Network & Information Security Training
Network & Information Security Training
Sunit Mahajan
Basics of Networks
Introduction to Network Security
Security Threats Risks & Attacks
Securing Networks & Data
OSI Model
All
People
Seem
To
Need
Data
Processing
Physical (1)
Complicated Way
OSI Model
Porgi
Dili
Nahi
Tar
Saral
Palaun
Aana
Physical (1)
Transport (4)
Session (5)
Presentation Layer (6)
Application Layer (7)
Simple Way
OSI Model
OSI Layer
Layer Description
Data
Data
Data
Transport (4)
Segment
Network (3)
Packet
Frame
Physical (1)
Bits
Session (5)
The TCP 3-way handshake is how TCP sets up a TCP/IP connection over an IP-based network. As the
name implies, to establish a TCP connection, there are three actions to establish the connection:
1. The client who would like to establish a connection with the remote server sends a SYN or
synchronization packet.
Introduction to Security
Network is medium on which information travels.
Financial Loses
Reputational Damage
Data Loss
Customer Dissatisfaction
Employee Dissatisfaction
CIA TRIAD
How do we achieve
Network security controls cannot completely eliminate risks but
can only minimize risk as much as possible.
People: Awareness
Process: How to detect breaches, asset audits
Tools: Various security software's
People
Process
Tools
Security
Security Risk
Malware
Virus
Rouge Security Software
Trojan Horse
Worm
Phishing
Spam
Botnets
Open Firewall ports
Missing Security patches
Privilege escalation
Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an
operating system or software application to gain elevated access to resources that are normally
protected from an application or user.
Types of Attacks
Passive Attack
A passive attack monitors unencrypted traffic and looks for clear-text passwords and sensitive information that can be used in other
types of attacks. Passive attacks include traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and
capturing authentication information such as passwords. Passive interception of network operations enables adversaries to see upcoming
actions. Passive attacks result in the disclosure of information or data files to an attacker without the consent or knowledge of the user.
Active Attack
In an active attack, the attacker tries to bypass or break into secured systems. This can be done through stealth, viruses, worms, or
Trojan horses. Active attacks include attempts to circumvent or break protection features, to introduce malicious code, and to steal or modify
information. These attacks are mounted against a network backbone, exploit information in transit, electronically penetrate an enclave, or
attack an authorized remote user during an attempt to connect to an enclave. Active attacks result in the disclosure or dissemination of data
files, DoS, or modification of data.
Distributed Attack
A distributed attack requires that the adversary introduce code, such as a Trojan horse or back-door program, to a trusted
component or software that will later be distributed to many other companies and users Distribution attacks focus on the malicious
modification of hardware or software at the factory or during distribution. These attacks introduce malicious code such as a back door to a
product to gain unauthorized access to information or to a system function at a later date.
Insider Attack
An insider attack involves someone from the inside, such as a disgruntled employee, attacking the network Insider attacks can be
malicious or no malicious. Malicious insiders intentionally eavesdrop, steal, or damage information; use information in a fraudulent manner; or
deny access to other authorized users. No malicious attacks typically result from carelessness, lack of knowledge, or intentional circumvention
of security for such reasons as performing a task
Types of Attacks
Close-in Attack
A close-in attack involves someone attempting to get physically close to network components, data, and systems
in order to learn more about a network Close-in attacks consist of regular individuals attaining close physical proximity to
networks, systems, or facilities for the purpose of modifying, gathering, or denying access to information. Close physical
proximity is achieved through surreptitious entry into the network, open access, or both.
Social engineering
The attacker compromises the network or system through social interaction with a person, through an e-mail
message or phone. Various tricks can be used by the individual to revealing information about the security of company. The
information that the victim reveals to the hacker would most likely be used in a subsequent attack to gain unauthorized
access to a system or network.
Phishing Attack
In phishing attack the hacker creates a fake web site that looks exactly like a popular site such as the SBI bank or
paypal. The phishing part of the attack is that the hacker then sends an e-mail message trying to trick the user into clicking
a link that leads to the fake site. When the user attempts to log on with their account information, the hacker records the
username and password and then tries that information on the real site.
Hijack attack
Hijack attack In a hijack attack, a hacker takes over a session between you and another individual and
disconnects the other individual from the communication. You still believe that you are talking to the original party and
may send private information to the hacker by accident.
Types of Attacks
Spoof attack
Spoof attack In a spoof attack, the hacker modifies the source address of the packets he or she is
sending so that they appear to be coming from someone else. This may be an attempt to bypass your firewall
rules.
Buffer overflow
Buffer overflow A buffer overflow attack is when the attacker sends more data to an application than
is expected. A buffer overflow attack usually results in the attacker gaining administrative access to the system
in a command prompt or shell.
Exploit attack
Exploit attack In this type of attack, the attacker knows of a security problem within an operating
system or a piece of software and leverages that knowledge by exploiting the vulnerability.
Password attack
Password attack An attacker tries to crack the passwords stored in a network account database or a
password-protected file. There are three major types of password attacks: a dictionary attack, a brute-force
attack, and a hybrid attack. A dictionary attack uses a word list file, which is a list of potential passwords. A
brute-force attack is when the attacker tries every possible combination of characters.
Types of Attacks
Denial-of-Service Attack
the denial-of-service attack prevents normal use of your computer or network by valid users.
After gaining access to your network, the attacker can do any of the following:
Randomize the attention of your internal Information Systems staff so that they do not see the intrusion immediately,
which allows the attacker to make more attacks during the diversion.
Send invalid data to applications or network services, which causes abnormal termination or behaviour of the
applications or services.
Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.
Block traffic, which results in a loss of access to network resources by authorized users.
Man-in-the-Middle Attack
As the name indicates, a man-in-the-middle attack occurs when someone between you and the person with whom you
are communicating is actively monitoring, capturing, and controlling your communication transparently. For example,
the attacker can re-route a data exchange. When computers are communicating at low levels of the network layer, the
computers might not be able to determine with whom they are exchanging data.
Man-in-the-middle attacks are like someone assuming your identity in order to read your message. The person on the
other end might believe it is you because the attacker might be actively replying as you to keep the exchange going and
gain more information. This attack is capable of the same damage as an application-layer attack, described later in this
section.
Firewalls
Intrusion Detection Systems/ Intrusion Prevention Systems
Routers
Switches
Encryption
Vulnerability Management
Antivirus Solution
VPN
DDoS protection
Privileged Identity Management
Network Anomaly Detection
SIEM
Firewalls
Firewall is one of the most essential technologies that are used at perimeter of network to protect
internal networks from external threats.
Only allow access that is legitimately required for authorized business purpose, protocols,
source/destination and ports
Deny everything that is not explicitly allowed.
Types of Firewalls
1 . Network Firewalls( NGFW) - firewalls enhanced with intrusion prevention and application intelligence
2. UTM- UTMs deliver enterprise-class network security with state-ful inspection firewall, VPN and IPS,
offering the Human Layer 8 identity-based controls and Layer 7 application visibility and controls
IDS/IPS
Intrusion detection systems (IDS) is network security appliances that monitor
network and/or system activities for malicious activity.
Why IDS/IPS
Firewalls allow traffic only to legitimate hosts and services
Traffic to the legitimate hosts/services can have attacks
HTTP attacks, SQL Injection attacks
Solution?
IDS/IPS
Monitor data and behavior
Report when attacks identified
Types of IDS/IPS
Signature-based IDS
Anomaly-based IDS
Network-based IDS
Host-based IDS
Signature-based IDS
Characteristics
Uses known pattern matching
to signify attack
Advantages?
Widely available
Fairly fast
Easy to implement
Easy to update
Disadvantages?
Cannot detect attacks for which it has no signature
Anomaly-based IDS
Characteristics
Uses statistical model or machine learning engine to characterize normal usage behaviors
Advantages?
Can detect attempts to exploit new and unforeseen vulnerabilities
Can recognize authorized usage that falls outside the normal pattern
Disadvantages?
Generally slower, more resource intensive compared to signature-based IDS
Greater complexity, difficult to configure
Network-based IDS/IPS
Characteristics
NIDS examine raw packets in the network
passively and triggers alerts
Advantages?
Easy deployment
Difficult to evade if done at low level of
network operation
Disadvantages?
Fail Open
Different hosts process packets differently
Need to have the complete network topology
and complete host behavior
Host-based IDS/IPS
Characteristics
Advantages
More accurate than NIDS
Less volume of traffic so less overhead
Disadvantages
Deployment is expensive
What happens when host get compromised?
Encryption
Encryption is a way to enhance the security of a
message or file by scrambling the contents so
that it can be read only by someone who has the
right encryption key to unscramble it.
Ex: if you purchase something from a
website, the information for the transaction (such as
your address, phone number, and credit card
number) is usually encrypted to help keep it safe.
Encryption Usage
SSL certificate
Digital Signature
Drive Encryption
File Encryption
VPN
Secure Email
Denial of Service
Denial of Service (DoS) attack is an attack against any system component that
attempts to force that system component to limit, or even halt, normal services
Temporarily or indefinitely interrupt or suspend services of a host connected to the
Internet.
This is an attempt to make a machine or network resource unavailable to its
intended users.
Facts
Impact of DDoS
Applicationlayer DDOS
attack
Protocol
DOS attack
Volumebased DDOS
attack
Types of Attacks
Volume-based DDOS attack or Bandwidth attacks: flood the
network with high volume of traffic.
Protocol DOS attack or Connectivity attacks: flood a computer
with high volume of connection requests.
Application-layer DDOS attack or Application Attacks: Send
specially crafted packets to application.
Illegal botnets :Botnets sometimes compromise computers whose security defenses have
been breached and control conceded to a third party. Each such compromised device,
known as a "bot", is created when a computer is penetrated by software from
a malware (malicious software) distribution.
Live Attacks
http://www.digitalattackmap.com/
http://map.norsecorp.com/#/
Vulnerability
Vulnerability management is practice of identifying, classifying, remediating, and
mitigating vulnerabilities especially in software and firmware.
Vulnerability management is integral to computer security and network security.
Vulnerability Scanner
Nessus
Qualys
OpenVas
GFI Languard
Retina
Security Awareness
Antivirus Solution
Privileged Identity Management
Network Anomaly Detection
SIEM
PIM Vendors
Cyber-Ark.
Hitachi ID Systems
Lieberman Software.
Dell / Quest / e-DMZ.
Cisco IOS NetFlow is a form of network telemetry that Cisco routers and switches can collect locally or push.
Data provided through NetFlow is similar to information in a phone bill. The user can view who is talking
(source and destination IP address) and how long the conversations last (amount of traffic in terms of bytes
and packets).
Lancope Stealtwatch
SIEM
Security information and event management (SIEM) is an approach to security
management that seeks to provide a holistic view of an organization's information
technology (IT) security
A SEM system centralizes the storage and interpretation of logs and allows near realtime analysis which enables security personnel to take defensive actions more
quickly.
A SIM system collects data into a central repository for trend analysis and provides
automated reporting for compliance and centralized reporting.
The two functions together SIEM systems provide quicker identification, analysis and
recovery of security events.
They also allow compliance managers to confirm they are fulfilling an organization's
legal compliance requirements.
SIEM Vendors
ArcSight
Splunk
IBM Q-radar
RSA Envision
McAfee SIEM
Sample Dashboard
Questions???