Module01
Network Security Fundamentals
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Module Objectives
1 UnderstandingtheGoalsofNetworkDefense
2 UnderstandingInformationAssurance(IA)Principles
3 UnderstandingtheBenefits andChallenges ofNetworkDefense
4 OverviewofDifferentTypesofNetworkDefenseApproaches
5 UnderstandingtheDifferentTypesofNetworkSecurityControls
6 UnderstandingtheDifferentNetworkSecurityProtocols
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Module Flow
Understand Fundamentals
01 of Network Security
Discuss Essential Network
02 Security Protocols
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Essentials of
Network Security
Acompletelysecureandrobustnetworkcan
bedesignedwithproperimplementation and
configuration ofnetworksecurityelements
Elements of Network Security
NetworkSecurity NetworkSecurity NetworkSecurity
Controls Protocols Devices
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Goal of Network Defense
Theultimategoalofnetworkdefenseistoprotectan
organization’sinformation,systems,andnetworkinfrastructure
fromunauthorizedaccess,misuse,modification,servicedenial,
oranydegradation anddisruptions
Organizationsrelyoninformationassurance(IA)principles to
attaindefenseͲinͲdepthsecurity
InformationAssurance(IA)principlesactasenablers foran
organization’ssecurityactivitiestoprotectanddefendthe
organizationalnetworkfromsecurityattacks
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Information Assurance (IA) Principles
Confidentiality Availability
Ensuresinformationisnot Ensuresinformationisavailable
disclosed tounauthorized toauthorizedpartieswithout
parties anydisruption
Cannotlistentoor
Servicesunavailable
viewtheinformation
toauthorizedusers
AuthorizedUser AuthorizedUser
Server Server
ManintheMiddle
Integrity
Cannotmodifytheinformation
Ensuresinformationisnot
modified ortampered with AuthorizedUser
Server
byunauthorizedparties
ManintheMiddle
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Information Assurance (IA) Principles (Cont’d)
Non-repudiation Authentication
Ensuresthatapartyinacommunication Ensurestheidentity ofanindividualisverified
cannotdenysending themessage bythesystemorservice
Transferamount500toUser
Userdeniestransaction
User Server AuthorizedUser Server
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Network Defense Benefits
Protect informationassets
Comply withgovernmentandindustryspecific
regulations
Ensure securecommunicationwithclientsandsuppliers
Reduce theriskofbeingattacked
Gain competitive edgeovercompetitor
byprovidingmoresecureservices
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Network Defense Challenges
Distributed Computing Lack of Network
Emerging Threats
Environments Security Skills
Withtheadvancementin Potential threats to the Organizationsarefailing
moderntechnologyandto network evolveeachday. todefendthemselves
meetbusinessrequirements, Networksecurityattacks againstrapidlyincreasing
networksarebecomingvast arebecomingtechnically networkattacksdueto
andcomplex,potentially moresophisticated and thelackofnetwork
leadingtoserioussecurity betterorganized securityskills
vulnerabilities.Attackers
exploitexposedsecurity
vulnerabilitiesto
compromisenetwork
security
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Types of Network Defense Approaches
Preventive Approaches Retrospective Approaches
Consistofmethodsor Consistofmethodsortechniques
techniquesthatareusedto thatexaminethecausesfor
avoidthreatsorattackson attacks,andcontain,remediate,
thetargetnetwork eradicate,andrecoverfrom
damagecausedbytheattackon
thetargetnetwork
Reactive Approaches Proactive Approaches
Consistofmethodsor Consistofmethodsortechniques
techniquesthatareusedto thatareusedtomakeinformed
detectattacksonthetarget decisionsonpotentialattacksin
network thefutureon thetargetnetwork
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Network Security Controls:
Administrative Security Controls
Themanagementimplementsadministrativeaccesscontrolstoensure thesafety oftheorganization
Examples of Administrative Security Controls
01 RegulatoryframeworkCompliance 02 Securitypolicy
03 EmployeeMonitoringandSupervising 04 InformationClassification
05 SecurityAwarenessandTraining
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Network Security Controls: Physical Security Controls
Thisisasetofsecuritymeasurestakentopreventunauthorizedaccesstophysicaldevices
Examples of Physical Access Controls
Locks Fences Badge system Security guards Mantrap doors
Biometric system Lighting Motion detectors Closed-circuit TVs Alarms
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Network Security Controls: Technical Security Controls
Thisisasetofsecuritymeasurestakentoprotectdataandsystemsfromunauthorizedpersonnel
Examples of Technical Security Controls
01 03 05
Authorization Auditing Security
Access Network
Controls Protocols Security
Authentication
04 Devices
02 06
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Module Flow
Understand Fundamentals
01 of Network Security
Discuss Essential Network
02 Security Protocols
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Network Security Protocols
RADIUS Secure HTTP
TACACS+ HTTPS
Kerberos TLS
PGP SSL
S/MIME IPsec
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Remote Authentication Dial-in User Service (RADIUS)
RemoteauthenticationdialͲinuserservice(RADIUS)isanauthenticationprotocolwhichprovidescentralizedauthentication,
authorization,andaccounting(AAA)forremoteaccessserverstocommunicatewithacentralserver
Authentication Steps in RADIUS
1) AclientinitiatesaconnectionbysendingtheaccessͲrequest packet totheserver
2) Theserverreceivestheaccessrequestfromtheclientandcomparesthecredentialswiththeonesstoredinthedatabase.
Iftheprovidedinformationmatches,thenitsendstheaccessͲacceptmessagealongwiththeaccessͲchallenge totheclient
foradditionalauthentication,elseitsendsbackanacceptͲreject message
3) ClientsendstheaccountingͲrequest totheservertospecifytheaccountinginformationforaconnectionthatwasaccepted
PacketTypeͲAccessRequest(Username,Password)
AccessͲAccept/AccessͲReject(UserService,FramedProtocol)
AccessChallenge(optional)(ReplyMessage)
AccessServer RADIUSServer
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Remote Authentication Dial-in User Service
(RADIUS) (Cont’d)
Radius Accounting Steps RADIUS RADIUS
Client Server
Clientsendsthe accountingͲrequest to RADIUS:AccountingͲ Request
[acct_status_type=start]
theservertospecifytheaccounting
informationforaconnectionthatwas
RADIUS:AccountingͲResponse
accepted
RADIUS:AccountingͲ Request
[acct_status_type=interimupdate]
RADIUS:AccountingͲResponse
Theserverreceivesthismessageand RADIUS:AccountingͲ Request
[acct_status_type=stop]
sendsbacktheaccountingͲresponse
messagewhichstatesthesuccessful
RADIUS:AccountingͲResponse
establishmentofthenetwork
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Terminal Access Controller Access Control System
Plus (TACACS+)
Theterminalaccesscontrolleraccess
TACACS+
controlsystemplus(TACACS+)isa SecurityServer
networksecurityprotocolusedfor RemoteUser
PublicSwitched
Telephone
AAAofnetworkdevicessuchas Network(PSTN)/
TACACS+
Integrated
switches,routers,andfirewallsthrough ServicesDigital Client
Network(ISDN)
oneormorecentralizedservers Router CorporateNetwork
TACACS+encrypts theentire
communicationbetweentheclientand RemoteUser AAAClient TACACS+Server
theserverincludingtheuser’s
passwordwhichprotectsitfrom
sniffingattacks
2.REQUEST issenttoAAAserver
Itis aclientͲservermodel approach 1. TheAAAclientreceivesaresource forserviceshell
requestfromauser.Thisisassumingthat
wheretheclient(userornetwork theauthenticationhasalreadytaken
place
device)requestsforconnectiontoa 3.RESPONSE isreturnedtotheAAA
server,theserverauthenticatesthe 4.AAAclientmaygrantordenyaccessto
clientindicatingapassorfail
userbyexaminingtheir credentials theserviceshell
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Kerberos
Client KDC(Kerberos)
Kerberosisanauthenticating method foraccessing anetwork Key
Distribution Ticket
Center(KDC) Ticketrequest generated
request and
Kerberos authentication protocol (KAP) encrypted
usingaserver
secretkey
01 Ausersendshis/hercredentialstoanauthenticationserver(AS)
TheAShashesthepasswordoftheuserandverifiestheircredentialsintheactive
directorydatabase.Ifthecredentialmatches,thenAS(consistingoftheticket
02 grantingservice,TGS)sendsbacktheTGSsessionkeyandticketgrantingticket
Decryptthe
ticket
Ticketresponse
response
(TGT)totheusertocreateasession andforward
the
Onceusersareauthenticated,theysendtheTGTtorequestaservicetickettothe
03
tickettothe
server Server
serverorTGSforaccessingtheservices
Ticket
TheTGSauthenticatestheTGTandgrantsaservicetickettotheuser.Theservice Decryptthe
04 ticketconsistsoftheticketandasessionkey
ticketand
confirmthe
identityof
theclient
Theclientsendstheservicetickettotheserver.Theserverusesitskeytodecrypt
05 theinformationfromtheTGSandtheclientisauthenticatedtotheserver
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Pretty Good Privacy (PGP)
Prettygoodprivacy(PGP)isanapplicationlayerprotocolwhichprovidescryptographic
privacyandauthenticationfornetworkcommunication
Itencryptsanddecryptsemailcommunicationaswellasauthenticatesmessages
with digitalsignatures andencryptsstoredfiles
FileEncryption FileDecryption
RandomKey
User’sPrivateKey
File Encryption EncryptedFile
Decryption
EncryptedFile EncryptedKey
User’sPublicKey withtheUser’s
EncryptedFile PublicKeyinthe
withtheUser’s Header
PublicKeyinthe
Header
Encryption EncryptedFile Decryption File
EncryptedKey
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Secure/Multipurpose Internet Mail
Extensions (S/MIME)
Secure/multipurposeinternetmailextensions(S/MIME)
01 isanapplicationlayerprotocolwhichisusedforsending
digitallysignedandencryptedemailmessages
02 ItusestheRSA systemforemailencryption
03 Networkdefendersneedtoenable S/MIMEͲbased
securityformailboxesintheirorganizations
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Secure/Multipurpose Internet Mail Extensions
(S/MIME) (Cont’d)
Alice Public Bob
Message
Certificate PublicKey
OK? Alice
PrivateKey Alice
Alice
Digital Signature
Signing
Signature Checking
Encrypted
Encryption(DES) Decryption(DES)
Message
Message
SecretKey SecretKey
Encryption(RSA) Decryption(RSA)
Certificate
PublicKey OK? PrivateKey
Bob
Bob Bob
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Differences between
PGP and S/MIME
MandatoryFeatures S/MIMEv3 OpenPGP
MessageFormat Binary, BasedonCMS Application/Pkcs 7Ͳmime
Binary, Basedonprevious
CertificateFormat Binary, BasedonX.509v3
PGP
Symmetric Encryption TripleDES(DES,EDE3,and
TripleDES(DES,EDE3,andCBC)
Algorithm EccentricCFB)
DiffieͲHellman(X9.42)withDSS
SignatureAlgorithm ElGamalwithDSS
orRSA
HashAlgorithm SHAͲ 1 SHAͲ 1
MIMEEncapsulationof ChoiceofMultipart/signedor
Multipart/signedASCIIarmor
SignedData CMSFormat
MIMEEncapsulationof
Application/Pkcs 7Ͳmime Multipart/Encrypted
EncryptedData
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Secure Hypertext Transfer
Protocol (S-HTTP)
Securehypertexttransferprotocol(SͲHTTP)isanapplicationlayer
protocolthatisusedtoencryptwebcommunicationscarriedover
HTTP
ItisanalternativefortheHTTPS (SSL)protocol
Itensuressecuredatatransmissionofindividualmessages,while
SSLestablishesasecureconnectionbetweentwoentitiesthus
ensuringsecurityoftheentirecommunication
ClientMachine ServerMachine
WWWClient HTTP WWWServer
S-HTTP
CryptoSmart CryptoSmart
Application- Level
Security Encryptedand/or Encryptedand/or
SignedMessages SignedMessages
UnencryptedChannel
NetworkLayer NetworkLayer
Note:NotallWebbrowsers andservers supportSͲHTTP
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Hypertext Transfer Protocol Secure (HTTPS)
Hypertexttransferprotocolsecure(HTTPS)ensuressecure communication
betweentwocomputersoverHTTP
Theconnectionisencrypted usingatransportlayersecurity(TLS)orSSL
protocol
Itisoftenusedinconfidentialonlinetransactions
ItprotectsagainstmanͲinͲtheͲmiddleattackssincethedataaretransmitted
overanencryptedchannel
HTTPS
A B
“Mypass” “Xz54p6kd” “Mypass”
Encryption Decryption
SendsthePassword ReceivethePassword
Unauthorized Gets“Xz54p6kd”
Access
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Transport Layer Security (TLS)
Transportlayersecurity(TLS)ensuresasecurecommunicationbetweenclientͲserver
applicationsovertheinternet
Itprevents thenetworkcommunicationfrombeingeavesdroppedortampered
Application Application
Layers of TLS Protocol
TLSRecordProtocol TLS TLS
Handshake Handshake
Itensuresconnectionsecurity Protocol Protocol
withencryption
TLSRecordProtocol TLSRecordProtocol
TLSHandshakeProtocol
TCP/IP TCP/IP
Itensuresserverandclient
authentication NetworkHardware NetworkHardware
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Secure Sockets Layer (SSL)
Securesocketslayer(SSL)wasdevelopedbyNetscapeformanagingthesecurityofamessagetransmissionon
theinternet
ItusestheRSAasymmetric(publickey)encryption toencryptdatatransferredoverSSLconnections
ClientHello message(includesSSLversion,randomlygenerateddata,encryptionalgorithms,
sessionID,keyexchangealgorithms,compressionalgorithms,andMACalgorithms)
DeterminestheSSLversionandencryptionalgorithmstobeusedforthecommunication;sends
ServerHellomessage(SessionID)andCertificatemessage(localcertificate)
SendsaServerHello Donemessage
VerifiestheDigitalcertificate;generatesarandompremastersecret(Encryptedwith
server'spublickey)andsendsClientKeyExchange messagewiththepremastersecret
SendsaChangeCipherSpec messageandalsosendsFinished message(hashofhandshakemessage)
Hashvalueiscalculatedfortheexchangedhandshakemessagesandthencomparedtothehashvalue
receivedfromtheclient;Ifthetwomatch,thekeyandciphersuitenegotiationsucceeds.SendsaChange
CipherSpec messageandalsosendsFinished message(hashofhandshakemessage)
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Internet Protocol Security (IPsec)
Internetprotocolsecurity(IPsec)isanetworklayer Itencrypts andauthenticates eachIPpacketinthe
protocolthatensuresa secureIPlevel communication
communication
Itsupports networkͲlevelpeerauthentication,data
ItprovidesendͲtoͲendsecurityattheinternet originauthentication,dataintegrity,data
layer ofthe internetprotocolsuite confidentiality(encryption),andreplayprotection
LAN– InternalIP LAN– InternalIP
Internet
Firewall Firewall
IPsecTunnel
ExternalIP ExternalIP
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.
Module Summary
Thismodulehasdiscussedtheessentialsofnetworksecurity,goal
ofnetworkdefense,andtheinformationassurance(IA)principles
Ithasdiscussedbenefitsandchallengesofnetworkdefense
Italsodiscusseddifferenttypesofnetworkdefenseapproaches
andtypesofnetworksecuritycontrols
Security
Finally,thismoduleendedwithadetaileddiscussionofvarious
networksecurityprotocols
Inthenextmodule,wewilldiscussindetailonidentification,
authentication,andauthorizationconcepts
Copyright©byEC-Council. AllRightsReserved.ReproductionisStrictlyProhibited.