Chapter 4 - Network Security
Chapter 4 - Network Security
Chapter 4 - Network Security
What is networking?
Types of Networks
Network Devices
Network terms
Networking at a Glance
This diagram represents a small business network, which we will build upon
during this lesson. The lines depict wired connections. Notice how all devices
behind the firewall connect via the network switch, and the firewall lies
between the network switch and the internet.
The network diagram below represents a typical home network. Notice the
primary difference between the home network and the business network is that
the router, firewall, and network switch are often combined into one device
supplied by your internet provider and shown here as the wireless access point.
Open Systems Interconnection (OSI) Model
The OSI Model was developed to establish a common way to describe the
communication structure for interconnected computer systems. The OSI model
serves as an abstract framework, or theoretical model, for how protocols should
function in an ideal world, on ideal hardware. Thus, the OSI model has become
a common conceptual reference that is used to understand the communication
of various hierarchical components from software interfaces to physical
hardware.
The OSI model divides networking tasks into seven distinct layers. Each layer is
responsible for performing specific tasks or operations with the goal of
supporting data exchange (in other words, network communication) between
two computers. The layers are interchangeably referenced by name or layer
number. For example, Layer 3 is also known as the Network Layer. The layers
are ordered specifically to indicate how information flows through the various
levels of communication. Each layer communicates directly with the layer
above and the layer below it. For example, Layer 3 communicates with both
the Data Link (2) and Transport (4) layers.
The Application, Presentation, and Session Layers (5-7) are commonly referred
to simply as data. However, each layer has the potential to perform
encapsulation. Encapsulation is the addition of header and possibly a footer
(trailer) data by a protocol used at that layer of the OSI model. Encapsulation
is particularly important when discussing Transport, Network and Data Link
layers (2-4), which all generally include some form of header. At the Physical
Layer (1), the data unit is converted into binary, i.e., 01010111, and sent across
physical wires such as an ethernet cable.
It's worth mapping some common networking terminology to the OSI Model so
you can see the value in the conceptual model.
Encapsulation occurs as the data moves down the OSI model from Application
to Physical. As data is encapsulated at each descending layer, the previous
layer’s header, payload and footer are all treated as the next layer’s payload.
The data unit size increases as we move down the conceptual model and the
contents continue to encapsulate.
The inverse action occurs as data moves up the OSI model layers from Physical
to Application. This process is known as de-encapsulation (or decapsulation).
The header and footer are used to properly interpret the data payload and are
then discarded. As we move up the OSI model, the data unit becomes smaller.
The encapsulation/de-encapsulation process is best depicted visually below:
Transmission Control Protocol/Internet Protocol (TCP/IP)
The OSI model wasn’t the first or only attempt to streamline networking
protocols or establish a common communications standard. In fact, the most
widely used protocol today, TCP/IP, was developed in the early 1970s. The OSI
model was not developed until the late 1970s. The TCP/IP protocol stack
focuses on the core functions of networking.
The most widely used protocol suite is TCP/IP, but it is not just a single protocol;
rather, it is a protocol stack comprising dozens of individual protocols. TCP/IP
is a platform-independent protocol based on open standards. However, this is
both a benefit and a drawback. TCP/IP can be found in just about every
available operating system, but it consumes a significant amount of resources
and is relatively easy to hack into because it was designed for ease of use rather
than for security.
At the Application Layer, TCP/IP protocols include Telnet, File Transfer Protocol
(FTP), Simple Mail Transport Protocol (SMTP), and Domain Name Service (DNS).
The two primary Transport Layer protocols of TCP/IP are TCP and UDP. TCP is a
full-duplex connection-oriented protocol, whereas UDP is a simplex
connectionless protocol. In the Internet Layer, Internet Control Message
Protocol (ICMP) is used to determine the health of a network or a specific link.
ICMP is utilized by ping, traceroute and other network management tools.
The ping utility employs ICMP echo packets and bounces them off remote
systems. Thus, you can use ping to determine whether the remote system
is online, whether the remote system is responding promptly, whether the
intermediary systems are supporting communications, and the level of
performance efficiency at which the intermediary systems are communicating.
Revisão de termos
The nature of the addressing scheme established by IPv4 meant that network
designers had to start thinking in terms of IP address reuse. IPv4 facilitated this
in several ways, such as its creation of the private address groups; this allows
every LAN in every SOHO (small office, home office) situation to use addresses
such as 192.168.2.xxx for its internal network addresses, without fear that some
other system can intercept traffic on their LAN.
