SlideShare ist ein Scribd-Unternehmen logo
1 von 61
CompTIA Security+ Guide to
Network Security Fundamentals,
Fifth Edition
Chapter 8
Administering a Secure Network
© Cengage Learning 2015
Objectives
• List and describe the functions of common network
protocols
• Explain how network administration principles can
be applied
• Define different network applications and how they
can be secured
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
2
© Cengage Learning 2015
Common Network Protocols
• Protocols
– Rules for communication
– Essential for proper communication between
network devices
• Transmission Control Protocol/Internet Protocol
(TCP/IP)
– Most common protocol suite used for local area
networks and the Internet
– Comprises several protocols that all function
together
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
3
Itech.eduItech.edu
© Cengage Learning 2015
Common Network Protocols
• IP
– Protocol that functions primarily at Open Systems
Interconnection (OSI) Network Layer (Layer 3)
– Provides network addressing and routing
• TCP
– Transport Layer (Layer 4) protocol
– Establishes connections and ensures reliable data
transport between devices
• TCP/IP uses a four layer architecture
– Network Interface, Internet, Transport, Application
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
4
© Cengage Learning 2015
Common Network Protocols
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
5
© Cengage Learning 2015
Common Network Protocols
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
6
• Several basic TCP/IP Protocols:
– Internet Control Message Protocol (ICMP)
– Simple Network Management Protocol (SNMP)
– Domain Name System (DNS)
– File transfer and storage protocols
– NetBIOS
– Telnet
• A new and more secure version of IP is designed to
replace the current version
© Cengage Learning 2015
Internet Control Message Protocol
(ICMP)
• ICMP
– Used by devices to communicate updates or error
information to other devices
– ICMP messages are divided into two classes:
• Informational and query messages
• Error messages
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
7
© Cengage Learning 2015
Internet Control Message Protocol
(ICMP)
• ICMP message fields
– Type
• Identifies general message category
– Code
• Gives additional information about the Type field
– Checksum
• Verifies message integrity
– Message Body
• Contains information about the specific ICMP
message
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
8
© Cengage Learning 2015
Internet Control Message Protocol
(ICMP)
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
9
© Cengage Learning 2015
Internet Control Message Protocol
(ICMP)
• Attacks that that advantage of ICMP
– Network discovery
– Smurf attack
– ICMP redirect attack
– Ping of death
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
10
© Cengage Learning 2015
Simple Network Management Protocol
(SNMP)
• Used to manage network equipment and is
supported by most network equipment
manufacturers
• Allows administrators to remotely monitor, manage,
and configure network devices
• Functions by exchanging management information
between network devices
• Each SNMP-managed device has an agent or a
service
– Listens for and executes commands
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
11
© Cengage Learning 2015
Simple Network Management Protocol
(SNMP)
• Agents are password protected
– Password is known as a community string
• Security vulnerabilities were present in SMNP
versions 1 and 2
– Version 3 uses usernames and passwords along
with encryption to address vulnerabilities
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
12
© Cengage Learning 2015
Domain Name System (DNS)
• A TCP/IP protocol that maps IP addresses to their
symbolic name
• The DNS database is organized as a hierarchy
– Database consists of the name of a site and a
corresponding IP number
• Database is distributed to many different servers
on the Internet
– To prevent bottlenecking and to ensure efficiency
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
13
© Cengage Learning 2015
Domain Name System (DNS)
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
14
© Cengage Learning 2015
Domain Name System (DNS)
• DNS is often the focus of attacks
– DNS poisoning substitutes fraudulent IP address
• Can be done in local host table or external DNS
server
• Latest edition of DNS software prevents DNS
poisoning
– Attacker asks the valid DNS for a zone transfer
• A zone transfer allows attacker access to network,
hardware, and operating system information
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
15
© Cengage Learning 2015
File Transfer Protocols
• TCP/IP protocols are used for transferring files
– File transfer protocol (FTP) - used to connect to an
FTP server
– Trivial file transfer protocol (TFTP) - a “light” version
of FTP that uses a small amount of memory
• Methods for using FTP on local host computer
– From a command prompt
– Using a web browser
– Using an FTP client
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
16
© Cengage Learning 2015
File Transfer Protocols
• Using FTP behind a firewall can present challenges
– FTP uses two ports
• Port 21 is the FTP control part
• Port 20 is the data port
– FTP active mode
• Client’s firewall may sometimes drop packets on Port
20 (the data channel connection)
– FTP passive mode
• The client sends a PASV command to the command
channel and the server responds with the TCP port
number to use to establish the data channel
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
17
© Cengage Learning 2015
File Transfer Protocols
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
18
© Cengage Learning 2015
File Transfer Protocols
• FTP vulnerabilities
– Does not use encryption
– Files transferred using FTP are vulnerable to man-in-
the-middle attacks
• Secure transmission options over FTP
– Secure sockets layer (FTPS) encrypts commands
• Uses SSL or TLS to encrypt commands sent over the
control port (port 21); data port may not be encrypted
– Secure FTP (SFTP)
• Uses only a single TCP port instead of two ports
• All data and commands are encrypted
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
19
© Cengage Learning 2015
File Transfer Protocols (cont’d.)
• Secure Copy Protocol (SCP)
– An enhanced version of Remote Copy Protocol
(RCP)
– Encrypts files and commands
– File transfer cannot be interrupted and then resumed
in the same session
• Session must be completely terminated and restarted
– Found mainly on Linux and UNIX platforms
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
20
© Cengage Learning 2015
Storage Protocols
• As storage capacities have grown, most
organizations have turned to using a storage area
network (SAN)
– A dedicated network storage facility that provides
access to data storage over a high-speed network
• iSCSI (Internet Small Computer System
Interface) - an IP-based storage networking
standard for linking data storage facilities
– Can transmit data over LANs, WANs, and the
Internet
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
21
© Cengage Learning 2015
Storage Protocols
• Fibre Channel (FC) - a high-speed storage
network protocol that can transmit up to 16 Gbps
• Fibre Channel over Ethernet (FCoE)
– A variation of FC that encapsulates Fibre Channel
frames over Ethernet networks
– Allows FC to use fast Ethernet networks while
preserving the FC protocol
• FC zones - a built-in security mechanism
– There are two types:
• FC hard zone
• FC soft zone
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
22
© Cengage Learning 2015
NetBIOS
• NetBIOS (Network Basic Input/Output System)
– A transport protocol used by Microsoft Windows
systems
– Allows applications on separate computers to
communicate over a LAN
– An attacker who determines that NetBIOS is running
can use an application to gather information
regarding the network in order to design an attack
– It is recommended to disable NetBIOS or used only
if necessary on specific devices that require it
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
23
© Cengage Learning 2015
Telnet
• Telnet
– An older TCP/IP protocol for text-based
communication
– Also a terminal emulation application that runs on a
local computer
• Connects to a server on a network
– Telnet does not encrypt data and many security
weaknesses have been uncovered within the
protocol
– It is recommended that Secure Shell (SSH) be used
instead of Telnet
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
24
© Cengage Learning 2015
IPv6
• Current version of IP protocol is version 4 (IPv4)
– Developed in 1981
– Number of available IP address is limited to 4.3
billion
• This is no longer sufficient for the number of devices
that are connected to the Internet
– Has security weaknesses
• Internet Protocol version 6 (IPv6)
– Next generation of IP protocol
– Addresses weaknesses of IPv4
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
25
© Cengage Learning 2015
IPv6
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
26
© Cengage Learning 2015
IPv6
• IPv6 provides enhanced security features
– Cryptographic protocols provide secure data
communication
– New authentication headers prevent IP packets from
being altered
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
27
© Cengage Learning 2015
IPv6
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
28
© Cengage Learning 2015
Network Administration Principles
• Administering a secure network can be challenging
• Rule-based management approach
– Relies on following procedures and rules
– Procedural rules are the authoritative and prescribed
direction for conduct
• Procedural rules dictate technical rules
– Technical rules address:
• Device security
• Monitoring and analyzing logs
• Network design management
• Port security
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
29
© Cengage Learning 2015
Device Security
• Device security involves:
– Establishing a secure router configuration
– Implementing flood guards
• Secure router configuration
– Router operates at Network Layer (Layer 3)
• Forwards packets across computer networks
– Routers can perform a security function
• Can be configured to filter out specific types of
network traffic
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
30
© Cengage Learning 2015
Device Security
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
31
© Cengage Learning 2015
Device Security
• Flood guard
– Protects against denial of service (DoS) attacks
– SYN flood attack
• A type of DoS attack that takes advantage of the
procedures for initiating a session
– A flood guard controls a device’s tolerance for
unanswered service requests
• Administrator can set a maximum number of
