as smaller flooding and failure domains,
segmentation usually is used to describe two networks that don’t have direct access to each
other. There are majorly two forms of segmentation; macro segmentation and micro
segmentation.
Macro-Segmentation - used to describe networks that are walled off from each other. For
example;
1. A guest network that is separate from the enterprise users’ network
2. A management network that is separate from the enterprise users, and
3. An IoT network that is isolated from everything else.
Macro-segmentation is often implemented using Virtual Routing and Forwarding (VRFs) and/ or
firewalls.
Micro-Segmentation - describes how to filter within a macro segment. For example;
1. Maybe users shouldn’t be able to communicate with each other.
2. Should a printer be able to communicate with another printer?
3. Should one ventilation system be able to communicate with another?
Normally they can, since they belong to the same segment, but you may want to restrict it, which
would require micro segmentation. This would often be implemented using some form of Software
Defined Networking (SDN) technology or by installing a client on computers and servers, etc.
There are also of course many other types of segments, such as a Demilitarized Zone (DMZ),
where you host public services that are reachable from the internet.

Network access control
Let’s say you plug in your computer to a switch port. With no authentication, you have full access
to other users, your management network, and the internet. Is this good security? We could argue
that it’s bad, but what did the requirements say? When implementing network access control, we
must of course consider the security requirements, but also the ease of use. If the network becomes
too complicated and complex to use, and error-prone, then our design has failed, even if we met
the requirements. What is network access control?
Many forms of network access control come to mind. The most obvious one perhaps is to
implement 802.1X in your LAN. This is a mechanism that authenticates users, and optionally their
computer, before allowing them access to the LAN. This can be in the form of providing
credentials, and/or using certificates. Depending on the user, they may get different levels of access
to the network. This can for example leverage Dynamic ACLs (DACL). There are of course many
other methods, such as using firewalls to enforce rules for what traffic can flow between segments.
The network may use a proxy, such as Umbrella Secure Internet Gateway (SIG), to enforce what
is allowed for use on the internet. This can be enforced in the network or on the client itself.
There may also be things that are so obvious that you didn’t even consider them. What about
putting network equipment in a locked room to prevent people from accessing them or shutting
down switch ports so that people can’t connect to random ports? Network access control can be
anything from physical security, to policy, and much more.

Visibility
How do you get visibility? That’s one big and complicated topic! Did you know that almost all
traffic, at least to the internet, is encrypted? This means that it’s getting more and more difficult to
see what traffic we have in our networks and hence, how to protect against potential threats. What
can we do? We can try to glean information from the packets by looking at DNS requests (if not
encrypted), IP addresses (where the packets are going), what ports the packet is using, patterns in
the packet, such as size and frequency, and other things. There are well-known prefixes, such as
when using Microsoft 365 for example, where we can make a qualified guess about what the traffic
is if we recognize the prefix. To get visibility, we often need some form of third-party product that
can take information from the network, for example, in the form of Deep Packet Inspection (DPI),
NetFlow, packet taps, packet mirroring, etc. To get full visibility, most likely, you will have to
install something at the client. The client is the only place where you can see unencrypted packets
— unless you are decrypting the users’ packets using Transport Layer Security (TLS) inspection,
of course.
There are many other ways of getting visibility, such as using proxies, firewalls, network access
control, and Syslog. The most difficult part, considering the wealth of information, is
understanding what is actually going on and how you can prevent attacks such as the exfiltration
of your data. If someone logs in from a location where you have no office and they transfer lots of
data, wouldn’t you want to know about it? Ideally, visibility should get you insights into incidents
such as these.

Policy enforcement
How do we enforce our policies, like the requirement that users can’t talk to each other? How is
policy enforcement different from network access control? Network access control pertains more
to giving access to the network itself while policy enforcement is about preventing access when
you already have access. There’s quite some overlap here, though. Let’s break the word down into
its components. Policy is the intent of our network; the translation of our requirements into a set
of rules. Enforcement is to ensure that our policy gets adhered to. To be able to enforce something,
packets must pass through a device that can decide if the packet adheres to the policy or not.
What we need are choke points. When you travel to another country, they have a border. They also
control your passport before admitting you. This is policy enforcement at a choke point. This is
the same thing that we do in our networks. Traditionally, all our traffic went to some kind of
headquarters or data center and passed through a big fat firewall. Most organizations moved away
from this design, as it created a less-than-optimal user experience. But what are some of the
chokepoints or potential policy enforcement nodes that we have today? There are many, just a few
are listed below







