Lecture 2
Lecture 2
↪Active Devices
• These security devices block the excess traffic. Firewalls,
antivirus scanning devices, and content filtering devices are
the examples of such devices.
↪Passive Devices
• These devices identify and report on unwanted traffic, for
example, intrusion detection machines.
TYPES OF NETWORK SECURITY DEVICES
↪Preventative Devices
• These devices scan the networks and identify potential
security problems. For example, penetration testing
devices and vulnerability assessment machines.
↪Unified Threat Management (UTM)
• These devices serve as all-in-one security devices.
Examples include firewalls, content filtering, web
caching, etc.
TYPES OF NETWORK SECURITY DEVICES
↪Firewalls
A firewall is a network security system that manages and regulates the
network traffic based on some protocols. A firewall establishes a barrier
between a trusted internal network and the internet.
Firewalls exist both as software that run on a hardware and as hardware
appliances. Firewalls that are hardware-based also provide other functions
like acting as a DHCP server for that network.
Firewalls are commonly used in private networks or intranets to prevent
unauthorized access from the internet. Every message entering or leaving
the intranet goes through the firewall to be examined for security measures.
Hardware and Software Firewalls
Hardware firewalls are standalone products. These are
also found in broadband routers. Most hardware firewalls
provide a minimum of four network ports to connect other
computers for larger networks − e.g. for business purpose
− business networking firewall solutions are available.
Software firewalls are installed on your computers. A
software firewall protects your computer from internet
threats.
Antivirus
• An antivirus is a tool that is used to detect and remove
malicious software. It was originally designed to detect
and remove viruses from computers.
• Modern antivirus software provide protection not only
from virus, but also from worms, Trojan-horses,
adware’s, spywares, keyloggers, etc. Some products also
provide protection from malicious URLs, spam, phishing
attacks, botnets, DDoS attacks, etc.
Content Filtering
Content filtering devices screen unpleasant and offensive emails or
webpages. These are used as a part of firewalls in corporations as
well as in personal computers. These devices generate the message
"Access Denied" when someone tries to access any unauthorized web
page or email.
Content filtering can be divided into the following categories
Web filtering
Screening of Web sites or pages
E-mail filtering
Screening of e-mail for spam
Other objectionable content
Intrusion Detection Systems
Intrusion Detection Systems, also known as Intrusion Detection and
Prevention Systems, are the appliances that monitor malicious activities in a
network, log information about such activities, take steps to stop them, and
finally report them.
Intrusion detection systems help in sending an alarm against any malicious
activity in the network, drop the packets, and reset the connection to save
the IP address from any blockage. Intrusion detection systems can also
perform the following actions −
• Correct Cyclic Redundancy Check (CRC) errors
• Prevent TCP sequencing issues
• Clean up unwanted transport and network layer options
Secure Data Transmission
There are a number of methods that use
encryption to ensure that data transmission on a
network is Secure.
• Internet Protocol Security (IPSec)
This protocol defines encryption, authentication
and key management for TCP/IP transmissions. It
secures data in transmission by various means at
the IP packets level
Internet Protocol Security (IPSec)
• The key components of IPSec are:
Authentication Header (AH) This component authenticates
and validates data packets. Each packet basically contains a
digital signature
Encapsulation Security Payload (ESP) This component encrypts
the data payload of the packet.
Internet Key Exchange (IKE) The above components AH and
ESP use asymmetric encryption. IKE manages the
public/private key exchanges for encryption and decryption.
Point-to-Point Tunnelling Protocol (PPTP)
The original Point-to-Point Protocol (PPP) is an encapsulation protocol for
transporting IP traffic over point-to-point connections.
The Point-to-point Tunnelling Protocol (PPTP) is an expansion of the
existing Point-to-Point Protocol (PPP). PPTP uses the same principle of
encapsulating other protocol packets so that they can be transported via a
switched network (the Internet) to a specific destination. The destination
receives the PPTP packet and extracts the encapsulated data. PPTP also
supports encryption and authentication.
This protocol is a proprietary Microsoft development and is widely used in
conjunction with VPN
Layer 2 Tunnelling Protocol (L2TP)
URLs prefixed with 'HTTPS' initiate an SSL session between the web
browser and web server. Most online banking facilities will direct
you to a secure site with 'HTTPS' at the beginning of the address.
Secure Shell (SSH)
• This provides a secure means of establishing
remote connections to a host. It provides
authentication via the exchange of digital certificates
and uses public key encryption. It is mainly used in
Unix/Linux environment and is a means of using
insecure protocols (telnet, ftp, etc) in a secure
fashion.
Pretty Good Privacy (PGP)
•This is one of the most popular encryption
programs. This is a public key encryption system
that provides authentication and encryption. It is
commonly used for email transmissions and
supports a wide range of operating systems. Both
commercial and open source versions are available.