ITS 302 Group2 Report
ITS 302 Group2 Report
Security
Measures
Group 2
OBJECTIVES
1 Firewalls, intrusion/ detection
prevention system
2 Encryption and authentication
2. Host Intrusion Detection System (HIDS): Monitors activities on individual hosts or devices,
such as system logs, file changes, and processes, to detect intrusions at the device level.
Intrusion Detection Systems
IDS can be further classified by their detection methods:
(IDS)
• Signature-Based Detection: Compares incoming data to a database of known attack patterns or
signatures. This approach is effective for identifying known threats but may miss new, unknown
attacks.
IDSs are essential in cybersecurity for providing early warnings about potential threats and
assisting in faster response and remediation.
Intrusion prevention Systems
(IDS)
An Intrusion Prevention System (IPS) is a security tool designed not only to detect but also to
actively block or mitigate threats in real time. While similar to an Intrusion Detection System (IDS),
an IPS takes a step further by automatically responding to threats to prevent them from causing
harm to the network or system. It’s typically deployed inline with network traffic, so it can
intercept and take immediate action on malicious activities.
1. Threat Detection: Identifying potential threats using methods similar to IDS, such as signature-
based detection (for known attacks) and anomaly-based detection (for unknown or unusual
behavior).
2. Threat Prevention: Once a threat is detected, an IPS can take automated actions, like
dropping malicious packets, blocking IP addresses, resetting network connections, or
reconfiguring firewall rules to prevent the attack from continuing or spreading.
Intrusion prevention Systems
Types of IPS include:
•
(IDS)
Network-based IPS (NIPS): Monitors and protects an entire network by analyzing traffic for
suspicious activities.
•Host-based IPS (HIPS): Monitors a specific device, watching for and blocking suspicious activities
at the system level.
IPS is highly valuable for organizations seeking proactive security measures since it can actively
prevent attacks before they affect critical systems or data.
IDS vs IPS
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) each play vital roles in
modern cybersecurity, and advancements in both technologies have significantly improved their
performance and utility.
Performance Comparison:
•IDS: Since IDS monitors and alerts without actively blocking, it typically operates with lower
latency, making it suitable for networks where uninterrupted flow is essential. However, IDS
requires manual or automated intervention to respond to threats, which can lead to delayed
responses to critical incidents.
•IPS: IPS is designed to actively block malicious traffic, meaning it has a higher impact on network
performance, especially during high traffic loads. IPS requires careful tuning to minimize false
positives, as incorrect blocking can disrupt legitimate network activities.
Encryption
Encryption is the process of converting data into a coded form (ciphertext) using a cryptographic algorithm. The
primary goal of encryption is to protect the confidentiality of data, ensuring that only authorized parties can
access and understand the information.
How It Works:
•Symmetric encryption: Uses the same key for both encryption and decryption. Examples: AES (Advanced
Encryption Standard), DES (Data Encryption Standard).
•Asymmetric encryption: Uses a pair of keys (public and private). One key encrypts the data, and the other
decrypts it. Examples: RSA, ECC (Elliptic Curve Cryptography).
•Ensures that sensitive data transmitted over the network is unreadable to unauthorized users. For instance,
encrypted data on a website (via HTTPS) ensures that even if intercepted, the data cannot be read by attackers.
•It secures communication between clients and servers, such as when making transactions or sending private
Authentication
Authentication is the process of verifying the identity of a user, device, or system to ensure that only authorized
parties can access certain resources. It is used to confirm that someone or something is who or what it claims to
be.
How It Works:
Encryption and authentication are often used together to create a secure communication
channel. For example:
1.Authentication: When you log into a secure website, authentication ensures that you are the
legitimate user (e.g., by verifying your password or using 2FA).
2.Encryption: After authentication, encryption protects the sensitive data exchanged between
you and the website (e.g., credit card numbers or personal details) from being intercepted by
attackers.
Virtual Private Networks (VPN)
A VPN is a service or network technology that creates a secure, encrypted connection over a
public or untrusted network (like the internet). It allows users to send and receive data as if they
were directly connected to a private network, protecting the integrity and confidentiality of their
communications.
•Encryption: VPNs ensure that the data transmitted between the user (e.g., remote worker) and
the destination (e.g., corporate network) is encrypted, making it unreadable to anyone who
intercepts the data.
•Privacy: VPNs hide the user's real IP address by routing traffic through a secure server, offering
anonymity and masking the user's location.
•Secure Access: VPNs enable remote access to a private network from anywhere, allowing
Virtual Private Networks (VPN)
Key Benefits of VPNs:
•Privacy: Hides users' real IP addresses and online activity, providing anonymity.
Tunneling Protocols
Tunneling protocols are methods used by VPNs to encapsulate (wrap) data packets inside other
packets to create a secure "tunnel" between the sender and receiver. This allows the encrypted
data to travel through the untrusted network without being altered or intercepted.
Tunneling protocols define how the data is encapsulated and transmitted over the internet and are
a key part of how a VPN works. They vary in terms of security, performance, and compatibility.
• Encryption: While L2TP itself does not provide encryption, it is commonly combined with
IPsec for strong encryption and secure data transmission.
• Use Case: Widely used in modern VPN solutions for more secure, stable connections.
• Pros: Strong security when paired with IPsec, more modern than PPTP.
• Cons: Slightly slower performance due to the double encapsulation (L2TP + IPsec).
Tunneling Protocols
Common Tunneling Protocols:
• Encryption: Provides high-level security and can be used for site-to-site VPNs or client-to-site
connections.
• Use Case: Often used in conjunction with L2TP or in other VPN types like SSL VPNs.
• Pros: Strong encryption and authentication; widely adopted for secure communications.
• Cons: Requires proper configuration and may be more complex to set up.
Tunneling Protocols
Common Tunneling Protocols:
4. OpenVPN
• Overview: An open-source tunneling protocol that uses SSL/TLS for secure data transmission.
• Encryption: Supports robust encryption methods, including AES-256.
• Use Case: Very popular in modern VPN services due to its security and flexibility.
• Pros: Strong security, highly customizable, supports various encryption methods, works
across many platforms.
• Cons: Can be more complex to configure, slower setup compared to other protocols.
Tunneling Protocols
Common Tunneling Protocols:
• Encryption: Provides strong encryption and is used for protecting data in transit.
• Use Case: Often used for remote access VPNs, where users can access a specific application
or network resource through a secure HTTPS connection.
• Cons: May not offer the same level of protection for full network access as IPsec or OpenVPN.
Tunneling Protocols
Common Tunneling Protocols:
• Encryption: Uses strong encryption methods and supports mobile devices well due to its ability
to quickly re-establish connections when switching networks.
• Use Case: Often used in modern mobile VPNs for secure, stable connections.
• Cons: Slightly more complex to configure than simpler protocols like PPTP.