Network Security Intro
Network Security Intro
Security
2
Introduction
3
The Basics of a Network
4
Basic Network Structure
5
Data Packets
6
IP Addresses
= network prefix + host identifier
IPv4 is a series of four three-digit numbers
separated by periods: 107.22.98.129 (the dot-
decimal notation)
Each three-digit is between 0 and 255 (a byte/octet)
7
Bitwise
representation
of Classful IP
addressing
source:
https://en.wikipedia.org/wi
ki/Classful_network
8
IP Addresses
= network prefix + host identifier
Classless Inter-Domain Routing (CIDR)
The suffix indicate the number of bits of the
network prefix
e.g., 192.0.1.2/24
9
IP Addresses
10
IP Addresses
IPv6 uses a 128-bit address and hex
numbering.
IPv6 addresses are represented as eight groups of
four hexadecimal digits (with the groups being
separated by colons)
Example: 2001:0db8:0000:0042:0000:8a2e:0370:7334
An IPv6 address may have more than one representation.
Initial address: 2001:0db8:0000:0000:0000:ff00:0042:8329
After removing all leading zeroes in each group:
2001:db8:0:0:0:ff00:42:8329
After using :: to replace consecutive sections of zeroes:
2001:db8::ff00:42:8329
11
Uniform Resource Locators
URLs are text-based web
addresses, such as
www.chuckeasttom.com,
that translate into Internet
IP addresses
Translation is performed
by Domain Name
System/Service (DNS)
servers
Source:
https://www.pcmag.com/encyclopedia/term
/41620/dns
12
MAC Addresses
13
Protocols
14
Basic Network Utilities
Ipconfig
gives you information about the computer’s network
connection, addresses, …
Ping
Used to send a test packet to a target machine to find
out whether that machine is reachable and how long it
takes …
Tracert
Trace route (= ping + intermediate hops)
Netstat
Net Status
15
The Open Systems Interconnect
(OSI) Model
16
Source: http://www.ques10.com/p/18473/what-is-osi-model-give-functions-and-services-of-e/ 17
What Does This Mean for Security?
The people
18
Assessing Likely Threats to the
Network
Extreme, ill-informed attitudes about security
threats can lead to poor decisions.
19
Assessing Likely Threats to the
Network
No real threat:
Fosters a laissez-faire attitude toward security
Promotes a reactive approach to security
Security measures are not put in place until after a
breach has occurred.
This approach must be avoided at all costs.
20
Assessing Likely Threats to the
Network
Is the world full of hackers out to get me?
Yes, they exist, but not to the extent publicized
Lesser skilled hackers are more pervasive
They target smaller companies
Usually experts seek high profile networks
Financial and ideological gain are the targets
21
Assessing Likely Threats to the
Network
The only practical approach is the realistic
one.
This approach is a moderate solution to the
two extremes.
Assessment is a complex task.
Many factors need to be addressed.
22
Classifying Threats by Function
Intrusion Malware
Cracking Viruses
Social engineering Worms
War-dialing Trojan horses
War-driving Bots
Blocking Ransomware
Denial of Service (DoS) Spyware
Cookies
Distributed Denial of
Key loggers
Service (DDoS)
23
Likely Attacks
Risk Management
24
Threat Assessment Factors
25
Threat Assessment
- Vulnerability score
A numerical scale can be assigned to each
factor
Attractiveness (A): 1–10
Information content (I): 1–10
Security devices present (S): 1–10
The equation is: V = (A + I) – S
Where V equals Vulnerability score
Lower score indicates lower risk (-18 .. 19)
26
Understanding Security Terminology
Hacking terminology Security terminology
Firewall
Proxy server
White hat hackers
Intrusion-detection system
Black hat hackers
Non-repudiation
Gray hat hackers
Confidentiality
Script kiddy
Authentication
Cracker Data integrity vs origin
Ethical hacker (or pen integrity
tester) Auditing
Phreaking Access control
…
27
Helpful Websites for Security Terminology
www.yourwindow.to/information%2Dsecurity/
www.ietf.org/rfc/rfc2828.txt
28
Approaching Network Security
Reactive/
passive Proactive/
dynamic
Perimeter-based
30
Network Security and the Law
Sarbanes-Oxley (SOX)
Computer Security Act of 1987
Health Insurance Portability and
Accountability Act (HIPAA)
31
Using Security Resources
CERT (www.cert.org/)
Microsoft Security TechCenter
(https://technet.microsoft.com/en-us/security)
F-Secure Corporation (www.f-secure.com/)
SANS Institute (www.sans.org/)
32
Summary
Most common dangers to networks are viruses,
worms, Trojan horses, and ransomware.
33
Summary
Legal issues:
SOX
HIPAA
State-specific legislation regarding computer crimes
Business-specific legislations
34