2-Network Security's Nuts & Bolts
2-Network Security's Nuts & Bolts
2-Network Security's Nuts & Bolts
training.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Module 2 – Network Security’s Nuts & Bolts
Learning
training.cyberoam.com
Module 2 > What is Network Security ?
Learning
training.cyberoam.com
Module 2 > Identifying Risks in the Network
• Network risk is a broader term and can be divided into many smaller
terms
• Threats
• Vulnerabilities
• Confidentiality Attacks
Learning
training.cyberoam.com
Module 2 > Threats
• A threat is any such incident which can harm the security of a computer
network.
• Threats are categorized into
• Internal
• External
Learning
training.cyberoam.com
Module 2 > Threats > Internal Threat
• Till now we have only known that the threats to a network is from the
Internet, and other outside world, but a study reveals that the actual
threat to an organization is more internal than external.
Learning
training.cyberoam.com
Module 2 > Threats > External Threat
• External threats are the threats which come from outside the network
usually through the internet.
• An external threat relies on technical means to achieve its goals.
• The network security defense mechanisms fight most against the
external threats.
• Firewalls, Intrusion Prevention System (IPS), and other such terms can
help to reduce the threats to an organization
Learning
training.cyberoam.com
Module 2 > Vulnerability
Learning
training.cyberoam.com
Module 2 > Confidentiality Attacks
Learning
training.cyberoam.com
Module 2 > Confidentiality Attacks > Logical Attacks
• Packet Sniffing
• Port Scanning
• Social Engineering
Learning
training.cyberoam.com
Module 2 > Confidentiality Attacks > Physical Attacks
• Dumpster Diving
• Wiretapping
Learning
training.cyberoam.com
Module 2 > Security Principles
• Response
• Detection
• Prevention
Learning
training.cyberoam.com
Module 2 > Evolution of Firewall
Learning
training.cyberoam.com
Module 2 > Evolution of Firewall > Packet Filter
Destination
port 80
Destination
port 8080
Learning
training.cyberoam.com
Module 2 > Evolution of Firewall > Application Filter
Destination IP
192.18.1.1:80
Destination IP
192.18.1.1:8080
Learning
training.cyberoam.com
Module 2 > Evolution of Firewall > Stateful Inspection
Destination
session live
Destination
session expire
Learning
training.cyberoam.com
Module 2 > Evolution of Firewall > UTM
No Virus
Found virus
Learning
training.cyberoam.com
Module 2 > Evolution of Firewall > UTM Pros & Cons
Learning
training.cyberoam.com
Module 2 > Evolution of Firewall > Next Generation UTM
Destination
port 80
Destination IP
192.18.1.1:80
Destination
session live
No Virus
User: John
Destination
port 8080
Destination IP
192.18.1.1:8080
Destination
session expire
Found virus
User: Mike
Learning
training.cyberoam.com
Module 2 > Identifying Vital Data & Assets
• Servers/DMZ
• Servers/DMZ (De-Militarized Zone) is an approach to securing the
vital data and assets.
• In this approach the servers and machines which carry vital data are
separated from the network.
• Different rules can be created for this zone in the firewall, since this
area needs most protection from the attackers.
Learning
training.cyberoam.com
Module 2 > Identifying Vital Data & Assets
Learning
training.cyberoam.com
Module 2 > DMZ & Firewall Scenarios
Learning
training.cyberoam.com
Module 2 > Baseline Security Principles
Learning
training.cyberoam.com
Module 2 > Baseline Security Principles
• Security by Obscurity
• Security by obscurity is a stealth type of protection.
• It relies on the concept that if a network is unknown and undetected
by outsiders, it will not be affected by any threats.
• The basic principle of this model is to hide to network by not
advertising it.
• The only flaw for this model is that it does not work in the longer
run; once a network is detected it is vulnerable to attacks
Learning
training.cyberoam.com
Module 2 > Baseline Security Principles
• Perimeter Defense
• Perimeter defense applies security by obscurity, but at a lower level.
The perimeter defense model separates the outer network and inner
network by adding a firewall in between.
• The internal network and its structure are hidden from the outsiders,
so there can be no vulnerabilities
Learning
training.cyberoam.com
Module 2 > Baseline Security Principles
• Defense in depth
• Defense in depth is the best model approach to network security.
• The defense in depth model applies security to each node on the
network making each node act as an individual.
• The advantage of defense in depth is that if there are any internal
attacks, or any internal node is compromised, the other internal
nodes can detect and prevent the further attacks on the entire
network
Learning
training.cyberoam.com
Module 2 > Compliances
• CIPA
• Children’s Internet Protection Act
• HIPAA
• Health and Insurance Portability & Accountability Act
• GLBA
• Gramm-Leach-Biley Act
• SOX
• Sarbanes-Oxley
• PCI
• Payment Card Industry
• FISMA
• Federal Information Security Management Act
Learning
training.cyberoam.com
Module 2 > Goals of Network Security
• Confidentiality
• Providing confidentiality is an assurance that only authorized users
can view the sensitive information
• Integrity
• Providing integrity to sensitive data assures that only authorized
users can change the data.
• Availability
• Confidentiality and integrity together should be organized in such a
way that the availability of sensitive data to the authorized users is
always high
Learning
training.cyberoam.com
Next> Deploying Security Solution
Learning
training.cyberoam.com