Topic 5 - Network Security
Topic 5 - Network Security
Topic 5
Network Security
Topic Reading
• Interact content.
Importance of Networks
Reference model
• Framework.
• Software & hardware.
• Reading on Interact.
p.471 of
text.
Segmentation
Trust boundaries.
Functional requirements.
Can be based on: Other depending on importance to
business.
• NAC is therefore a useful tool for policy enforcement but is most useful at
the initial stage of connection.
• Protecting your network from nefarious traffic is a tough task and can begin
with securing the flow of traffic into physical/logical ports.
• Port Security is a technology that gives you the ability to limit the number of
hosts that can connect to a port by limiting the incoming MAC addresses.
• Remote access (for mobile users and are only active when required).
Application Layer
• Able to decode and understand layer 7 protocols.
• Cannot decrypt so fail for SSL applications (SSH, HTTPS).
Application awareness
• Layers 3 7.
Application fingerprinting
• Must be able to correctly identify applications flowing through them by traffic
contents.
QoS
• Based on the traffic priorities of the host network.
Core Functions
NAT
• Static, dynamic, PAT.
• Often debated as a valid security measure.
Malware blocking
• Detection, stopping, logging.
AV
• Used as an additional layer of defense in conjunction with other technologies.
IDS/IDP
• Again…as an addition to specific IDS/IDP devices.
URL filtering/caching
• Being at the perimeter FWs are perfectly placed.
• Many FWs are brilliant at this…which saves you!
What else can Firewalls do?
SPAM Filtering
• Similar to web filtering.
Attacks
• “Misuse” attacks.
– Copying documents.
– Posting documents to portals.
– Social engineering.
Types of IDS & Detection Models
Anomaly detection
• Looks at patterns of behavior and changes or abnormalities.
Signature
• Uses specific knowledge profiles to match against traffic patterns.
Active
• Triggers some configurable action.
Passive
• Logs only.
HIDS
Realtime
• Always looks for attacks and events.
• Takes up a lot of system resources.
Snapshot
• Takes snapshots to show the differences between a known good state and
a corrupt state.
NIDS
Protects networks
• Along with detection & reporting IPS can stop attacks in real
time.
• Can sometimes overact!
– False positives can sometimes lead to traffic starvation.
Which should I use?
It depends……
There is rarely one solution to a problem but there is often a best solution.
UTM
• Always try to use the most secure version, implementation or design for
anything you do.
• Even with great defences you must still have knowledge of possible attack
vectors.
Thanks for watching!