“developing” connections
– Commonly found on firewalls, IDSs, and IPSs
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
32
© Cengage Learning 2015
Monitoring and Analyzing Logs
• Security logs
– Can reveal types of attacks that are being directed at
the network and if attacks were successful
• Access logs
– Provide details regarding requests for specific files
• Audit logs
– Used to record which user performed an action
• Event logs
– Document any unsuccessful events and the most
significant successful events
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
33
© Cengage Learning 2015
Monitoring and Analyzing Logs
• A routine review of logs helps to:
– Identify security incidents
– Policy violations
– Fraudulent activity
– Operational problems
• Logs can be useful for:
– Performing auditing analysis
– Supporting the organization’s internal investigations
– Identifying operational trends and long-term
problems
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
34
© Cengage Learning 2015
Monitoring and Analyzing Logs
• Logs can provide documentation that the
organization is complying with laws and regulatory
requirements
• Firewall log items to be examined
– IP addresses rejected and dropped
– Probes to ports that have no application services on
them
– Source-routed packets
– Suspicious outbound connections
– Unsuccessful logins
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
35
© Cengage Learning 2015
Monitoring and Analyzing Logs
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
36
© Cengage Learning 2015
Monitoring and Analyzing Logs
• Problems with log management:
– Multiple devices generating logs
– Very large volumes of data
– Different log formats
• A solution to log management is to use a
centralized device log analyzer
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
37
© Cengage Learning 2015
Network Design Management
• Several network design management principles
should be followed to ensure a secure network
• Network separation
– Provides separation between different parts of the
network
– Example: order entry network segment cannot
access the network that controls heating and cooling
• Option to accomplish network separation
– Physically separate users by connecting them to
different switches and routers
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
38
© Cengage Learning 2015
Network Design Management
• Loop protection
– Refer to Figure 8-7 for a description of a broadcast
storm
– Host Z wants to send frames to Host X
– Switch A floods network with the packet
– Packet travels down the network segments to the
Switches B and C
– Switches B and C add Host Z to their lookup tables
– Both switches flood Segment 2 looking for Host X
• They receive each other’s packets and flood them
back out again
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
39
© Cengage Learning 2015
Network Design Management
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
40
© Cengage Learning 2015
Network Design Management
• Loop protection can prevent broadcast storms
– Uses IEEE 802.1d spanning tree algorithm (STA)
– Determines which switch has multiple ways to
communicate with host
– Determines best path and blocks other paths
• Virtual LAN (VLAN) management
– Network may be segmented into logical groups of
physical devices through VLAN
– Scattered users may be logically grouped together:
• Regardless of which switch they are attached to
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
41
© Cengage Learning 2015
Network Design Management
• General principles for managing VLANs
– Configure empty switch ports to connect to an
unused VLAN
– Change any default VLAN names
– Configure the ports on the switches that pass tagged
VLAN packets to explicitly forward specific tags
– Configure VLANs so that public devices are not on a
private VLAN
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
42
© Cengage Learning 2015
Port Security
• Disabling unused interfaces
– Turn off ports not required on a network device that
are not required
– A switch or router without port security allows
attackers to connect to unused ports and attack the
network
– All interfaces should be secured before switch is
deployed
– The network administrator should issue shutdown
command to each unused port
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
43
© Cengage Learning 2015
Port Security
• MAC limiting and filtering
– Filters and limits the number of media access control
(MAC) addresses allowed on a single port
– Port can be set to limit of 1
– Specific MAC address can be assigned to a port
• Enables only single authorized host to connect
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
44
© Cengage Learning 2015
Port Security
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
45
© Cengage Learning 2015
Port Security
• IEEE 802.1x
– Standard that provides the highest degree of port
security
– Implements port-based authentication
– Blocks all traffic on a port-by-port basis:
• Until client is authenticated
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
46
© Cengage Learning 2015
Port Security
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
47
© Cengage Learning 2015
Securing Network Applications and
Platforms
• Several network applications and platforms require
special security considerations:
– IP telephony
– Virtualization
– Cloud computing
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
48
© Cengage Learning 2015
IP Telephony
• A shift to an all digital technology infrastructure is
underway
– Converges voice and data traffic over a single IP
network
– IP telephony adds digital voice clients and new voice
applications to a data based network
• An IP telephony application can be easily
developed that personalizes the treatment of
incoming calls
– Calls can be selectively forwarded or blocked
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
49
© Cengage Learning 2015
IP Telephony
• IP telephony advantages
– Cost savings
– Simplified management
– Application development
– Reduced infrastructure requirements
– Reduced regulatory requirements
– Increased user productivity
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
50
© Cengage Learning 2015
IP Telephony
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
51
© Cengage Learning 2015
Virtualization
• Virtualization
– A means of managing and presenting computer
resources without regard to physical layout or
location
• Host virtualization
– An entire operating system environment is simulated
– Virtual machine - a simulated software-based
emulation of a computer
– The host system runs a hypervisor that manages the
virtual operating systems and supports one or more
guest systems
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
52
© Cengage Learning 2015
Virtualization
• Virtualization advantages
– New virtual server machines can be made available
(host availability) and resources can easily be
expanded or contracted as needed (host elasticity)
– Can reduce costs
• Fewer physical computers must be purchased and
maintained
– Can provided uninterrupted server access to users
• Supports live migration which allows a virtual machine
to be moved to a different physical computer with no
impact to users
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
53
© Cengage Learning 2015
Virtualization
• Virtualization advantages (cont’d.)
– Test latest patches by downloading on a virtual
machine before installing on production computers
– A snapshot of a particular state of a virtual machine
can be saved for later use
– Testing the existing security configuration (security
control testing) can be performed using a
simulated network environment
– A suspicious program can be loaded into an isolated
virtual machine and executed (sandboxing)
• If malware, only the virtual machine will be impacted
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
54
© Cengage Learning 2015
Virtualization
• Security for virtualized environments:
– A guest OS that has remained dormant may not
contain the latest patches and security updates
– Not all hypervisors have the necessary security
controls to keep out attackers
– Existing security tools were designed for single
physical servers and do not always adapt well to
multiple virtual machines
– Virtual machines must be protected from outside
network and other virtual machines on the same
computer
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
55
© Cengage Learning 2015
Cloud Computing
• Cloud computing
– A model for enabling convenient, on-demand
network access to a shared pool of configurable
computing resources
– It is a pay-per-use computing model
• Customers pay for only the resources they need
• Types of clouds
– Public cloud
– Community cloud
– Private cloud
– Hybrid cloud
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
56
© Cengage Learning 2015
Cloud Computing
• Three service models of cloud computing
– Software as a Service (SaaS)
• Vendor provides access to the vendor’s software
applications running on a cloud infrastructure
– Platform as a Service (PaaS)
• Consumers install and run their own specialized
applications on the cloud computing network
– Infrastructure as a Service (IaaS)
• Vendor allows customers to deploy and run their own
software, including OSs and applications
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
57
© Cengage Learning 2015
Cloud Computing
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
58
© Cengage Learning 2015
Cloud Computing
• Cloud computing security challenges
– Cloud provider must guarantee means to approve
authorized users and deny imposters
– Transmissions from the cloud must be protected
– Customers’ data must be isolated from other
customers
– The highest level of application availability and
security must be maintained
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
59
© Cengage Learning 2015
Summary
• TCP/IP is the most common protocol for LANs and
the Internet
• Protocols for transferring files
– FTP, FTPS, SFTP, SCP
• Storage area network (SAN) is a dedicated network
storage facility that provides access to data storage
over a high-speed network
• Router configuration must provide a secure
network environment
• Flood guard defends against denial-of-service
attacksCompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
60
© Cengage Learning 2015
Summary
• Networks can be configured to provide separation
and increased security
• Securing ports is an important step in network
management
– Unused ports should be disabled
• New network applications that have special
security considerations
– IP telephony
– Virtualization
– Cloud computing
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
61

