Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 1:
What Is Security?
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 1 Objectives
• 1.1.1: Define security
• 1.1.2: Identify the importance of network security
• 1.1.3: Identify potential risk factors for data security, including improper authentication
• 1.1.4: Identify security-related organizations, warning services and certifications
• 1.1.5: Identify key resources that need specialized security measures
• 1.1.6: Identify the general types of security threat/attacker
• 1.2.6: Select security equipment and software based on ease of use
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Network Security Background
• Internet-related security threats:
– Security problems with browsers
– Attacks by hackers
– Threats from viruses
– Internet inherently insecure
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
What Is Security?
• Local area networks (LANs)
• Wide area networks (WANs)
• Virtual private networks (VPNs)
• Network perimeters
• Illicit servers
• Trojans
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Hacker Statistics
• Reported incidents have risen steadily:
– From 252 in 1990
– To 9,859 in 1999
– To 137,529 in 2003
• Total vulnerabilities cataloged have also risen steadily:
– From 417 in 1999
– To 3,784 in 2003
– To 7,236 in 2007
• Losses due to security breaches are estimated at $67.2 billion (2005)
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
The Myth of
100-Percent Security
• Balance in security
• Security policies
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Attributes of an
Effective Security Matrix
• Allows access control
• Easy to use
• Appropriate cost of ownership
• Flexible and scalable
• Superior alarming and reporting
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
What You Are
Trying to Protect
• End-user resources
• Network resources
• Server resources
• Information-storage resources
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Who Is the Threat?
• Casual attackers
• Determined attackers
• Spies and industrial espionage
• End users
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Security Standards
• Security Services (ISO 7498-2)
– Authentication
– Access control
– Data confidentiality
– Data integrity
– Non-repudiation
• Security mechanisms
• Other government and industry standards in addition to ISO 7498-2
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 1 Summary
1.1.1: Define security
1.1.2: Identify the importance of network security
1.1.3: Identify potential risk factors for data security, including improper authentication
1.1.4: Identify security-related organizations, warning services and certifications
1.1.5: Identify key resources that need specialized security measures
1.1.6: Identify the general types of security threat/attacker
1.2.6: Select security equipment and software based on ease of use
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 2:
Elements of Security
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 2 Objectives
• 1.1.7: Identify ways in which increased security mechanisms can result in increased latency
• 1.1.8: Define the significance of a security policy
• 1.1.9: Identify and develop basic components of an effective security policy
• 1.1.10: Identify the key user authentication methods
• 1.1.11: Define the significance of access control methods
• 1.1.12: Define the functions of access control lists (ACLs) and execution control lists (ECLs)
• 1.2.1: Identify the three main encryption methods used in internetworking
• 1.2.5: Identify the importance of auditing
• 1.2.6: Select security equipment and software based on ease of use
• 1.2.7: Identify security factors related to transmission of unencrypted data across the network
• 1.2.9: Identify the significance of encryption in enterprise networks
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Security Elements and Mechanisms
Elements of effective security
Audit Administration
Encryption Access Control
User Authentication
Corporate Security Policy
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
The Security Policy
• Classify systems
• Prioritize resources
• Assign risk factors
• Define acceptable and unacceptable activities
• Define security measures to apply to resources
• Define education standards for employees
• Determine who is responsible for administering the policies
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Determining Backups
• To recover data lost due to an attack:
– Enable a backup device
– Enable a backup service
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Encryption
• Encryption categories
– Symmetric
– Asymmetric
– Hash
• Encryption services
– Data confidentiality
– Data integrity
– Authentication
– Non-repudiation
• Encryption strength
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Authentication
• Authentication methods
– What you know
– What you have
– Who you are
– Where you are
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Specific
Authentication Techniques
• Kerberos
• One-time passwords (OTP)
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Access Control