Firewalls
Proxies
IDS/IPS (often integrated with the FW)
Switches
Routers
Wireless LAN controllers
Applications on clients and servers
There are many places we can enforce policies. The main challenge is most often on getting
visibility, though. You can’t enforce a policy if you don’t know what’s in the packet.
The other challenge is often around implementation. If you have a firewall in every branch, and
you have 1000 branches, how easy is it to manage this? It would come down to how standardized
your design is. This is why many organizations are now using cloud proxies to have fewer choke
points and make it more manageable. The other thing I often see in network design is organizations
don’t know what their policy is, what apps and systems they have, or what ports they use and the
traffic flow. You can’t write a policy if you don’t have enough information to classify what is
allowed or not.

CIA triad
CIA in a network design is:
 C – Confidentiality
 I – Integrity

A – Availability

Regulatory compliance
Regulatory compliance is there to ensure that organizations live up to the standards that are
required to keep our data safe. The two most well-known ones are probably Health Insurance
Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security
Standard (PCI DSS). HIPAA is used to help keep our medical records safe, for example. PCI DSS
is used to create safe payments, so our credit card numbers don’t get leaked.
When it comes to regulatory compliance, there are a lot of requirements that come with them. You
have to fulfill the requirements, and there may be auditing involved to ensure that you are doing
so. The requirements may include things like segmentation, encryption, access control, and
more. While working with regulatory compliance can be tedious, time-consuming, and sometimes
feel like you are designing for things that should be obvious, they are there to ensure that
organizations meet the minimum standards when working with sensitive things such as medical
records and payment information.
 Wireless Network and Security Mechanism
Wireless networks have become an integral part of modern connectivity, offering convenience and
flexibility. However, they also introduce security challenges due to the broadcast nature of wireless
communication. Implementing robust security mechanisms is crucial to safeguarding wireless
networks from unauthorized access, data breaches, and other security threats. Here is an overview
of wireless networks and key security mechanisms:
Types of Wireless Networks:

Wi-Fi (Wireless Fidelity): Common for local area networking in homes, businesses, and
public spaces.
 Mobile Networks: Cellular networks providing wireless communication for mobile devices.
 Satellite Networks: Communication via satellite signals, often used in remote areas.
 Bluetooth: Short-range wireless technology for device-to-device communication.
 Zigbee and Z-Wave: Wireless technologies for home automation and Internet of Things
(IoT).
Wireless Network Components:
 Access Points (AP): Devices that enable Wi-Fi connectivity.
 Wireless Routers: Devices that combine a router, switch, and wireless access point.
 Wireless Clients: Devices connecting to the wireless network.
 SSID (Service Set Identifier): Network name that identifies a wireless network.
Security Mechanisms for Wireless Networks:
1. Encryption:
 WPA3 (Wi-Fi Protected Access 3): The latest standard providing robust
encryption for Wi-Fi networks. It improves upon WPA2 by using stronger
encryption algorithms.
2. Authentication:
 WPA3-Personal (WPA3-PSK): Uses a pre-shared key for authentication.
 WPA3-Enterprise: Utilizes a RADIUS server for centralized authentication.
3. Network Segmentation:

