Chapter 4 Network Security
Chapter 4 Network Security
Chapter 4 Network Security
Network security is any system, device, or action designed to protect the safety and reliability of a
network and its data. Like a fence around private land or a lock on a door, network security manages
access to a network by stopping a variety of threats from entering and spreading through a system.
Network security is focused on protecting files, documents, and information from those types of
attacks. Most commonly, network security starts with authentication in the form of a username and
password, but it can also employ other tools like firewalls, anti-virus programs, and virtual private
networks (VPNs) to protect the network’s information.
1
Phishing: Phishing is a type of fraud that occurs when a threat actor impersonates a reputable
entity in person, via email, or other communication forms. Threat actors often use phishing
emails to spread malicious attachments or links that perform various functions, such as
extracting the victim’s account information or login credentials.
Bots: A bot is a small program that automates web requests with various goals. Bots perform
their tasks without any human intervention, for example, scanning website content and testing
stolen credit card numbers.
A bot attack utilizes automated web requests to defraud, manipulate, or disrupt applications,
websites, end-users, or APIs. Bot attacks were originally used primarily for spam and denial of
service, but have evolved into complex enterprises with economies and infrastructure that
enables waging additional, more damaging attacks.
DDoS Attacks: A Distributed Denial of Service (DDoS) attack employs multiple compromised
computer systems to attack a target and cause a denial of service for the targeted resource’s
users. It sends a flood of messages, malformed packets, or connection requests to the target
system, forcing it to slow down or entirely shut down, denying service to real systems and
users. DDoS attacks can target a website, server, and other network resources.
Advanced Persistent Threats (APTs): is a targeted and prolonged attack during which
intruders gain unauthorized access to a network, remaining undetected for an extended time.
Threat actors usually launch APT attacks to steal data rather than cause damage to the target’s
network.
Drive-by Download: is the unintentional download of malicious code to a computer or mobile
device, exposing the victim to a cyberattack. Unlike other cyberattacks, a drive-by does not rely
on a user to actively enable the attack. It exploits an application, web browser, or operating
system containing security flaws, which may occur due to a lack of updates or unsuccessful
updates.
DNS Attack: occurs when a threat actor exploits vulnerabilities in a domain name
system (DNS). DNS was designed for usability rather than security. As a result, threat actors
can exploit the communication between clients and servers to launch attacks.
2
passwords, and leaving default accounts active are all examples of common misconfigurations
that can lead to serious security vulnerabilities.
Unsecured APIs: Many modern applications rely on application programming interfaces
(APIs) to function properly. However, if APIs are not properly secured, they can be a serious
security vulnerability. Attackers can exploit unsecured APIs to gain access to sensitive data or
even take control of entire systems.
Outdated or Unpatched Software: Software vulnerabilities are often the root cause of major
security breaches. Outdated software is especially vulnerable, as attackers can exploit known
weaknesses that have already been patched in newer versions. Unpatched software is also a
major security risk, as many organizations fail to apply critical security updates in a timely
manner.
Zero-Day Vulnerability: Zero-day vulnerability is a previously unknown security flaw
exploited by attackers before the vendor has patched it. These types of vulnerabilities are
extremely dangerous, as there is usually no way to defend against them until after they have
been exploited.
Web Security
Secure web browsing is provided by HTTPS (Secured HTTP). It stands for HTTP over SSL. This
protocol is used to provide the encrypted and authenticated connection between the client web browser
and the website server. The secure browsing through HTTPS ensures that the following content are
encrypted:
URL of the requested web page.
Web page contents provided by the server to the user client.
Contents of forms filled in by user.
Cookies established in both directions.
5
2) Transport Layer Security
The security at this layer is mostly used to secure HTTP based web transactions on a network.
However, it can be employed by any application running over TCP. The main protocols that provides
security scheme at the transport layer are TLS and SSL.
6
4) Link Layer Security
Data link Layer in Ethernet networks is highly prone to several attacks. The most common attacks are
ARP Spoofing (the process of modifying a target host’s ARP cache with a forged entry), MAC
Flooding (the attacker floods the switch with MAC addresses using forged ARP packets until the CAM1
table is full), Port Stealing (an attack that exploits the ability of a switch to bind MAC to ports).