• Access Control List (ACL)
– Objects
– Common permissions
• Execution Control List (ECL)
– Sandboxing
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Auditing
• Passive auditing
• Active auditing
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Security Tradeoffs and Drawbacks
• Increased complexity
• Slower system response time
• Consider:
– Ease of installation
– An intuitive interface
– Effective customer support
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 2 Summary
1.1.7: Identify ways in which increased security mechanisms can result in increased latency
1.1.8: Define the significance of a security policy
1.1.9: Identify and develop basic components of an effective security policy
1.1.10: Identify the key user authentication methods
1.1.11: Define the significance of access control methods
1.1.12: Define the functions of access control lists (ACLs) and execution control lists (ECLs)
1.2.1: Identify the three main encryption methods used in internetworking
1.2.5: Identify the importance of auditing
1.2.6: Select security equipment and software based on ease of use
1.2.7: Identify security factors related to transmission of unencrypted data across the network
1.2.9: Identify the significance of encryption in enterprise networks
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 3:
Applied Encryption
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 3 Objectives
• 1.2.2: Define symmetric (private-key) encryption
• 1.2.3: Define asymmetric (public-key) encryption, including distribution schemes, Public Key Infrastructure (PKI)
• 1.2.4: Define one-way (hash) encryption
• 1.2.8: Identify the function of parallel processing in relation to cryptography
• 1.2.10: Identify the impact of encryption protocols and procedures on system performance
• 1.2.11: Create a trust relationship using public-key cryptography
• 1.2.12: Identify specific forms of symmetric, asymmetric and hash encryption, including Advanced Encryption
Standard (AES)
• 1.4.1: Deploy Pretty Good Privacy (PGP) / Gnu Privacy
Guard (GPG) in Windows and Linux/UNIX systems
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Reasons to Use Encryption
• Make data confidential
• Help authenticate users
• Ensure data integrity
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Creating Trust
Relationships
• Manually
• Automatically
• Rounds and parallelization
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Symmetric-Key
Encryption
• One key is used to encrypt and decrypt messages
• Benefits and drawbacks of symmetric-key encryption
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Symmetric-Key Algorithms
• Data Encryption
Standard (DES)
• Triple DES
• Symmetric algorithms created by RSA Security
Corporation
• International Data
Encryption
Algorithm (IDEA)
• Blowfish
• Twofish
• Skipjack
• MARS
• Rijndael
• Serpent
• Advanced
Encryption
Standard (AES)
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Asymmetric-Key
Encryption
• Benefits and drawbacks of asymmetric-key encryption
• How do browsers use public-key encryption?
• Asymmetric-key encryption elements
– RSA
– DSA
– Diffie-Hellman
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
One-Way (Hash)
Encryption
• Signing data
• Hash algorithms
– MD2, MD4 and MD5
– Secure hash algorithm
– MD5sum utility (Linux)
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Applied
Encryption Processes
– PGP and GPG
– Secure MIME
– Proprietary asymmetric encryption
• Encrypting drives
– Secure Sockets Layer (SSL) and Secure
HTTP
– Transport Layer Security / Secure Sockets
Layer (TLS/SSL)
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Encryption Review
• Encryption
• Authentication
• Key
• Symmetric-key (private-key) encryption
• Asymmetric-key (public-key) encryption
• Message integrity by hash mark and signature
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 3 Summary
1.2.2: Define symmetric (private-key) encryption
1.2.3: Define asymmetric (public-key) encryption, including distribution schemes, Public Key
Infrastructure (PKI)
1.2.4: Define one-way (hash) encryption
1.2.8: Identify the function of parallel processing in relation to cryptography
1.2.10: Identify the impact of encryption protocols and procedures on system performance
1.2.11: Create a trust relationship using public-key cryptography
1.2.12: Identify specific forms of symmetric, asymmetric and hash encryption, including Advanced
Encryption Standard (AES)
1.4.1: Deploy Pretty Good Privacy (PGP) / Gnu Privacy
Guard (GPG) in Windows and Linux/UNIX systems
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 4:
Types of Attacks
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 4 Objectives
• 1.2.5: Identify the importance of auditing
• 1.4.3: Identify specific types of security attacks
• 1.4.4: Identify a brute-force attack
• 1.4.5: Identify a dictionary attack
• 1.4.6: Identify routing issues and security
• 1.4.7: Determine the causes and results of a denial-of-service (DOS) attack
• 1.4.8: Recognize attack incidents
• 1.4.9: Distinguish between illicit servers and trojans