This table shows the private addresses available for anyone to use:
The first octet of 127 is reserved for a computer’s loopback address. Usually,
the address 127.0.0.1 is used. The loopback address is used to provide a
mechanism for self-diagnosis and troubleshooting at the machine level. This
mechanism allows a network administrator to treat a local machine as if it were
a remote machine and ping the network interface to establish whether it is
operational.
A much larger address field: IPv6 addresses are 128 bits, which supports
2128 or 340,282,366,920,938,463,463,374,607,431,768,211,456 hosts.
This ensures that we will not run out of addresses.
Improved security: IPsec is an optional part of IPv4 networks, but a
mandatory component of IPv6 networks. This will help ensure the
integrity and confidentiality of IP packets and allow communicating
partners to authenticate with each other.
Improved quality of service (QoS): This will help services obtain an
appropriate share of a network’s bandwidth.
::1 is the local loopback address, used the same as 127.0.0.1 in IPv4.
The range 2001:db8:: to 2001:db8:ffff:ffff:ffff:ffff:ffff:ffff is reserved
for documentation use, just like in the examples above.
fc00:: to fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff are addresses reserved for
internal network use and are not routable on the internet.
TCP/IP (as well as most protocols) is also subject to passive attacks via
monitoring or sniffing. Network monitoring, or sniffing, is the act of monitoring
traffic patterns to obtain information about a network.
Physical ports are the ports on the routers, switches, servers, computers, etc.
that you connect the wires, e.g., fiber optic cables, Cat5 cables, etc., to
create a network.
Logical Ports
Well-known ports (0–1023): These ports are related to the common protocols
that are at the core of the Transport Control Protocol/Internet Protocol
(TCP/IP) model, Domain Name Service (DNS), Simple Mail Transfer Protocol
(SMTP), etc.
Secure Ports
Revisão de conhecimento
Types of Threats
Identify Threats and Tools Used to Prevent Them
So far in this chapter, we have explored how a TCP/IP network operates, and
we have seen some examples of how threat actors can exploit some of the
inherent vulnerabilities. The remainder of this module will discuss the various
ways these network threats can be detected and even prevented.
While there is no single step you can take to protect against all attacks, there
are some basic steps you can take that help to protect against many types of
attacks.
Here are some examples of steps that can be taken to protect networks.
IDSs can recognize attacks that come from external connections, such as an
attack from the internet, and attacks that spread internally, such as a malicious
worm. Once they detect a suspicious event, they respond by sending alerts or
raising alarms. A primary goal of an IDS is to provide a means for a timely and
accurate response to intrusions.
Intrusion detection and prevention refer to capabilities that are part of isolating
and protecting a more secure or more trusted domain or zone from one that is
less trusted or less secure. These are natural functions to expect of a firewall,
for example.
Security management involves the use of tools that collect information about
the IT environment from many disparate sources to better examine the overall
security of the organization and streamline security efforts. These tools are
generally known as security information and event management (or S-I-E-M,
pronounced “SIM”) solutions. The general idea of a SIEM solution is to gather
log data from various sources across the enterprise to better understand
potential security concerns and apportion resources accordingly.
Preventing Threats
While there is no single step you can take to protect against all threats, there
are some basic steps you can take that help reduce the risk of many types of
threats.
Antivirus
Anti-malware now goes beyond just virus protection as modern solutions try to
provide a more holistic approach detecting rootkits, ransomware and spyware.
Many endpoint solutions also include software firewalls and IDS or IPS systems.
Scans
Firewalls
When it comes to data centers, there are two primary options: organizations
can outsource the data center or own the data center. If the data center is
owned, it will likely be built on premises. A place, like a building for the data
center is needed, along with power, HVAC, fire suppression and redundancy.
Cooling is not the only issue with airflow: Contaminants like dust and noxious
fumes require appropriate controls to minimize their impact on equipment.
Monitoring for water or gas leaks, sewer overflow or HVAC failure should be
integrated into the building control environment, with appropriate alarms to
signal to organizational staff. Contingency planning to respond to the warnings
should prioritize the systems in the building, so the impact of a major system
failure on people, operations or other infrastructure can be minimized.