VLANs (Virtual Local Area Networks): Divides a wireless network into multiple
isolated segments, enhancing security.
4. Firewalls:
 Wireless Intrusion Prevention System (WIPS): Monitors wireless networks for
suspicious activity and enforces security policies.
 Stateful Firewalls: Control incoming and outgoing network traffic based on an
administrator's predefined rule set.
5. Secure Configurations:
 Changing Default Credentials: Ensuring that default usernames and passwords
on network devices are changed.
 Disabling Unnecessary Services: Turning off unnecessary features to reduce the
attack surface.
6. Rogue AP Detection:
 WIDS (Wireless Intrusion Detection System): Identifies unauthorized or rogue
access points within the network.
7. MAC Filtering:
 Allowlist/Blocklist: Permitting or denying specific devices based on their MAC
addresses.
8. Physical Security:
 Access Controls: Limiting physical access to networking equipment to authorized
personnel.
9. Regular Firmware Updates:
 Keeping networking devices updated with the latest firmware to patch
vulnerabilities.
10. Monitoring and Logging:
 Log Analysis: Regularly reviewing logs to detect and respond to security incidents.
 Network Monitoring Tools: Utilizing tools to monitor network traffic and identify
anomalies.
11. VPN (Virtual Private Network):
 Wireless VPNs: Encrypting traffic between wireless clients and the network to
secure communication over untrusted networks.
12. Educating Users:
 Security Awareness Training: Educating users about best practices, such as
avoiding connecting to unsecured networks and recognizing phishing attempts.
13. 802.1X Authentication:
 Port-Based Network Access Control: Provides a mechanism for authenticating
devices on a network.
Challenges and Considerations:
 Signal Interference: Wireless signals can be subject to interference, affecting network
performance.
 Man-in-the-Middle Attacks: Wireless networks are susceptible to eavesdropping and
unauthorized interception of data.
 Device Proliferation: The increasing number of connected devices poses challenges in
managing and securing the wireless network effectively.
Implementing a combination of these security mechanisms is essential for creating a robust defense
against potential wireless network threats. Regular security audits and staying informed about
emerging security issues contribute to maintaining a secure wireless environment.
 Network Security Protocols
Network security protocols are essential for safeguarding data and ensuring the integrity,
confidentiality, and availability of information within a network. These protocols define the rules
and procedures that govern secure communication and protect against various cyber threats. Here
are some fundamental network security protocols:
1. Transport Layer Security (TLS) / Secure Sockets Layer (SSL):
 Purpose: Encrypts data in transit to ensure secure communication over the Internet.
 Key Features:
 Provides secure communication between clients and servers.
 Uses cryptographic protocols to secure data transmission.
 Commonly used for securing web traffic (HTTPS).
2. Internet Protocol Security (IPsec):
 Purpose: Provides secure communication at the IP layer.
 Key Features:
 Encrypts and authenticates IP packets.
 Supports both transport mode (end-to-end encryption) and tunnel mode (entire
packet is encrypted).
 Commonly used in Virtual Private Network (VPN) implementations.
3. Secure Shell (SSH):
 Purpose: Provides secure remote access to systems over an unsecured network.
 Key Features:
 Encrypts communication between client and server.
 Supports various authentication methods, including password-based and public
key-based authentication.
4. Pretty Good Privacy (PGP) / GNU Privacy Guard (GPG):
 Purpose: Ensures secure email communication and file encryption.
 Key Features:
 Uses public-key cryptography for secure email communication.
 Enables users to digitally sign and encrypt emails and files.
 Commonly used for securing email communications.
5. Domain Name System Security Extensions (DNSSEC):
 Purpose: Mitigates DNS-related attacks by adding an additional layer of security.
 Key Features:
 Ensures the integrity of DNS data.
 Provides authentication of DNS responses.
 Helps prevent DNS cache poisoning and man-in-the-middle attacks.
6. Wireless Encryption Protocols:
 Wi-Fi Protected Access (WPA) / WPA2 / WPA3:
 Purpose: Secures wireless networks.

Key Features:
 Provides encryption and authentication for Wi-Fi connections.
 WPA3, the latest version, introduces stronger encryption and security
features.
7. Virtual Private Network (VPN) Protocols:
 IPsec (as mentioned earlier):
 Purpose: Secures communication over public networks.
 Key Features:
 Encrypts and authenticates data transmitted between network devices.
 OpenVPN:
 Purpose: Creates secure point-to-point or site-to-site connections.
 Key Features:
 Utilizes SSL/TLS for key exchange and authentication.
8. Simple Network Management Protocol (SNMPv3):
 Purpose: Enables the monitoring and management of network devices.
 Key Features:
 Provides secure communication for network management.
 Includes authentication and encryption features to protect SNMP messages.
9. Secure File Transfer Protocols:
 SFTP (Secure File Transfer Protocol):
 Purpose: Secures file transfer over a network.
 Key Features:
 Provides file access, transfer, and management over a secure channel.
 Uses SSH for encryption and authentication.
 SCP (Secure Copy Protocol):
 Purpose: Securely copies files between hosts on a network.
 Key Features:
 Utilizes SSH for encryption and authentication.
10. Secure Internet Message Access Protocol (IMAPS):
 Purpose: Secures email retrieval over the Internet.
 Key Features:
 Encrypts communication between email clients and servers.
 Commonly used for secure access to email accounts.
These protocols play a crucial role in establishing and maintaining secure communication across
networks, ensuring the confidentiality, integrity, and availability of sensitive information.
Depending on the specific use case and requirements, organizations may implement a combination
of these protocols to create a comprehensive network security strategy.
 Network Security Layers
Network security is typically implemented using a layered approach, often referred to as defensein-depth. Each layer adds a level of protection to prevent, detect, and respond to various types of
security threats. Here are the key network security layers:
1. Physical Security:
 Description:
 Protects the physical infrastructure of the network.