Weitere ähnliche Inhalte

Was ist angesagt?

Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPointAmy McMullin
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 PresentationAmy McMullin
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewDCPS
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 ReviewAmy McMullin
 
A+ Chapter 5 Review
A+ Chapter 5 ReviewA+ Chapter 5 Review
A+ Chapter 5 ReviewAmy McMullin
 
A+ Chapter 4 Review
A+ Chapter 4 ReviewA+ Chapter 4 Review
A+ Chapter 4 ReviewAmy McMullin
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ GuideSmithjulia33
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
Module 7 (printing) Review
Module 7 (printing) ReviewModule 7 (printing) Review
Module 7 (printing) ReviewAmy McMullin
 
Рабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC LabРабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC LabUC2
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglyAlgoSec
 
My Final Year Project PPT
My Final Year Project PPTMy Final Year Project PPT
My Final Year Project PPTMOHAMMEDELALAM1
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewali raza
 

Was ist angesagt? (20)

hacker culture
hacker culturehacker culture
hacker culture
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPoint
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 Review
 
A+ Chapter 5 Review
A+ Chapter 5 ReviewA+ Chapter 5 Review
A+ Chapter 5 Review
 
A+ Chapter 4 Review
A+ Chapter 4 ReviewA+ Chapter 4 Review
A+ Chapter 4 Review
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ Guide
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
Module 7 (printing) Review
Module 7 (printing) ReviewModule 7 (printing) Review
Module 7 (printing) Review
 
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
Wireless Network Security Palo Alto Networks / Aruba Networks IntegrationWireless Network Security Palo Alto Networks / Aruba Networks Integration
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
 
Рабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC LabРабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC Lab
 
Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick Start
 
checkpoint
checkpointcheckpoint
checkpoint
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the Ugly
 
My Final Year Project PPT
My Final Year Project PPTMy Final Year Project PPT
My Final Year Project PPT
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 

Andere mochten auch

Andere mochten auch (11)

Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Ppt ch01
Ppt ch01Ppt ch01
Ppt ch01
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
How to hack the web
How to hack the webHow to hack the web
How to hack the web
 
stephen_jackson_Security+
stephen_jackson_Security+stephen_jackson_Security+
stephen_jackson_Security+
 
Need Of Enterprise Integration
Need Of Enterprise IntegrationNeed Of Enterprise Integration
Need Of Enterprise Integration
 
Computer Security Test
Computer Security TestComputer Security Test
Computer Security Test
 
Nice to have, need to know computrain
Nice to have, need to know computrainNice to have, need to know computrain
Nice to have, need to know computrain
 
Ch01
Ch01Ch01
Ch01
 
Access Controls
Access ControlsAccess Controls
Access Controls
 

Ähnlich wie CompTIA Security+ Guide to Network Protocols and Security

Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5APSU
 
The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) M Shamim Iqbal
 
Tcp ip management & security
Tcp ip management & securityTcp ip management & security
Tcp ip management & securityAsif Qureshi
 
Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Dr. Ahmed Al Zaidy
 
testppt ch01(1)
testppt ch01(1)testppt ch01(1)
testppt ch01(1)ryaekle
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
Presentation on TCP\IP protocols
Presentation on TCP\IP protocolsPresentation on TCP\IP protocols
Presentation on TCP\IP protocolssabanoor40
 
Irati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA WorkshopIrati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA WorkshopEleni Trouva
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraEmbarcados
 
Network protocol
Network protocolNetwork protocol
Network protocolOnline
 
Chapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.pptChapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.ppthoangdinhhanh88
 

Ähnlich wie CompTIA Security+ Guide to Network Protocols and Security (20)

Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP)
 
Tcp ip management & security
Tcp ip management & securityTcp ip management & security
Tcp ip management & security
 
Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network
 
9780840024220 ppt ch08
9780840024220 ppt ch089780840024220 ppt ch08
9780840024220 ppt ch08
 
testppt ch01(1)
testppt ch01(1)testppt ch01(1)
testppt ch01(1)
 
Web Engineering Lecture2
Web Engineering Lecture2 Web Engineering Lecture2
Web Engineering Lecture2
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Overview of tcp ip
Overview of tcp ipOverview of tcp ip
Overview of tcp ip
 
Chapter 6 - Networking
Chapter 6 - NetworkingChapter 6 - Networking
Chapter 6 - Networking
 
tcp.pptx
tcp.pptxtcp.pptx
tcp.pptx
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Presentation on TCP\IP protocols
Presentation on TCP\IP protocolsPresentation on TCP\IP protocols
Presentation on TCP\IP protocols
 
Irati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA WorkshopIrati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA Workshop
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP segura
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Chapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.pptChapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.ppt
 

Kürzlich hochgeladen

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Kürzlich hochgeladen (20)

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 

CompTIA Security+ Guide to Network Protocols and Security

  • 1. CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 8 Administering a Secure Network
  • 2. © Cengage Learning 2015 Objectives • List and describe the functions of common network protocols • Explain how network administration principles can be applied • Define different network applications and how they can be secured CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 2
  • 3. © Cengage Learning 2015 Common Network Protocols • Protocols – Rules for communication – Essential for proper communication between network devices • Transmission Control Protocol/Internet Protocol (TCP/IP) – Most common protocol suite used for local area networks and the Internet – Comprises several protocols that all function together CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 3 Itech.eduItech.edu
  • 4. © Cengage Learning 2015 Common Network Protocols • IP – Protocol that functions primarily at Open Systems Interconnection (OSI) Network Layer (Layer 3) – Provides network addressing and routing • TCP – Transport Layer (Layer 4) protocol – Establishes connections and ensures reliable data transport between devices • TCP/IP uses a four layer architecture – Network Interface, Internet, Transport, Application CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 4
  • 5. © Cengage Learning 2015 Common Network Protocols CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 5
  • 6. © Cengage Learning 2015 Common Network Protocols CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 6 • Several basic TCP/IP Protocols: – Internet Control Message Protocol (ICMP) – Simple Network Management Protocol (SNMP) – Domain Name System (DNS) – File transfer and storage protocols – NetBIOS – Telnet • A new and more secure version of IP is designed to replace the current version
  • 7. © Cengage Learning 2015 Internet Control Message Protocol (ICMP) • ICMP – Used by devices to communicate updates or error information to other devices – ICMP messages are divided into two classes: • Informational and query messages • Error messages CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 7
  • 8. © Cengage Learning 2015 Internet Control Message Protocol (ICMP) • ICMP message fields – Type • Identifies general message category – Code • Gives additional information about the Type field – Checksum • Verifies message integrity – Message Body • Contains information about the specific ICMP message CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 8
  • 9. © Cengage Learning 2015 Internet Control Message Protocol (ICMP) CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 9
  • 10. © Cengage Learning 2015 Internet Control Message Protocol (ICMP) • Attacks that that advantage of ICMP – Network discovery – Smurf attack – ICMP redirect attack – Ping of death CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 10
  • 11. © Cengage Learning 2015 Simple Network Management Protocol (SNMP) • Used to manage network equipment and is supported by most network equipment manufacturers • Allows administrators to remotely monitor, manage, and configure network devices • Functions by exchanging management information between network devices • Each SNMP-managed device has an agent or a service – Listens for and executes commands CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 11
  • 12. © Cengage Learning 2015 Simple Network Management Protocol (SNMP) • Agents are password protected – Password is known as a community string • Security vulnerabilities were present in SMNP versions 1 and 2 – Version 3 uses usernames and passwords along with encryption to address vulnerabilities CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 12
  • 13. © Cengage Learning 2015 Domain Name System (DNS) • A TCP/IP protocol that maps IP addresses to their symbolic name • The DNS database is organized as a hierarchy – Database consists of the name of a site and a corresponding IP number • Database is distributed to many different servers on the Internet – To prevent bottlenecking and to ensure efficiency CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 13
  • 14. © Cengage Learning 2015 Domain Name System (DNS) CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 14
  • 15. © Cengage Learning 2015 Domain Name System (DNS) • DNS is often the focus of attacks – DNS poisoning substitutes fraudulent IP address • Can be done in local host table or external DNS server • Latest edition of DNS software prevents DNS poisoning – Attacker asks the valid DNS for a zone transfer • A zone transfer allows attacker access to network, hardware, and operating system information CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 15
  • 16. © Cengage Learning 2015 File Transfer Protocols • TCP/IP protocols are used for transferring files – File transfer protocol (FTP) - used to connect to an FTP server – Trivial file transfer protocol (TFTP) - a “light” version of FTP that uses a small amount of memory • Methods for using FTP on local host computer – From a command prompt – Using a web browser – Using an FTP client CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 16
  • 17. © Cengage Learning 2015 File Transfer Protocols • Using FTP behind a firewall can present challenges – FTP uses two ports • Port 21 is the FTP control part • Port 20 is the data port – FTP active mode • Client’s firewall may sometimes drop packets on Port 20 (the data channel connection) – FTP passive mode • The client sends a PASV command to the command channel and the server responds with the TCP port number to use to establish the data channel CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 17
  • 18. © Cengage Learning 2015 File Transfer Protocols CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 18
  • 19. © Cengage Learning 2015 File Transfer Protocols • FTP vulnerabilities – Does not use encryption – Files transferred using FTP are vulnerable to man-in- the-middle attacks • Secure transmission options over FTP – Secure sockets layer (FTPS) encrypts commands • Uses SSL or TLS to encrypt commands sent over the control port (port 21); data port may not be encrypted – Secure FTP (SFTP) • Uses only a single TCP port instead of two ports • All data and commands are encrypted CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 19
  • 20. © Cengage Learning 2015 File Transfer Protocols (cont’d.) • Secure Copy Protocol (SCP) – An enhanced version of Remote Copy Protocol (RCP) – Encrypts files and commands – File transfer cannot be interrupted and then resumed in the same session • Session must be completely terminated and restarted – Found mainly on Linux and UNIX platforms CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 20
  • 21. © Cengage Learning 2015 Storage Protocols • As storage capacities have grown, most organizations have turned to using a storage area network (SAN) – A dedicated network storage facility that provides access to data storage over a high-speed network • iSCSI (Internet Small Computer System Interface) - an IP-based storage networking standard for linking data storage facilities – Can transmit data over LANs, WANs, and the Internet CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 21
  • 22. © Cengage Learning 2015 Storage Protocols • Fibre Channel (FC) - a high-speed storage network protocol that can transmit up to 16 Gbps • Fibre Channel over Ethernet (FCoE) – A variation of FC that encapsulates Fibre Channel frames over Ethernet networks – Allows FC to use fast Ethernet networks while preserving the FC protocol • FC zones - a built-in security mechanism – There are two types: • FC hard zone • FC soft zone CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 22
  • 23. © Cengage Learning 2015 NetBIOS • NetBIOS (Network Basic Input/Output System) – A transport protocol used by Microsoft Windows systems – Allows applications on separate computers to communicate over a LAN – An attacker who determines that NetBIOS is running can use an application to gather information regarding the network in order to design an attack – It is recommended to disable NetBIOS or used only if necessary on specific devices that require it CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 23
  • 24. © Cengage Learning 2015 Telnet • Telnet – An older TCP/IP protocol for text-based communication – Also a terminal emulation application that runs on a local computer • Connects to a server on a network – Telnet does not encrypt data and many security weaknesses have been uncovered within the protocol – It is recommended that Secure Shell (SSH) be used instead of Telnet CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 24
  • 25. © Cengage Learning 2015 IPv6 • Current version of IP protocol is version 4 (IPv4) – Developed in 1981 – Number of available IP address is limited to 4.3 billion • This is no longer sufficient for the number of devices that are connected to the Internet – Has security weaknesses • Internet Protocol version 6 (IPv6) – Next generation of IP protocol – Addresses weaknesses of IPv4 CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 25
  • 26. © Cengage Learning 2015 IPv6 CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 26
  • 27. © Cengage Learning 2015 IPv6 • IPv6 provides enhanced security features – Cryptographic protocols provide secure data communication – New authentication headers prevent IP packets from being altered CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 27
  • 28. © Cengage Learning 2015 IPv6 CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 28
  • 29. © Cengage Learning 2015 Network Administration Principles • Administering a secure network can be challenging • Rule-based management approach – Relies on following procedures and rules – Procedural rules are the authoritative and prescribed direction for conduct • Procedural rules dictate technical rules – Technical rules address: • Device security • Monitoring and analyzing logs • Network design management • Port security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 29
  • 30. © Cengage Learning 2015 Device Security • Device security involves: – Establishing a secure router configuration – Implementing flood guards • Secure router configuration – Router operates at Network Layer (Layer 3) • Forwards packets across computer networks – Routers can perform a security function • Can be configured to filter out specific types of network traffic CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 30
  • 31. © Cengage Learning 2015 Device Security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 31
  • 32. © Cengage Learning 2015 Device Security • Flood guard – Protects against denial of service (DoS) attacks – SYN flood attack • A type of DoS attack that takes advantage of the procedures for initiating a session – A flood guard controls a device’s tolerance for unanswered service requests • Administrator can set a maximum number of “developing” connections – Commonly found on firewalls, IDSs, and IPSs CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 32
  • 33. © Cengage Learning 2015 Monitoring and Analyzing Logs • Security logs – Can reveal types of attacks that are being directed at the network and if attacks were successful • Access logs – Provide details regarding requests for specific files • Audit logs – Used to record which user performed an action • Event logs – Document any unsuccessful events and the most significant successful events CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 33
  • 34. © Cengage Learning 2015 Monitoring and Analyzing Logs • A routine review of logs helps to: – Identify security incidents – Policy violations – Fraudulent activity – Operational problems • Logs can be useful for: – Performing auditing analysis – Supporting the organization’s internal investigations – Identifying operational trends and long-term problems CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 34
  • 35. © Cengage Learning 2015 Monitoring and Analyzing Logs • Logs can provide documentation that the organization is complying with laws and regulatory requirements • Firewall log items to be examined – IP addresses rejected and dropped – Probes to ports that have no application services on them – Source-routed packets – Suspicious outbound connections – Unsuccessful logins CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 35
  • 36. © Cengage Learning 2015 Monitoring and Analyzing Logs CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 36
  • 37. © Cengage Learning 2015 Monitoring and Analyzing Logs • Problems with log management: – Multiple devices generating logs – Very large volumes of data – Different log formats • A solution to log management is to use a centralized device log analyzer CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 37
  • 38. © Cengage Learning 2015 Network Design Management • Several network design management principles should be followed to ensure a secure network • Network separation – Provides separation between different parts of the network – Example: order entry network segment cannot access the network that controls heating and cooling • Option to accomplish network separation – Physically separate users by connecting them to different switches and routers CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 38
  • 39. © Cengage Learning 2015 Network Design Management • Loop protection – Refer to Figure 8-7 for a description of a broadcast storm – Host Z wants to send frames to Host X – Switch A floods network with the packet – Packet travels down the network segments to the Switches B and C – Switches B and C add Host Z to their lookup tables – Both switches flood Segment 2 looking for Host X • They receive each other’s packets and flood them back out again CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 39
  • 40. © Cengage Learning 2015 Network Design Management CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 40
  • 41. © Cengage Learning 2015 Network Design Management • Loop protection can prevent broadcast storms – Uses IEEE 802.1d spanning tree algorithm (STA) – Determines which switch has multiple ways to communicate with host – Determines best path and blocks other paths • Virtual LAN (VLAN) management – Network may be segmented into logical groups of physical devices through VLAN – Scattered users may be logically grouped together: • Regardless of which switch they are attached to CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 41
  • 42. © Cengage Learning 2015 Network Design Management • General principles for managing VLANs – Configure empty switch ports to connect to an unused VLAN – Change any default VLAN names – Configure the ports on the switches that pass tagged VLAN packets to explicitly forward specific tags – Configure VLANs so that public devices are not on a private VLAN CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 42
  • 43. © Cengage Learning 2015 Port Security • Disabling unused interfaces – Turn off ports not required on a network device that are not required – A switch or router without port security allows attackers to connect to unused ports and attack the network – All interfaces should be secured before switch is deployed – The network administrator should issue shutdown command to each unused port CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 43
  • 44. © Cengage Learning 2015 Port Security • MAC limiting and filtering – Filters and limits the number of media access control (MAC) addresses allowed on a single port – Port can be set to limit of 1 – Specific MAC address can be assigned to a port • Enables only single authorized host to connect CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 44
  • 45. © Cengage Learning 2015 Port Security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 45
  • 46. © Cengage Learning 2015 Port Security • IEEE 802.1x – Standard that provides the highest degree of port security – Implements port-based authentication – Blocks all traffic on a port-by-port basis: • Until client is authenticated CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 46
  • 47. © Cengage Learning 2015 Port Security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 47
  • 48. © Cengage Learning 2015 Securing Network Applications and Platforms • Several network applications and platforms require special security considerations: – IP telephony – Virtualization – Cloud computing CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 48
  • 49. © Cengage Learning 2015 IP Telephony • A shift to an all digital technology infrastructure is underway – Converges voice and data traffic over a single IP network – IP telephony adds digital voice clients and new voice applications to a data based network • An IP telephony application can be easily developed that personalizes the treatment of incoming calls – Calls can be selectively forwarded or blocked CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 49
  • 50. © Cengage Learning 2015 IP Telephony • IP telephony advantages – Cost savings – Simplified management – Application development – Reduced infrastructure requirements – Reduced regulatory requirements – Increased user productivity CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 50
  • 51. © Cengage Learning 2015 IP Telephony CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 51
  • 52. © Cengage Learning 2015 Virtualization • Virtualization – A means of managing and presenting computer resources without regard to physical layout or location • Host virtualization – An entire operating system environment is simulated – Virtual machine - a simulated software-based emulation of a computer – The host system runs a hypervisor that manages the virtual operating systems and supports one or more guest systems CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 52
  • 53. © Cengage Learning 2015 Virtualization • Virtualization advantages – New virtual server machines can be made available (host availability) and resources can easily be expanded or contracted as needed (host elasticity) – Can reduce costs • Fewer physical computers must be purchased and maintained – Can provided uninterrupted server access to users • Supports live migration which allows a virtual machine to be moved to a different physical computer with no impact to users CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 53
  • 54. © Cengage Learning 2015 Virtualization • Virtualization advantages (cont’d.) – Test latest patches by downloading on a virtual machine before installing on production computers – A snapshot of a particular state of a virtual machine can be saved for later use – Testing the existing security configuration (security control testing) can be performed using a simulated network environment – A suspicious program can be loaded into an isolated virtual machine and executed (sandboxing) • If malware, only the virtual machine will be impacted CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 54
  • 55. © Cengage Learning 2015 Virtualization • Security for virtualized environments: – A guest OS that has remained dormant may not contain the latest patches and security updates – Not all hypervisors have the necessary security controls to keep out attackers – Existing security tools were designed for single physical servers and do not always adapt well to multiple virtual machines – Virtual machines must be protected from outside network and other virtual machines on the same computer CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 55
  • 56. © Cengage Learning 2015 Cloud Computing • Cloud computing – A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources – It is a pay-per-use computing model • Customers pay for only the resources they need • Types of clouds – Public cloud – Community cloud – Private cloud – Hybrid cloud CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 56
  • 57. © Cengage Learning 2015 Cloud Computing • Three service models of cloud computing – Software as a Service (SaaS) • Vendor provides access to the vendor’s software applications running on a cloud infrastructure – Platform as a Service (PaaS) • Consumers install and run their own specialized applications on the cloud computing network – Infrastructure as a Service (IaaS) • Vendor allows customers to deploy and run their own software, including OSs and applications CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 57
  • 58. © Cengage Learning 2015 Cloud Computing CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 58
  • 59. © Cengage Learning 2015 Cloud Computing • Cloud computing security challenges – Cloud provider must guarantee means to approve authorized users and deny imposters – Transmissions from the cloud must be protected – Customers’ data must be isolated from other customers – The highest level of application availability and security must be maintained CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 59
  • 60. © Cengage Learning 2015 Summary • TCP/IP is the most common protocol for LANs and the Internet • Protocols for transferring files – FTP, FTPS, SFTP, SCP • Storage area network (SAN) is a dedicated network storage facility that provides access to data storage over a high-speed network • Router configuration must provide a secure network environment • Flood guard defends against denial-of-service attacksCompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 60
  • 61. © Cengage Learning 2015 Summary • Networks can be configured to provide separation and increased security • Securing ports is an important step in network management – Unused ports should be disabled • New network applications that have special security considerations – IP telephony – Virtualization – Cloud computing CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 61

Hinweis der Redaktion

  1. CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 8 Administering a Secure Network
  2. Objectives List and describe the functions of common network protocols Explain how network administration principles can be applied Define different network applications and how they can be secured
  3. Common Network Protocols Protocols Rules for communication Essential for proper communication between network devices Transmission Control Protocol/Internet Protocol (TCP/IP) Most common protocol suite used for local area networks and the Internet Comprises several protocols that all function together
  4. Common Network Protocols IP Protocol that functions primarily at Open Systems Interconnection (OSI) Network Layer (Layer 3) Provides network addressing and routing TCP Transport Layer (Layer 4) protocol Establishes connections and ensures reliable data transport between devices TCP/IP uses a four layer architecture Network Interface, Internet, Transport, Application
  5. Common Network Protocols Figure 8-1 OSI model vs. TCP/IP model
  6. Common Network Protocols Several basic TCP/IP Protocols: Internet Control Message Protocol (ICMP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) File transfer and storage protocols NetBIOS Telnet A new and more secure version of IP is designed to replace the current version
  7. Internet Control Message Protocol (ICMP) ICMP Used by devices to communicate updates or error information to other devices ICMP messages are divided into two classes: Informational and query messages Error messages
  8. Internet Control Message Protocol (ICMP) ICMP message fields Type Identifies general message category Code Gives additional information about the Type field Checksum Verifies message integrity Message Body Contains information about the specific ICMP message
  9. Internet Control Message Protocol (ICMP) Table 8-1 Common ICMP code values for Type 3, Destination Unreachable
  10. Internet Control Message Protocol (ICMP) Attacks that that advantage of ICMP Network discovery Smurf attack ICMP redirect attack Ping of death
  11. Simple Network Management Protocol (SNMP) Used to manage network equipment and is supported by most network equipment manufacturers Allows administrators to remotely monitor, manage, and configure network devices Functions by exchanging management information between network devices Each SNMP-managed device has an agent or a service Listens for and executes commands
  12. Simple Network Management Protocol (SNMP) Agents are password protected Password is known as a community string Security vulnerabilities were present in SMNP versions 1 and 2 Version 3 uses usernames and passwords along with encryption to address vulnerabilities
  13. Domain Name System (DNS) A TCP/IP protocol that maps IP addresses to their symbolic name The DNS database is organized as a hierarchy Database consists of the name of a site and a corresponding IP number Database is distributed to many different servers on the Internet To prevent bottlenecking and to ensure efficiency
  14. Domain Name System (DNS) Figure 8-2 DNS look up
  15. Domain Name System (DNS) DNS is often the focus of attacks DNS poisoning substitutes fraudulent IP address Can be done in local host table or external DNS server Latest edition of DNS software prevents DNS poisoning Attacker asks the valid DNS for a zone transfer A zone transfer allows attacker access to network, hardware, and operating system information
  16. File Transfer Protocols TCP/IP protocols are used for transferring files File transfer protocol (FTP) - used to connect to an FTP server Trivial file transfer protocol (TFTP) - a “light” version of FTP that uses a small amount of memory Methods for using FTP on local host computer From a command prompt Using a web browser Using an FTP client
  17. File Transfer Protocols Using FTP behind a firewall can present challenges FTP uses two ports Port 21 is the FTP control part Port 20 is the data port FTP active mode Client’s firewall may sometimes drop packets on Port 20 (the data channel connection) FTP passive mode The client sends a PASV command to the command channel and the server responds with the TCP port number to use to establish the data channel
  18. File Transfer Protocols Figure 8-3 FTP client
  19. File Transfer Protocols FTP vulnerabilities Does not use encryption Files transferred using FTP are vulnerable to man-in-the-middle attacks Secure transmission options over FTP Secure sockets layer (FTPS) encrypts commands Uses SSL or TLS to encrypt commands sent over the control port (port 21); data port may not be encrypted Secure FTP (SFTP) Uses only a single TCP port instead of two ports All data and commands are encrypted
  20. File Transfer Protocols (cont’d.) Secure Copy Protocol (SCP) An enhanced version of Remote Copy Protocol (RCP) Encrypts files and commands File transfer cannot be interrupted and then resumed in the same session Session must be completely terminated and restarted Found mainly on Linux and UNIX platforms
  21. Storage Protocols As storage capacities have grown, most organizations have turned to using a storage area network (SAN) A dedicated network storage facility that provides access to data storage over a high-speed network iSCSI (Internet Small Computer System Interface) - an IP-based storage networking standard for linking data storage facilities Can transmit data over LANs, WANs, and the Internet
  22. Storage Protocols Fibre Channel (FC) - a high-speed storage network protocol that can transmit up to 16 Gbps Fibre Channel over Ethernet (FCoE) A variation of FC that encapsulates Fibre Channel frames over Ethernet networks Allows FC to use fast Ethernet networks while preserving the FC protocol FC zones - a built-in security mechanism There are two types: FC hard zone FC soft zone
  23. NetBIOS NetBIOS (Network Basic Input/Output System) A transport protocol used by Microsoft Windows systems Allows applications on separate computers to communicate over a LAN An attacker who determines that NetBIOS is running can use an application to gather information regarding the network in order to design an attack It is recommended to disable NetBIOS or used only if necessary on specific devices that require it
  24. Telnet Telnet An older TCP/IP protocol for text-based communication Also a terminal emulation application that runs on a local computer Connects to a server on a network Telnet does not encrypt data and many security weaknesses have been uncovered within the protocol It is recommended that Secure Shell (SSH) be used instead of Telnet
  25. IPv6 Current version of IP protocol is version 4 (IPv4) Developed in 1981 Number of available IP address is limited to 4.3 billion This is no longer sufficient for the number of devices that are connected to the Internet Has security weaknesses Internet Protocol version 6 (IPv6) Next generation of IP protocol Addresses weaknesses of IPv4
  26. IPv6 Figure 8-5 IPv4 and IPv6 headers
  27. IPv6 IPv6 provides enhanced security features Cryptographic protocols provide secure data communication New authentication headers prevent IP packets from being altered
  28. IPv6 Table 8-3 Comparison of IPv4 and IPv6 headers
  29. Network Administration Principles Administering a secure network can be challenging Rule-based management approach Relies on following procedures and rules Procedural rules are the authoritative and prescribed direction for conduct Procedural rules dictate technical rules Technical rules address: Device security Monitoring and analyzing logs Network design management Port security
  30. Device Security Device security involves: Establishing a secure router configuration Implementing flood guards Secure router configuration Router operates at Network Layer (Layer 3) Forwards packets across computer networks Routers can perform a security function Can be configured to filter out specific types of network traffic
  31. Device Security Table 8-4 Secure router configuration tasks
  32. Device Security Flood guard Protects against denial of service (DoS) attacks SYN flood attack A type of DoS attack that takes advantage of the procedures for initiating a session A flood guard controls a device’s tolerance for unanswered service requests Administrator can set a maximum number of “developing” connections Commonly found on firewalls, IDSs, and IPSs
  33. Monitoring and Analyzing Logs Security logs Can reveal types of attacks that are being directed at the network and if attacks were successful Access logs Provide details regarding requests for specific files Audit logs Used to record which user performed an action Event logs Document any unsuccessful events and the most significant successful events
  34. Monitoring and Analyzing Logs A routine review of logs helps to: Identify security incidents Policy violations Fraudulent activity Operational problems Logs can be useful for: Performing auditing analysis Supporting the organization’s internal investigations Identifying operational trends and long-term problems
  35. Monitoring and Analyzing Logs Logs can provide documentation that the organization is complying with laws and regulatory requirements Firewall log items to be examined IP addresses rejected and dropped Probes to ports that have no application services on them Source-routed packets Suspicious outbound connections Unsuccessful logins
  36. Monitoring and Analyzing Logs Table 8-5 Device logs with beneficial security data
  37. Monitoring and Analyzing Logs Problems with log management: Multiple devices generating logs Very large volumes of data Different log formats A solution to log management is to use a centralized device log analyzer
  38. Network Design Management Several network design management principles should be followed to ensure a secure network Network separation Provides separation between different parts of the network Example: order entry network segment cannot access the network that controls heating and cooling Option to accomplish network separation Physically separate users by connecting them to different switches and routers
  39. Network Design Management Loop protection Refer to Figure 8-7 for a description of a broadcast storm Host Z wants to send frames to Host X Switch A floods network with the packet Packet travels down the network segments to the Switches B and C Switches B and C add Host Z to their lookup tables Both switches flood Segment 2 looking for Host X They receive each other’s packets and flood them back out again
  40. Network Design Management Figure 8-7 Broadcast storm
  41. Network Design Management Loop protection can prevent broadcast storms Uses IEEE 802.1d spanning tree algorithm (STA) Determines which switch has multiple ways to communicate with host Determines best path and blocks other paths Virtual LAN (VLAN) management Network may be segmented into logical groups of physical devices through VLAN Scattered users may be logically grouped together: Regardless of which switch they are attached to
  42. Network Design Management General principles for managing VLANs Configure empty switch ports to connect to an unused VLAN Change any default VLAN names Configure the ports on the switches that pass tagged VLAN packets to explicitly forward specific tags Configure VLANs so that public devices are not on a private VLAN
  43. Port Security Disabling unused interfaces Turn off ports not required on a network device that are not required A switch or router without port security allows attackers to connect to unused ports and attack the network All interfaces should be secured before switch is deployed The network administrator should issue shutdown command to each unused port
  44. Port Security MAC limiting and filtering Filters and limits the number of media access control (MAC) addresses allowed on a single port Port can be set to limit of 1 Specific MAC address can be assigned to a port Enables only single authorized host to connect
  45. Port Security Table 8-6 MAC limiting and filtering configuration options
  46. Port Security IEEE 802.1x Standard that provides the highest degree of port security Implements port-based authentication Blocks all traffic on a port-by-port basis: Until client is authenticated
  47. Port Security Figure 8-8 IEEE 802.1x process
  48. Securing Network Applications and Platforms Several network applications and platforms require special security considerations: IP telephony Virtualization Cloud computing
  49. IP Telephony A shift to an all digital technology infrastructure is underway Converges voice and data traffic over a single IP network IP telephony adds digital voice clients and new voice applications to a data based network An IP telephony application can be easily developed that personalizes the treatment of incoming calls Calls can be selectively forwarded or blocked
  50. IP Telephony IP telephony advantages Cost savings Simplified management Application development Reduced infrastructure requirements Reduced regulatory requirements Increased user productivity
  51. IP Telephony Table 8-7 IP technology vulnerabilities
  52. Virtualization Virtualization A means of managing and presenting computer resources without regard to physical layout or location Host virtualization An entire operating system environment is simulated Virtual machine - a simulated software-based emulation of a computer The host system runs a hypervisor that manages the virtual operating systems and supports one or more guest systems
  53. Virtualization Virtualization advantages New virtual server machines can be made available (host availability) and resources can easily be expanded or contracted as needed (host elasticity) Can reduce costs Fewer physical computers must be purchased and maintained Can provided uninterrupted server access to users Supports live migration which allows a virtual machine to be moved to a different physical computer with no impact to users
  54. Virtualization Virtualization advantages (cont’d.) Test latest patches by downloading on a virtual machine before installing on production computers A snapshot of a particular state of a virtual machine can be saved for later use Testing the existing security configuration (security control testing) can be performed using a simulated network environment A suspicious program can be loaded into an isolated virtual machine and executed (sandboxing) If malware, only the virtual machine will be impacted
  55. Virtualization Security for virtualized environments: A guest OS that has remained dormant may not contain the latest patches and security updates Not all hypervisors have the necessary security controls to keep out attackers Existing security tools were designed for single physical servers and do not always adapt well to multiple virtual machines Virtual machines must be protected from outside network and other virtual machines on the same computer
  56. Cloud Computing Cloud computing A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources It is a pay-per-use computing model Customers pay for only the resources they need Types of clouds Public cloud Community cloud Private cloud Hybrid cloud
  57. Cloud Computing Three service models of cloud computing Software as a Service (SaaS) Vendor provides access to the vendor’s software applications running on a cloud infrastructure Platform as a Service (PaaS) Consumers install and run their own specialized applications on the cloud computing network Infrastructure as a Service (IaaS) Vendor allows customers to deploy and run their own software, including OSs and applications
  58. Cloud Computing Table 8-8 Cloud computing characteristics
  59. Cloud Computing Cloud computing security challenges Cloud provider must guarantee means to approve authorized users and deny imposters Transmissions from the cloud must be protected Customers’ data must be isolated from other customers The highest level of application availability and security must be maintained
  60. Summary TCP/IP is the most common protocol for LANs and the Internet Protocols for transferring files FTP, FTPS, SFTP, SCP Storage area network (SAN) is a dedicated network storage facility that provides access to data storage over a high-speed network Router configuration must provide a secure network environment Flood guard defends against denial-of-service attacks
  61. Summary Networks can be configured to provide separation and increased security Securing ports is an important step in network management Unused ports should be disabled New network applications that have special security considerations IP telephony Virtualization Cloud computing