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Network Attack Categories
• Brute force
• Dictionary
• System bugs
• Back doors
• Malware
• Social engineering
• Denial of service (DOS)
• Distributed denial of service (DDOS)
• Spoofing
• Scanning
• Man in the middle
• Bots and botnets
• SQL injection
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Brute-Force and
Dictionary Attacks
• Brute-force attack
– Repeated access attempts
• Dictionary attack
– Customized version of brute-force attack
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
System Bugs and Back Doors
• Bug
– Unintentional flaw in a program
• Back door
– Deliberately-placed opening in an operating system
• Buffer overflow
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Malware
(Malicious Software)
• Viruses
• Worms
• Trojans and root kits
• Illicit servers
• Logic bombs
• Zero-day attacks
• Managing viruses, worms and illicit programs
• Avoiding viruses, worms and trojans
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Social Engineering Attacks
• Call and ask for password
• Fake e-mail
• Phishing
• Pharming
• Securing desktops
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Denial-of-Service (DOS) Attacks
• Flooding
• Malformed packets
– Teardrop/Teardrop2
– Ping of Death
– Land attack
– Miscellaneous attacks
• Physical denial-of-service attacks
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Distributed Denial-of-Service (DDOS) Attacks
• Components:
– Controlling application
– Illicit service
– Zombie
– Target
• Smurf and Fraggle attacks
• Ways to diagnose DOS and DDOS attacks
• Mitigating vulnerability and risk
• Unintentional DOS
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Spoofing Attacks
• IP spoofing
• ARP spoofing
• DNS spoofing
• Spoofing and traceback
• Protecting against spoofing attacks
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Scanning Attacks
• Stack fingerprinting and operating system detection
• Sequence prediction
• Network Mapper (Nmap)
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Man-in-the-Middle Attacks
• Packet sniffing and network switches
• Connection hijacking
• Registration hijacking
• Voicemail compromises
• Impersonated calls
• DNS and ARP cache poisoning
• Avoiding man-in-the-middle attacks
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Bots and Botnets
• Bot
– Software application that runs automated, repetitive tasks over the Internet
• Botnet
– Group of computers infected with a bot
• Avoiding bot attacks
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
SQL Injection
• SQL injection
– Hacking technique in which malicious code is inserted into SQL command strings
• Preventing SQL injection attacks
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Auditing
• Checking password databases regularly
• Checking log files
• Scanning systems
• Identifying information leakage
– Necessary information
– Unnecessary information
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 4 Summary
1.2.5: Identify the importance of auditing
1.4.3: Identify specific types of security attacks
1.4.4: Identify a brute-force attack
1.4.5: Identify a dictionary attack
1.4.6: Identify routing issues and security
1.4.7: Determine the causes and results of a denial-of-service (DOS) attack
1.4.8: Recognize attack incidents
1.4.9: Distinguish between illicit servers and trojans
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 5:
Recent Networking
Vulnerability Considerations
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 5 Objectives
• 1.1.3: Identify potential risk factors for data security, including improper authentication
• 1.2.5: Identify the importance of auditing
• 1.4.3: Identify specific types of security attacks
• 1.4.8: Recognize attack incidents
Additional topics:
• Security issues associated with wireless network technologies
• Security issues associated with convergence networking technologies
• Security issues associated with Web 2.0 technologies
• Additional security issues, including greynet applications, data at rest, trusted users within an organization, anonymous downloads and indiscriminate link-clicking
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Wireless Network
Technologies and Security
• Wireless Ethernet elements
• Wireless signals
– FHSS
– DSSS
– OFDM
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
IEEE 802.11
Wireless Standards
• 802.11 (WiFi)
• 802.11a
• 802.11b
• 802.11e
• 802.11g
• 802.11h
• 802.11i
• 802.11n (most current)
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Wireless Networking Modes
• Ad-hoc mode
• Infrastructure mode
• Wireless access points (APs)
– Wireless cells
– Authentication types in wireless networks
– BSSID
– SSID
– Wireless AP beacon
• Host association
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Wireless
Application Protocol (WAP)
• WAP services:
– Uniform scripting standards for wireless devices
– A method of encrypting devices from
WAP-enabled phones
• Wireless Transport Layer Security (WTLS):
– WTLS benefits
– Problems with WTLS
• Languages used in WAP
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Wireless