Involves measures to secure servers, network devices, and data centers.
 Security Measures:
 Access controls, surveillance cameras, biometric authentication, secure facility
design.
2. Perimeter Security (Firewalls):
 Description:
 Establishes a boundary between the internal network and external entities (e.g., the
internet).
 Controls traffic entering and leaving the network.
 Security Measures:
 Firewalls, intrusion detection/prevention systems, demilitarized zones (DMZ).
3. Network Access Control (NAC):
 Description:
 Ensures only authorized devices and users can access the network.
 Verifies the security posture of devices before allowing them on the network.
 Security Measures:
 Authentication mechanisms, VLAN segmentation, endpoint security assessments.
4. Secure Network Architecture:
 Description:
 Involves designing the network in a way that minimizes security vulnerabilities.
 Segments the network to contain and control the impact of security incidents.
 Security Measures:
 Network segmentation, least privilege access, proper routing and switching
configurations.
5. Network Encryption:
 Description:
 Protects data in transit to prevent eavesdropping and interception.
 Ensures the confidentiality of communication between devices.
 Security Measures:
 VPNs (Virtual Private Networks), TLS/SSL for secure communication.
6. Intrusion Detection and Prevention Systems (IDPS):
 Description:
 Monitors network traffic for signs of malicious activity.
 Takes preventive measures to stop or mitigate ongoing attacks.
 Security Measures:
 Signature-based detection, anomaly-based detection, real-time monitoring.
7. Application Layer Security:
 Description:
 Protects specific applications and services running on the network.
 Focuses on vulnerabilities within application-layer protocols.
 Security Measures:
 Web application firewalls, secure coding practices, regular application security
assessments.
8. Endpoint Security:

Description:
 Secures individual devices (computers, laptops, mobile devices) connected to the
network.
 Protects against malware, unauthorized access, and data breaches.
 Security Measures:
 Antivirus software, endpoint detection and response (EDR), device encryption.
9. User Education and Awareness:
 Description:
 Trains and educates users about security best practices and potential threats.
 Aims to reduce human errors that can lead to security breaches.
 Security Measures:
 Security awareness programs, phishing simulations, user training.
10. Incident Response and Management:
 Description:
 Establishes processes and procedures to respond to security incidents.
 Minimizes the impact of security breaches and facilitates recovery.
 Security Measures:
 Incident response plans, incident detection and reporting, post-incident analysis.
11. Security Monitoring and Logging:
 Description:
 Monitors network activities and logs events for analysis.
 Provides visibility into potential security incidents and policy violations.
 Security Measures:
 Security information and event management (SIEM) systems, log analysis tools.
12. Regular Audits and Assessments:
 Description:
 Periodically evaluates the effectiveness of security controls and policies.
 Identifies and addresses vulnerabilities through proactive assessments.
 Security Measures:
 Security audits, penetration testing, vulnerability assessments.
13. Security Policies and Procedures:
 Description:
 Establishes guidelines and rules for secure network use.
 Ensures consistency and compliance with security best practices.
 Security Measures:
 Acceptable use policies, data handling policies, incident response plans.
14. Authentication and Authorization:
 Description:
 Verifies the identity of users and devices.
 Controls access to network resources based on user roles and permissions.
 Security Measures:
 Strong authentication methods, multi-factor authentication, role-based access
controls.
Implementing a combination of these security layers provides a comprehensive defense against a
wide range of security threats. The goal is to create a multi-faceted security posture that addresses
vulnerabilities at various levels within the network architecture.
Download