Data Center/Closets
Power
Fire Suppression
Redundancy
For example, Hospital A and Hospital B are competitors in the same city. The
hospitals create an agreement with each other: if something bad happens to
Hospital A (a fire, flood, bomb threat, loss of power, etc.), that hospital can
temporarily send personnel and systems to work inside Hospital B in order to
stay in business during the interruption (and Hospital B can relocate to Hospital
A, if Hospital B has a similar problem). The hospitals have decided that they
are not going to compete based on safety and security—they are going to
compete on service, price and customer loyalty. This way, they protect
themselves and the healthcare industry as a whole.
The service level agreement goes down to the granular level. For example, if
I'm outsourcing the IT services, then I will need to have two full-time
technicians readily available, at least from Monday through Friday from eight
to five. With cloud computing, I need to have access to the information in my
backup systems within 10 minutes. An SLA specifies the more intricate aspects
of the services.
Cloud
There are various definitions of what cloud computing means according to the
leading standards, including NIST. This NIST definition is commonly used around
the globe, cited by professionals and others alike to clarify what the term
“cloud” means:
Cloud Characteristics
Service Models
Some cloud-based services only provide data storage and access. When storing
data in the cloud, organizations must ensure that security controls are in place
to prevent unauthorized access to the data.
There are varying levels of responsibility for assets depending on the service
model. This includes maintaining the assets, ensuring they remain functional,
and keeping the systems and applications up to date with current patches. In
some cases, the cloud service provider is responsible for these steps. In other
cases, the consumer is responsible for these steps. Types of cloud computing
service models include Software as a Service (SaaS) , Platform as a Service
(PaaS) and Infrastructure as a Service (IaaS).
Software as a Service (SaaS)
Think of a rule book and legal contract—that combination is what you have in a
service-level agreement (SLA). Let us not underestimate or downplay the
importance of this document/ agreement. In it, the minimum level of service,
availability, security, controls, processes, communications, support and many
other crucial business elements are stated and agreed to by both parties.
Network Design
Network Segmentation
DMZ
VLAN
VPN
NAC
Defense in Depth
Defense in depth uses a layered approach when designing the security posture
of an organization. Think about a castle that holds the crown jewels. The jewels
will be placed in a vaulted chamber in a central location guarded by security
guards. The castle is built around the vault with additional layers of security—
soldiers, walls, a moat. The same approach is true when designing the logical
security of a facility or system. Using layers of security will deter many
attackers and encourage them to focus on other, easier targets.
Defense in depth provides more of a starting point for considering all types of
controls—administrative, technological, and physical—that empower insiders
and operators to work together to protect their organization and its systems.
Here are some examples that further explain the concept of defense in depth:
Data: Controls that protect the actual data with technologies such as
encryption, data leak prevention, identity and access management and
data controls.
Application: Controls that protect the application itself with
technologies such as data leak prevention, application firewalls and
database monitors.
Host: Every control that is placed at the endpoint level, such as antivirus,
endpoint firewall, configuration and patch management.
Internal network: Controls that are in place to protect uncontrolled data
flow and user access across the organizational network. Relevant
technologies include intrusion detection systems, intrusion prevention
systems, internal firewalls and network access controls.
Perimeter: Controls that protect against unauthorized access to the
network. This level includes the use of technologies such as gateway
firewalls, honeypots, malware analysis and secure demilitarized zones
(DMZs).
Physical: Controls that provide a physical barrier, such as locks, walls or
access control.
Policies, procedures and awareness: Administrative controls that reduce
insider threats (intentional and unintentional) and identify risks as soon
as they appear.
Zero Trust
Zero trust is an evolving design approach which recognizes that even the most
robust access control systems have their weaknesses. It adds defenses at the
user, asset and data level, rather than relying on perimeter defense. In the
extreme, it insists that every process or action a user attempts to take must be
authenticated and authorized; the window of trust becomes vanishingly small.
While microsegmentation adds internal perimeters, zero trust places the focus
on the assets, or data, rather than the perimeter. Zero trust builds more
effective gates to protect the assets directly rather than building additional or
higher walls.
Network Access Control (NAC)
At one time, network access was limited to internal devices. Gradually, that
was extended to remote connections, although initially those were the
exceptions rather than the norm. This started to change with the concepts of
bring your own device (BYOD) and Internet of Things (IoT).
Having identified the need for a NAC solution, we need to identify what
capabilities a solution may provide. As we know, everything begins with a policy.
The organization’s access control policies and associated security policies
should be enforced via the NAC device(s). Remember, of course, that an access
control device only enforces a policy and doesn’t create one.
The NAC device will provide the network visibility needed for access security
and may later be used for incident response. Aside from identifying
connections, it should also be able to provide isolation for noncompliant devices
within a quarantined network and provide a mechanism to “fix” the
noncompliant elements, such as turning on endpoint protection. In short, the
goal is to ensure that all devices wishing to join the network do so only when
they comply with the requirements laid out in the organization policies. This
visibility will encompass internal users as well as any temporary users such as
guests or contractors, etc., and any devices they may bring with them into the
organization.
Medical devices.
IoT devices.
BYOD/mobile devices (laptops, tablets, smartphones).
Guest users and contractors.
The Internet of Things (IoT) is the collection of devices that can communicate
over the internet with one another or with a control console in order to affect
and monitor the real world. IoT devices might be labeled as smart devices or
smart-home equipment. Many of the ideas of industrial environmental control
found in office buildings are finding their way into more consumer-available
solutions for small offices or personal homes.
Embedded systems and network-enabled devices that communicate with the
internet are considered IoT devices and need special attention to ensure that
communication is not used in a malicious manner. Because an embedded system
is often in control of a mechanism in the physical world, a security breach could
cause harm to people and property. Since many of these devices have multiple
access routes, such as ethernet, wireless, Bluetooth, etc., special care should
be taken to isolate them from other devices on the network. You can impose
logical network segmentation with switches using VLANs, or through other
traffic-control means, including MAC addresses, IP addresses, physical ports,
protocols, or application filtering, routing, and access control management.
Network segmentation can be used to isolate IoT environments.
Microsegmentation
The toolsets of current adversaries are polymorphic in nature and allow threats
to bypass static security controls. Modern cyberattacks take advantage of
traditional security models to move easily between systems within a data
center. Microsegmentation aids in protecting against these threats. A
fundamental design requirement of microsegmentation is to understand the
protection requirements for traffic within a data center and traffic to and from
the internet traffic flows.
VLANs do not guarantee a network’s security. At first glance, it may seem that
traffic cannot be intercepted because communication within a VLAN is
restricted to member devices. However, there are attacks that allow a
malicious user to see traffic from other VLANs (so-called VLAN hopping). The
VLAN technology is only one tool that can improve the overall security of the
network environment.
Virtual Private Network (VPN)
1 1
Common network device used to connect networks. (D4.1
L4.1.1)
Question options:
A) Server
B) Endpoint
C) Router
D) Switch
2 1
A common network device used to filter traffic. (D4.1 L4.1.1)
Question options:
A) Server
B) Endpoint
C) Ethernet
D) Firewall
3 1
endpoint <------> Web server
A) 21
B) 53
C) 80
D) 161
Correct. This is the port for the HTTP protocol, commonly used for Web traffic.
4 1
An attack against the availability of a network/system; typically
uses many attacking machines to direct traffic against a given
target. (D4.2 L4.2.1)
Question options:
A) Worm
B) Virus
C) Stealth
D) Distributed-denial-of-service (DDOS)
5 1
A security solution installed on an endpoint in order to detect
potentially anomalous activity. (D4.2 L4.2.2)
Question options:
A) Router
C) Switch
6 1
A security solution that detects, identifies and often quarantines
potentially hostile software. (D4.2, L4.2.2)
Question options:
A) Firewall
B) Guard
C) Camera
D) Anti-malware
7 1
The common term used to describe the mechanisms that control
the temperature and humidity in a data center. (D4.3 L4.3.1)
Question options:
8 1
A cloud arrangement whereby the provider owns and manages
the hardware, operating system, and applications in the cloud,
and the customer owns the data. (D4.3 L4.3.2)
Question options:
9 1
A portion of the organization's network that interfaces directly
with the outside world; typically, this exposed area has more
security controls and restrictions than the rest of the internal IT
environment. (D4.3 L4.3.3)
Question options:
Correct. DMZ is the term we typically use to describe an outward-facing portion of the IT environment ow
10 1
Which of the following tools can be used to grant remote users
access to the internal IT environment? (D 4.3 L4.3.3)
Question options: