PKI,Firewalls
PKI,Firewalls
Public key infrastructure or PKI is the governing body behind issuing digital certificates. It
helps to protect confidential data and gives unique identities to users and systems. Thus, it
ensures security in communications.
The public key infrastructure uses a pair of keys: the public key and the private key to achieve
security. The public keys are prone to attacks and thus an intact infrastructure is needed to
maintain them.
The security of a cryptosystem relies on its keys. Thus, it is important that we have a solid key
management system in place. The 3 main areas of key management are as follows:
A cryptographic key is a piece of data that must be managed by secure administration.
It involves managing the key life cycle which is as follows:
Public key infrastructure affirms the usage of a public key. PKI identifies a public key along
with its purpose. It usually consists of the following components:
A digital certificate also called a public key certificate
Private Key tokens
Registration authority
Certification authority
CMS or Certification management system
Working on a PKI:
A digital certificate can be divided into four broad categories. These are :
Class 1: These can be obtained by only providing the email address.
Class 2: These need more personal information.
Class 3: This first checks the identity of the person making a request.
Class 4: They are used by organizations and governments.
Each CA has its own certificate. Thus, trust is built hierarchically where one CA issues
certificates to other CAs. Moreover, there is a root certificate that is self-signed. For a root CA,
the issuer and the subject are not two separate parties but a single party.
As you saw above, the ultimate authority is the root CA. Hence, the security of root CA is of
huge importance. If the private key of a root CA is not taken care of, then it might turn into a
catastrophe. This is because anyone disguised as the root CA can then issue certificates. To
meet security standards, a root CA should be offline 99.9% of the time. However, it does need
to come online to create public and private keys and to issue new certificates. Ideally, these
activities should be performed 2-4 times a year.
Disadvantages of PKI:
Speed: Since PKI uses super complex algorithms to create a secure key pair. So it
eventually slows down the process and data transfer.
Private Key Compromise: Even though PKI can’t be hacked very easily but a private key
can be hacked by a professional hacker, since PKI uses Public and Private key to encrypt
and decrypt data so with user’s private key in hand and public key which is easily available
the information can be decrypted easily.
Public Key Authentication Protocols
Authentication protocols are methods or procedures used to verify the identity of a user, device,
or system. These protocols are designed to ensure that only authorized users or devices are able
to access protected resources, and to prevent unauthorized access or tampering.
Types of Authentication
There are many different types of authentication protocols in use today, each with its own
strengths and weaknesses. Here are some common types of authentication ?
Password-based authentication ? This is the most common form of authentication, in
which a user provides a username and password to log in to a system or access a
protected resource. Password-based authentication is relatively simple to implement, but
can be vulnerable to attacks such as dictionary attacks or brute force attacks.
Two-factor authentication ? This is a type of authentication that requires a user to
provide two forms of identification, such as a password and a security token, to log in to
a system or access a protected resource. Two-factor authentication can provide an
additional layer of security, but may be inconvenient for users and may require additional
infrastructure to support.
Biometric authentication ? This is a type of authentication that uses physical or
behavioral characteristics,such as a fingerprint or facial recognition, to verify the identity
of a user.Biometric authentication can be highly secure, but may be expensive to
implement and may not work well for all users (e.g., due to differences in physical
characteristics).
The Most Common Authentication Protocols are:
Kerberos
LDAP
OAuth2
SAML
RADIUS
1. Kerberos :
Kerberos is a protocol that aids in network authentication. This is used for validating
clients/servers during a network employing a cryptographic key. It is designed for executing
strong authentication while reporting to applications. The overall implementation of the
Kerberos protocol is openly available by MIT and is used in many mass-produced products.
Some advantages of Kerberos :
It supports various operating systems.
The authentication key is shared much efficiently than public sharing.
LDAP refers to Lightweight Directory Access Protocol. It is a protocol that is used for
determining any individuals, organizations, and other devices during a network regardless of
being on public or corporate internet. It is practiced as Directories-as-a-Service and is the
grounds for Microsoft building Activity Directory.
OAuth as the name suggests it is an authorization framework that promotes granting limited
access to the user on its account through an HTTP service. When a user requests access to
resources an API call is made and after the authentication token is passed.
4. SAML :
SAML stands for Security Assertion Markup Language which is based on XML-based
authentication data format which provides the authorization between an identity provider and
service provider. It serves as a product of the OASIS Security Services Technical Committee.
Some advantages of SAML :
It reduced the administrative costs for the end-users.
It provides a single sign-in for authenticating across service providers.
5. RADIUS :
RADIUS stands for Remote Authentication Dial-In User Service. It is a network protocol that
provides sufficient centralized Authentication, Accounting, and Authorization for the users that
use and network services. The functioning of the protocol occurs when the user requests
access to network resources, where the RADIUS server encrypts the credentials which are
entered by the user. After this, the user credentials are mapped through the local database and
provide access.
6. Software Firewall
A software firewall is any firewall that is set up locally or on a cloud server. When it comes to
controlling the inflow and outflow of data packets and limiting the number of networks that
can be linked to a single device, they may be the most advantageous. But the problem with
software firewall is they are time-consuming.
7. Hardware Firewall
They also go by the name "firewalls based on physical appliances." It guarantees that the
malicious data is halted before it reaches the network endpoint that is in danger.
8. Cloud Firewall
These are software-based, cloud-deployed network devices. This cloud-based firewall protects
a private network from any unwanted access. Unlike traditional firewalls, a cloud firewall
filters data at the cloud level.
Importance of Firewalls
So, what does a firewall do and why is it important? Without protection, networks are
vulnerable to any traffic trying to access your systems, whether it's harmful or not. That's why
it's crucial to check all network traffic.
When you connect personal computers to other IT systems or the internet, it opens up many
benefits like collaboration, resource sharing, and creativity. But it also exposes your network
and devices to risks like hacking, identity theft, malware, and online fraud.
Once a malicious person finds your network, they can easily access and threaten it, especially
with constant internet connections.
Using a firewall is essential for proactive protection against these risks. It helps users shield
their networks from the worst dangers.
What Does Firewall Security Do?
A firewall serves as a security barrier for a network, narrowing the attack surface to a single
point of contact. Instead of every device on a network being exposed to the internet, all traffic
must first go through the firewall. This way, the firewall can filter and block non-permitted
traffic, whether it's coming in or going out. Additionally, firewalls help create a record of
attempted connections, improving security awareness.
What Can Firewalls Protect Against?
Infiltration by Malicious Actors: Firewalls can block suspicious connections, preventing
eavesdropping and advanced persistent threats (APTs).
Parental Controls: Parents can use firewalls to block their children from accessing
explicit web content.
Workplace Web Browsing Restrictions: Employers can restrict employees from using
the company network to access certain services and websites, like social media.
Nationally Controlled Intranet: Governments can block access to certain web content
and services that conflict with national policies or values.
By allowing network owners to set specific rules, firewalls offer customizable protection for
various scenarios, enhancing overall network security.
Advantages of Using Firewall
Protection From Unauthorized Access: Firewalls can be set up to restrict incoming
traffic from particular IP addresses or networks, preventing hackers or other malicious
actors from easily accessing a network or system. Protection from unwanted access.
Prevention of Malware and Other Threats: Malware and other threat prevention:
Firewalls can be set up to block traffic linked to known malware or other security concerns,
assisting in the defense against these kinds of attacks.
Control of Network Access: By limiting access to specified individuals or groups for
particular servers or applications, firewalls can be used to restrict access to particular
network resources or services.
Monitoring of Network Activity: Firewalls can be set up to record and keep track of all
network activity.
Regulation Compliance: Many industries are bound by rules that demand the usage of
firewalls or other security measures.
Network Segmentation: By using firewalls to split up a bigger network into smaller
subnets, the attack surface is reduced and the security level is raised.
Disadvantages of Using Firewall
Complexity: Setting up and keeping up a firewall can be time-consuming and difficult,
especially for bigger networks or companies with a wide variety of users and devices.
Limited Visibility: Firewalls may not be able to identify or stop security risks that operate
at other levels, such as the application or endpoint level, because they can only observe and
manage traffic at the network level.
False Sense of Security: Some businesses may place an excessive amount of reliance on
their firewall and disregard other crucial security measures like endpoint security or
intrusion detection systems.
Limited adaptability: Because firewalls are frequently rule-based, they might not be able
to respond to fresh security threats.
Performance Impact: Network performance can be significantly impacted by firewalls,
particularly if they are set up to analyze or manage a lot of traffic.
Limited Scalability: Because firewalls are only able to secure one network, businesses that
have several networks must deploy many firewalls, which can be expensive.
Limited VPN support: Some firewalls might not allow complex VPN features like split
tunneling, which could restrict the experience of a remote worker.
Cost: Purchasing many devices or add-on features for a firewall system can be expensive,
especially for businesses.