[go: up one dir, main page]

0% found this document useful (0 votes)
17 views5 pages

Lecture 5 Telecommunication Networks and Security

The document discusses the OSI model's security mechanisms and various network security infrastructures, including firewalls, intrusion detection systems, and virtual private networks (VPNs). It emphasizes the importance of securing multi-platform systems and implementing comprehensive security measures such as firewalls, anti-virus software, and strong password policies. Additionally, it highlights the value of third-party security audits for evaluating and enhancing network security.

Uploaded by

zakuwantung
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views5 pages

Lecture 5 Telecommunication Networks and Security

The document discusses the OSI model's security mechanisms and various network security infrastructures, including firewalls, intrusion detection systems, and virtual private networks (VPNs). It emphasizes the importance of securing multi-platform systems and implementing comprehensive security measures such as firewalls, anti-virus software, and strong password policies. Additionally, it highlights the value of third-party security audits for evaluating and enhancing network security.

Uploaded by

zakuwantung
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

LECTURE 5 Telecommunications, Network, and Internet Security

The OSI model addresses the following security issues:-


OSI Model and Security
 Security Mechanisms used in networks
 Encipherment
 Digital signature
 Access control
 Data integrity
 Authentication
 Traffic padding
 Routing protocol
Basic Network Security Infrastructures

Layer Function Network Protocols or Standards


Device

7: Application Provides services such as HTTP, FTP, TFTP, DNS,


email, file transfers and file SMTP, SFTP, SNMP, RLogin,
servers BootP, MIME

6: Presentation Provides encryption, code MPEG, JPEG, TIFF


conversion and data
formatting

5: Session Negotiates and establishes a Gateways SQL, X- Window, ASP, DNA,


connection with another SCP, NFS, RPC
computer

4: Transport Supports end-to-end delivery Gateway TCP, UDP, SPX


of data

3: Network Performs packet routing Router IP, OSPF, ICMP, RIP, ARP,
RARP

2: Data link Provides error checking and Switch Ethernet, Token Ring, 802.11
transfer of message frames

1: Physical Physically interfaces with Hub EIA RS-232, EIA RS-449,


transmission medium and IEEE, 802
sends data over the network

Router
A network traffic management device that, unbeknownst to the user, sits between subnetworks
(LANs) and routes traffic intended for or leaving the network segments to which it’s attached

Packet Filter
A simple and effective form of protection that matches all packets against a series of rules
Basic Packet Filtering
 Allows communication originating from one side of the communication path or the other
 Identifies and controls traffic by examining the source, destination, port number, and
protocol types

Stateful Inspection Packet Filtering


 A more complex packet-filtering technology that keeps track of the state of the current
connection to help assure that only desired traffic passes through

Benefits of Packet-Filtering Routers


 Little or no cost to implement because packet filtering is a feature of standard routers
 Little impact on router performance
 Generally transparent to users and applications

Limitations of Packet-Filtering Routers


 Defining packet filters can be a complex task
 The filtering rule set can become complicated, increasing in difficulty to manage and
comprehend
 There are few testing facilities to verify the correctness of the filtering rules
 The packet throughput of a router decreases as the number of filters increase
 It is not capable of understanding the context/data of a particular service

Firewalls
 Firewalls typically run monitoring software to detect and thwart external attacks on the site
and protect the internal corporate network
 Firewalls are an essential device for network security
 Many of the architectures needed for security rely on one or more firewalls within an
intelligent design

Application-Level Gateway Firewall


 Allows the network administrator to implement stricter security policies than packet-filtering
routers can manage
 Requires special-purpose code (a proxy service) for each desired application
 The proxy code can be configured to support only acceptable features of an application
 Users are permitted access to the proxy services, but may not log in to the application-level
gateway itself

Benefits of Application-Level Gateways


 The network manager has complete control over each service and permitted services
 It has the ability to support strong user authentication and provide detailed logging
information
 The filtering rules are much easier to configure and test

Limitations of Application-Level Gateways


 It requires either that users modify their behavior or that specialized software be installed on
each system that accesses proxy services
 Firewall Implementation Examples
1. Packet-Filter Router
 Inexpensive and transparent to users
 Inherent limitations of a packet-filtering router
2. Screened Host Firewalls
a. Public information server can be placed on the segment shared by the packet-filtering
router and the bastion host