Several methods have been developed to mitigate these types of attacks. Some of the important
methods are:
Port Security
It is a feature available on intelligent Ethernet switches. By default, port security limits the ingress
MAC address count to one. The port can be configured to shut down or block the MAC addresses that
exceed a specified limit.
DHCP Snooping
DHCP spoofing is an attack where the attacker listens for DHCP requests from host on the network
and answers them with fake DHCP response before the authorized DHCP response comes to the host.
DHCP snooping can prevent such attacks. DHCP snooping is a switch feature. Switch can be
configured to determine which switch ports can respond to DHCP requests. Switch ports are identified
as trusted or untrusted ports.
5) Physical Security
Restricting access to the devices on network is a very essential step for securing a network. Since
network devices comprise of communication as well as computing equipment, compromising these can
potentially bring down an entire network and its resources. Paradoxically, many organizations ensure
excellent security for their servers and applications but leave communicating network devices with
rudimentary security.
1
Content Addressable Memory is a table on a switch that stores the MAC addresses, switch port numbers and other info.
7
An important aspect of network device security is access control and authorization. Many protocols
have been developed to address these two requirements and enhance network security to higher levels.
Centralized authentication systems, such as RADIUS and Kerberos, solve this problem. These
centralized methods allow user information to be stored and managed in one place. These systems can
usually be seamlessly integrated with other user account management schemes such as Microsoft’s
Active Directory or LDAP directories. Most RADIUS servers can communicate with other network
8
devices in the normal RADIUS protocol and then securely access account information stored in the
directories.
Wireless Security
Wireless security is the protection of wireless networks, devices and data from unwanted access and
breaches. It involves a variety of strategies and practices designed to preserve the confidentiality,
integrity and availability of wireless networks and their resources. Wireless networks broadcast data
using radio waves, which can be intercepted by anybody within the network range. As a result,
wireless networks are prone to eavesdropping, illegal access and theft. Using security measures such as
encryption protocols, access control rules, and authentication procedures prevents unauthorized access
and safeguards these wireless networks. A wireless network can be a cellular network, wireless LAN
or other sensor or communications network, but Wi-Fi is the wireless network protocol people are
generally most familiar with.
Wireless security protocols encrypt data transmitted over wireless networks to prevent unauthorized
access and eavesdropping. They also provide authentication mechanisms to verify the identity of users
and devices attempting to access the network. These protocols implement access control rules to
determine which users or devices are allowed on the network and what their access level is.
Wired Equivalent Privacy (WEP): employs a shared key authentication mechanism and the
RC4 encryption algorithm to encrypt data. However, this protocol is outdated and considered
insecure because it is easily hackable.
Wi-Fi Protected Access (WPA): is an improvement of WEP introduced in 2003. It provides
stronger security measures like message integrity checks and improved key management. WPA
uses the Temporal Key Integrity Protocol (TKIP) encryption algorithm, but is still vulnerable to
attacks.
Wi-Fi Protected Access II (WPA2): introduced in 2004, remains the most popular wireless
security protocol. It uses the Counter Mode Cipher Block Chaining Message Authentication
Code Protocol (CCMP) based on the Advanced Encryption Standard (AES) encryption
9
algorithm for stronger security measures. WPA2 is basically an upgraded version of WPA since
it features improved management and is less vulnerable to attacks.
Wi-Fi Protected Access III (WPA3): is the latest wireless security protocol and offers
enhanced security features such as stronger encryption, protection against dictionary attacks
and individualized data encryption. Announced in 2018 by the Wi-Fi Alliance, WPA3
simplifies the process of configuring devices with little to no display interface, such as IoT
devices, by introducing Wi-Fi Easy Connect. This works by allowing the IoT device to present
a QR code or a Near Field Communication (NFC) tag, which the user can scan with their
device to establish a secure Wi-Fi connection. Despite advances like stronger encryption and
more secure key exchange, WPA3 has yet to gain much traction among users.
10