Network Security Problems
• Cleartext transmission
• Access control
• Unauthorized APs and wireless systems
• Corporate users participating in ad hoc networks
• Weak and/or flawed encryption
• Encryption and network traffic
• War driving
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Wireless
Network Security Solutions
• WEP
• MAC address filtering
• WPA2 (802.11i)
• IEEE 802.1x
• RADIUS
• Physical and configuration solutions
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Site Surveys
• Authorized site surveys
– Site surveys after implementation
• Unauthorized site surveys
– War driving/war walking
– Examples of site surveying software
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Convergence
Networking and Security
• Convergence technologies and equipment:
– Private Branch Exchange (PBX)
– Voice over IP (VoIP) devices
– End-user telephone connections
• Virtual LANs (VLANs)
• VLAN hopping
• Firewall conflicts
• DNS loops
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Web 2.0 Technologies
• Ajax
• Wikis
• Blogs
• Really Simple Syndication (RSS)
• Podcasts
• Folksonomy
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Greynet Applications
• Instant messaging (IM)
• Peer-to-peer (P2P) applications
• File transfer and the 8.3 naming convention
• Securing IM and P2P
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Vulnerabilities with Data at Rest
• Data on network drives and in network shares
• Data on vulnerable systems
• Database data and SQL injection
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Security Threats from Trusted Users
• Security breaches due to:
– Carelessness
– Noncompliance with established security measures
– Following inadequate security policies
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Anonymous Downloads and Indiscriminate Link-Clicking
• Poisoned Web sites
• Drive-by downloads
• Guidelines to help avoid contact with poisoned Web sites
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 5 Summary
1.1.3: Identify potential risk factors for data security, including improper authentication
1.2.5: Identify the importance of auditing
1.4.3: Identify specific types of security attacks
1.4.8: Recognize attack incidents
Additional topics:
Security issues associated with wireless network technologies
Security issues associated with convergence networking technologies
Security issues associated with Web 2.0 technologies
Additional security issues, including greynet applications, data at rest, trusted users within an organization, anonymous downloads and indiscriminate link-clicking
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 6:
General Security Principles
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 6 Objectives
• 1.3.1: Identify the universal guidelines and principles of effective network security
• 1.3.2: Define amortization and chargeback issues related to network security architectures
• 1.3.3: Use universal guidelines to create effective specific solutions
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Common
Security Principles
• Be paranoid
• Have a security policy
• No system or technique stands alone
• Minimize damage
• Deploy companywide enforcement
• Provide training
• Integrate security strategies
• Place equipment according to needs
• Identify security business issues
• Consider physical security
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 6 Summary
1.3.1: Identify the universal guidelines and principles of effective network security
1.3.2: Define amortization and chargeback issues related to network security architectures
1.3.3: Use universal guidelines to create effective specific solutions
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 7:
Protocol Layers and Security
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 7 Objectives
• 1.3.4: Identify potential threats at different layers of the TCP/IP stack
• 1.3.7: Secure TCP/IP services, including
HTTP, FTP
• 1.4.6: Identify routing issues and security
• 1.4.7: Determine the causes and results of a denial-of-service (DOS) attack
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
TCP/IP Security Introduction
• TCP/IP protocol stack
• TCP/IP and network security
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
OSI Reference Model Review
• Application layer
• Presentation layer
• Session layer
• Transport layer
• Network layer
• Data link layer
• Physical layer
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Data Encapsulation
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
The TCP/IP Stack and the OSI Reference Model
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Link/Network Access Layer
• Media that defines this layer:
– Fiber
– Coaxial cable
– Twisted pair
– Free space (infrared, short-range wireless, microwave, satellite)
• Network topologies
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Network/Internet Layer
• Internet Protocol (IP)
– Packets are not signed
– Packets are not encrypted
– Packets can be manipulated easily
• Internet Control Message Protocol (ICMP)
– ICMP message types
– Why block ICMP?