3. DMZ or Screened-Subnet Firewall


 Private network is invisible
 Inside users must access the Internet via the proxy services
Intrusion Detection Systems (IDS)
 IDSs attempt to detect an intruder breaking into systems or an authorized user misusing
system resources
 IDSs are needed to detect both types of intrusions
 Break-in attempts from the outside
 Knowledgeable insider attacks
Two basic philosophical options
1. Prohibit everything that is not expressly permitted
2. Permit everything that is not expressly denied

A Good Intrusion Detection System must


 run continually without human supervision
 be fault tolerant
 resist subversion
 impose minimal overhead on the attached network
 observe deviations from normal behavior
 be easily tailored to the network
 cope with changing system behavior

False Positives, False Negatives, and Subversion Attacks


A false positive occurs when the system classifies an action as anomalous when it is legitimate
A false negative occurs when an intrusive action has occurred but the system allows it to pass as
nonintrusive behavior
A subversion error occurs when an intruder modifies the operation of the intrusion detector to
force false negatives to occur

Virtual Private Networks (VPNs)


 VPN is a network technology that makes it possible to establish private “tunnels” over the
public Internet
 IP security (IPSec) operates at both the Network Layer and Session Layer of the TCP/IP
protocol stack
 IPSec VPNs are the most common form in use today and are widely available from network
and firewall providers

IPsec - Performs both encryption and authentication to address the inherent lack of security on
IP-based networks

Three characteristics - Sender authentication, message integrity, and data confidentiality

SECURING MULTI-PLATFORM SYSTEMS

Networks are increasingly heterogeneous, containing different types of hardware and software
and running multiple operating systems that all need to be able to communicate with one another.
There are fewer and fewer pure Windows (or pure UNIX) shops, with many companies running
Windows domains side-by-side with UNIX web servers, accessed by client computers running
Windows, Linux and Mac. Add to the mix a variety of smart phones (Windows Mobile, iPhone,
Android, Symbian and more) that need to download mail and possibly access other network
resources, and you have a real challenge.
The same basic security concepts apply to both heterogeneous and homogeneous networks, so it
goes without saying that, regardless of the platform(s), you should:
 Secure the edge with a good firewall/threat management gateway and intrusion
detection/prevention system
 Use anti-virus and anti-malware software (including on non-Windows systems) and keep
definitions updated
 Implement security auditing/monitoring to detect attempted breaches

 Harden systems by turning off unnecessary services


 Close unused ports
 Restrict physical access to the systems
 Restrict administrative/root access to those who really need it; on UNIX systems, restrict
root access to secure terminals
 Implement file level permissions; on UNIX systems, partition the file system and use
read-only partitions for storing files that don’t change often, and use ACLs (Access
Control Lists) for complex permissions management
 On UNIX systems, limit the access processes have on the file system by using the chroot
and ulimit interfaces
 Enforce strong password policies
 In high security environments, require two-factor authentication
 On UNIX systems, use SSH (Secure Shell) for remote command line access
 Use encryption: to protect files on the drive, to protect data crossing the network, to
protect the operating system from unauthorized access
 Implement a public key infrastructure to issue digital certificates

Hire an outside security auditor


A third party security audit can be useful to evaluate and advise on the security implementation
in any complex network, but that goes double for a heterogeneous network. A company that does
security audits for a living will have personnel experienced in reviewing many different types of
systems and will be current on new vulnerabilities and new solutions that your IT personnel may
not have the time to keep up with. They can perform penetration testing for a real-world
assessment of where the vulnerabilities lie, and they can advise you on the most effective and
most cost-effective ways to close the gaps.

Summary
1. The Telecommunications, Network, and Internet Security domain is one of the most
important areas that security practitioners must understand well
2. We can begin to mix and match the building blocks of network security tools and techniques
to implement defense in depth in preserving confidentiality, integrity, and availability
3. It is important to know how to find security information and how to decide which security
architecture is most appropriate for a given situation

You might also like