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Transport Layer
• Transmission Control Protocol (TCP)
– The TCP handshake
– The TCP header
• Establishing a TCP connection:
– SYN and ACK
• Terminating a TCP connection:
– FIN and ACK
• User Datagram Protocol (UDP)
• Ports
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Application Layer
• File Transfer Protocol (FTP)
– Active FTP
– Passive FTP
• Hypertext Transfer Protocol (HTTP)
• Telnet
• Simple Network Management Protocol
(SNMP)
• Domain Name System (DNS)
• Additional application layer protocols
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Protocol Analyzers
• Monitor network traffic to identify network trends
• Identify network problems and send alert messages
• Identify specific problems
• Test network connections, devices and cables
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 7 Summary
1.3.4: Identify potential threats at different layers of the TCP/IP stack
1.3.7: Secure TCP/IP services, including
HTTP, FTP
1.4.6: Identify routing issues and security
1.4.7: Determine the causes and results of a denial-of-service (DOS) attack
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 8:
Securing Resources
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 8 Objectives
• 1.3.5: Consistently apply security principles
• 1.3.6: Identify ways to protect operating systems, routers and equipment against physical attacks
• 1.3.7: Secure TCP/IP services, including HTTP, FTP
• 1.3.8: Identify the significance of testing and evaluating systems and services
• 1.3.9: Identify network security management applications, including network scanners, operating system add-ons, log analysis tools
• 1.4.7: Determine the causes and results of a denial-ofservice (DOS) attack
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
TCP/IP
Security Vulnerabilities
• Internet Protocol version 4 (IPv4)
• Internet Protocol version 6 (IPv6)
• Determining which IP version to implement
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Implementing Security
• Publish the security policy
• Categorize resources and needs
• Secure each resource and service
• Log, test and evaluate
• Repeat the process and keep current
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Resources and Services
• Protecting services
– Protect against profiling
– Coordinate methods and techniques
– Protect services by changing default settings
– Remove unnecessary services
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Protecting TCP/IP Services
• Specialized accounts
• The Web Server
• CGI scripts
– CGI and programming
• Securing Apache2
• FTP servers
– Access control
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Simple Mail
Transfer Protocol (SMTP)
• The Internet Worm
• Buffer overflows
• The Melissa virus
• Access control for e-mail
• E-mail and virus scanning
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Physical Security
• Protecting the network against common physical attacks
• Ensuring access control
• Securing wireless cells
• Shielding network equipment
• Securing removable media
• Controlling the environment
• Fire detection and suppression
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Testing Systems
• Testing existing systems
• Implementing a new system or testing a new security setting
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Security
Testing Software
• Specific tools
– Network scanners
– Operating system add-ons
– Logging and log analysis tools
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Security and Repetition
• Understanding the latest exploits
• Continually improve and test your security system
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 8 Summary
1.3.5: Consistently apply security principles
1.3.6: Identify ways to protect operating systems, routers and equipment against physical attacks
1.3.7: Secure TCP/IP services, including HTTP, FTP
1.3.8: Identify the significance of testing and evaluating systems and services
1.3.9: Identify network security management applications, including network scanners, operating system add-ons, log analysis tools
1.4.7: Determine the causes and results of a denial-ofservice (DOS) attack
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 9:
Firewalls and
Virtual Private Networks
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 9 Objectives
• 1.1.3: Identify potential risk factors for data security, including improper authentication
• 1.2.3: Define asymmetric (public-key) encryption, including distribution schemes, Public Key
Infrastructure (PKI)
• 1.4.2: Define IPSec concepts
• 1.4.6: Identify routing issues and security
• 1.5.1: Define the purpose and function of various firewall types
• 1.5.2: Define the role a firewall plays in a company's security policy
• 1.5.3: Define common firewall terms
• 1.5.4: Identify packet filters and their features
• 1.5.5: Identify circuit-level gateways and their features
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 9 Objectives
(cont’d)
• 1.5.6: Identify application-level gateways and their features
• 1.5.7: Identify features of a packet-filtering firewall, including rules, stateful multi-layer inspection
• 1.5.8: Identify fundamental features of a proxy-based firewall (e.g., service redirection, service passing, gateway daemons), and implement proxy-level firewall security
• 1.5.9: Define the importance of proxy caching related to performance
• 1.6.1: Implement a packet-filtering firewall
• 1.6.2: Customize your network to manage hacker activity
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Definition and
Description of a Firewall
• Firewall
• Demilitarized zone (DMZ)
• Daemon
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
The Role of a Firewall
• Implement a company’s security policy
• Create a choke point
• Log Internet activity
• Limit network host exposure
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Firewall Terminology
• Packet filter
• Proxy server
– Application-layer proxy
– Circuit-level proxy
• Network Address Translation (NAT)
• Bastion host
• Operating system hardening
• Screening and choke routers
• Demilitarized zone (DMZ)
• Web security gateway
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Firewall Configuration Defaults
• By default, a firewall can be configured to either:
– Deny all traffic, in which case you would specify certain types of traffic to allow in and out of your network
– Allow all traffic, in which case you would specify certain types of traffic to deny
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Creating
Packet Filter Rules
• Process
• Rules and fields
• Standard FTP clients and creating packet filter rules
• Passive FTP clients and packet filter rules
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Packet Filter
Advantages and Disadvantages
• Drawbacks
• Stateful multi-layer inspection
– Popular packet-filtering products
• Using the ipchains and iptables commands in
Linux
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Configuring
Proxy Servers
• Recommending a proxy-oriented firewall
• Proxy server advantages and features
– Authentication
– Logging and alarming
– Caching
– Fewer rules
– Reverse proxies and proxy arrays
• Proxy server drawbacks
– Client configuration
– Speed
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
URL Filtering
• Techniques to filter outbound URLs
• Techniques to filter inbound URLs
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Remote Access and
Virtual Private Networks (VPNs)
• Three types of VPNs:
– Workstation-to-server
– Firewall-to-firewall
– Workstation-to-workstation
• Tunneling protocols
• Internet Protocol Security (IPsec)
• Point-to-Point Tunneling Protocol (PPTP)
• Layer 2 Tunneling Protocol (L2TP)
• VPN vulnerabilities
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Public Key
Infrastructure (PKI)
• PKI standards
– Based on X.509 standard
• PKI terminology
• Certificates
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 9 Summary
1.1.3: Identify potential risk factors for data security, including improper authentication
1.2.3: Define asymmetric (public-key) encryption, including distribution schemes, Public Key
Infrastructure (PKI)
1.4.2: Define IPSec concepts
1.4.6: Identify routing issues and security
1.5.1: Define the purpose and function of various firewall types
1.5.2: Define the role a firewall plays in a company's security policy
1.5.3: Define common firewall terms
1.5.4: Identify packet filters and their features
1.5.5: Identify circuit-level gateways and their features
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 9 Summary
(cont’d)
1.5.6: Identify application-level gateways and their features
1.5.7: Identify features of a packet-filtering firewall, including rules, stateful multi-layer inspection
1.5.8: Identify fundamental features of a proxy-based firewall (e.g.; service redirection, service passing, gateway daemons), and implement proxy-level firewall security
1.5.9: Define the importance of proxy caching related to performance
1.6.1: Implement a packet-filtering firewall
1.6.2: Customize your network to manage hacker activity
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 10:
Levels of
Firewall Protection
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 10 Objectives
• 1.4.6: Identify routing issues and security
• 1.5.1: Define the purpose and function of various firewall types
• 1.5.3: Define common firewall terms
• 1.6.1: Implement a packet-filtering firewall
• 1.6.2: Customize your network to manage hacker activity
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Designing a Firewall
• Firewall design principles
– Keep design simple
– Make contingency plans
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Types of Bastion Hosts
• Single-homed bastion host
• Dual-homed bastion host
• Triple-homed bastion host
• Internal bastion hosts
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Hardware Issues
• Choosing the operating system
• Firewall appliances
• Services
• Daemons
• Proxy servers
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Common
Firewall Designs
• Screening routers
• Screened host firewall (single-homed bastion)
• Screened host firewall (dual-homed bastion)
• Screened subnet firewall (demilitarized zone)
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 10 Summary
1.4.6: Identify routing issues and security
1.5.1: Define the purpose and function of various firewall types
1.5.3: Define common firewall terms
1.6.1: Implement a packet-filtering firewall
1.6.2: Customize your network to manage hacker activity
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 11:
Detecting and
Distracting Hackers
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 11 Objectives
• 1.6.2: Customize your network to manage hacker activity
• 1.6.3: Implement proactive detection
• 1.6.4: Distract hackers and contain their activity
• 1.6.5: Deploy tripwires and other traps on a network host
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Proactive
Detection
• Automated security scans
• Login scripts
• Automated auditing
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Distracting the Hacker
• Dummy accounts
• Dummy files
– Dummy password files
• Tripwire scripts
• Automated checksums
• Jails
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Deterring the Hacker
• Methods for deterring hackers
– Log traffic and send e-mail messages
– Conduct reverse scans
– Drop the connection
– Contact the ISP
• Tools for responding to hackers
• Problems with retaliation
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 11 Summary
1.6.2: Customize your network to manage hacker activity
1.6.3: Implement proactive detection
1.6.4: Distract hackers and contain their activity
1.6.5: Deploy tripwires and other traps on a network host
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 12:
Incident Response
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 12 Objectives
• 1.6.6: Respond appropriately to a security breach
• 1.6.7: Identify security organizations that can help in case of system attack
• 1.6.8: Subscribe to respected security alerting organizations
• 1.6.9: Identify appropriate authorities to contact regarding data theft and other attacks
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Creating an
Incident Response Policy
• Decide ahead of time
• Do not panic
• Document everything
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Determining if an Attack Has Occurred
• Determine the scope of the breach
• Stop or contain activity
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Executing the Response Plan
• Notifying affected individuals
• Notifying appropriate authorities
• Notifying Internet agencies
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Analyzing and Learning
• Ask questions of everyone involved
• Record specific lessons you have learned
• Update your security policy
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Lesson 12 Summary
1.6.6: Respond appropriately to a security breach
1.6.7: Identify security organizations that can help in case of system attack
1.6.8: Subscribe to respected security alerting organizations
1.6.9: Identify appropriate authorities to contact regarding data theft and other attacks
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved
Web Security Associate
What Is Security?
Elements of Security
Applied Encryption
Types of Attacks
Recent Networking Vulnerability Considerations
General Security Principles
Protocol Layers and Security
Securing Resources
Firewalls and Virtual Private Networks
Levels of Firewall Protection
Detecting and Distracting Hackers
Incident Response
Web Security Associate
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved