Chapter Goals: Security Technologies
Chapter Goals: Security Technologies
Chapter Goals: Security Technologies
Chapter Goals
• Understand the types of attacks that may be used by hackers to undermine network security.
• Understand the types of vulnerabilities that may be present in your network.
• Learn to classify the different types of networks and users that may interact with your own, and
evaluate their risk factors.
• Learn to evaluate your network topology and requirements, and develop a suitable security policy
for implementation.
• Become familiar with the tools available for protecting confidential information and your network.
Security Technologies
With the rapid growth of interest in the Internet, network security has become a major concern to
companies throughout the world. The fact that the information and tools needed to penetrate the security
of corporate networks are widely available has increased that concern.
Because of this increased focus on network security, network administrators often spend more effort
protecting their networks than on actual network setup and administration. Tools that probe for system
vulnerabilities, such as the Security Administrator Tool for Analyzing Networks (SATAN), and some of
the newly available scanning and intrusion detection packages and appliances, assist in these efforts, but
these tools only point out areas of weakness and may not provide a means to protect networks from all
possible attacks. Thus, as a network administrator, you must constantly try to keep abreast of the large
number of security issues confronting you in today’s world. This chapter describes many of the security
issues that arise when connecting a private network to the Internet.
Many users employ a single password for access to all accounts and applications. If an application is run
in client/server mode and authentication information is sent across the network in clear text, this same
authentication information likely can be used to gain access to other corporate resources. Because
attackers know and use human characteristics (attack methods known collectively as social engineering
attacks), such as using a single password for multiple accounts, they are often successful in gaining
access to sensitive information.
Password Attacks
Password attacks can be implemented using several different methods, including brute-force attacks,
Trojan horse programs (discussed later in the chapter), IP spoofing, and packet sniffers. Although packet
sniffers and IP spoofing can yield user accounts and passwords, password attacks usually refer to
repeated attempts to identify a user account and/or password; these repeated attempts are called
brute-force attacks.
Often, a brute-force attack is performed using a dictionary program that runs across the network and
attempts to log in to a shared resource, such as a server. When an attacker successfully gains access to a
resource, that person has the same rights as the user whose account has been compromised to gain access
to that resource. If this account has sufficient privileges, the attacker can create a back door for future
access, without concern for any status and password changes to the compromised user account.
outside intruder can use password and IP spoofing attacks to copy information, and an internal user can
easily place sensitive information on an external computer or share a drive on the network with other
users.
For example, an internal user could place a file on an external FTP server without ever leaving his or her
desk. The user could also e-mail an attachment that contains sensitive information to an external user.
Man-in-the-Middle Attacks
A man-in-the-middle attack requires that the attacker have access to network packets that come across
the networks. An example of such a configuration could be someone who is working for your Internet
service provider (ISP), who can gain access to all network packets transferred between your network and
any other network. Such attacks are often implemented using network packet sniffers and routing and
transport protocols. The possible uses of such attacks are theft of information, hijacking of an ongoing
session to gain access to your internal network resources, traffic analysis to derive information about
your network and its users, denial of service, corruption of transmitted data, and introduction of new
information into network sessions.
Packet sniffers provide information about the topology of your network that many attackers find useful.
This information, such as what computers run which services, how many computers are on your network,
which computers have access to others, and so on, can be deduced from the information contained within
the packets that are distributed across your network as part of necessary daily operations.
In addition, a network packet sniffer can be modified to interject new information or change existing
information in a packet. By doing so, the attacker can cause network connections to shut down
prematurely, as well as change critical information within the packet. Imagine what could happen if an
attacker modified the information being transmitted to your accounting system. The effects of such
attacks can be difficult to detect and very costly to correct.
IP Spoofing
IP spoofing can yield access to user accounts and passwords, and it can also be used in other ways. For
example, an attacker can emulate one of your internal users in ways that prove embarrassing for your
organization; the attacker could send e-mail messages to business partners that appear to have originated
from someone within your organization. Such attacks are easier when an attacker has a user account and
password, but they are possible by combining simple spoofing attacks with knowledge of messaging
protocols. For example, Telnetting directly to the SMTP port on a system allows the attacker to insert
bogus sender information.
Password Attacks
Just as with packet sniffers and IP spoofing attacks, a brute-force password attack can provide access to
accounts that can be used to modify critical network files and services. An example that compromises
your network’s integrity is an attacker modifying the routing tables for your network. By doing so, the
attacker ensures that all network packets are routed to him or her before they are transmitted to their final
destination. In such a case, an attacker can monitor all network traffic, effectively becoming a man in
the middle.
Denial-of-Service Attacks
Denial-of-service attacks are different from most other attacks because they are not targeted at gaining
access to your network or the information on your network. These attacks focus on making a service
unavailable for normal use, which is typically accomplished by exhausting some resource limitation on
the network or within an operating system or application.
When involving specific network server applications, such as a Hypertext Transfer Protocol (HTTP)
server or a File Transfer Protocol (FTP) server, these attacks can focus on acquiring and keeping open
all the available connections supported by that server, effectively locking out valid users of the server or
service. Denial-of-service attacks can also be implemented using common Internet protocols, such as
TCP and Internet Control Message Protocol (ICMP). Most denial-of-service attacks exploit a weakness
in the overall architecture of the system being attacked rather than a software bug or security hole.
However, some attacks compromise the performance of your network by flooding the network with
undesired and often useless network packets and by providing false information about the status of
network resources.
Trusted Networks
Trusted networks are the networks inside your network security perimeter. These networks are the ones
that you are trying to protect. Often you or someone in your organization administers the computers that
comprise these networks, and your organization controls their security measures. Usually, trusted
networks are within the security perimeter.
When you set up the firewall server, you explicitly identify the type of networks that are attached to the
firewall server through network adapter cards. After the initial configuration, the trusted networks
include the firewall server and all networks behind it.
One exception to this general rule is the inclusion of virtual private networks (VPNs), which are trusted
networks that transmit data across an untrusted network infrastructure. For the purposes of our
discussion, the network packets that originate on a VPN are considered to originate from within your
internal perimeter network. This origin is logical because of how VPNs are established. For
communications that originate on a VPN, security mechanisms must exist by which the firewall server
can authenticate the origin, data integrity, and other security principles contained within the network
traffic according to the same security principles enforced on your trusted networks.
Untrusted Networks
Untrusted networks are the networks that are known to be outside your security perimeter. They are
untrusted because they are outside your control. You have no control over the administration or security
policies for these sites. They are the private, shared networks from which you are trying to protect your
network. However, you still need and want to communicate with these networks although they are
untrusted.
When you set up the firewall server, you explicitly identify the untrusted networks from which that
firewall can accept requests. Untrusted networks are outside the security perimeter and are external to
the firewall server.
Unknown Networks
Unknown networks are networks that are neither trusted nor untrusted. They are unknown quantities to
the firewall because you cannot explicitly tell the firewall server that the network is a trusted or an
untrusted network. Unknown networks exist outside your security perimeter. By default, all nontrusted
networks are considered unknown networks, and the firewall applies the security policy that is applied
to the Internet node in the user interface, which represents all unknown networks. However, you can
identify unknown networks below the Internet node and apply more specialized policies to those
untrusted networks.
A network security policy focuses on controlling the network traffic and usage. It identifies a network’s
resources and threats, defines network use and responsibilities, and details action plans for when the
security policy is violated. When you deploy a network security policy, you want it to be strategically
enforced at defensible boundaries within your network. These strategic boundaries are called perimeter
networks.
Perimeter Networks
To establish your collection of perimeter networks, you must designate the networks of computers that
you wish to protect and define the network security mechanisms that protect them. To have a successful
network security perimeter, the firewall server must be the gateway for all communications between
trusted networks and untrusted and unknown networks.
Each network can contain multiple perimeter networks. When describing how perimeter networks are
positioned relative to each other, three types of perimeter networks are present: the outermost perimeter,
internal perimeters, and the innermost perimeter. Figure 47-1 depicts the relationships among the various
perimeters. Note that the multiple internal perimeters are relative to a particular asset, such as the
internal perimeter that is just inside the firewall server.
Figure 51-1 Three Types of Perimeter Networks Exist: Outermost, Internal, and Innermost
Outermost perimeter
(First)
Internal perimeter
(Second)
Internal perimeter
(Third)
Internal perimeter
(Last)
Assets
(that you control)
The outermost perimeter network identifies the separation point between the assets that you control and
the assets that you do not control—usually, this point is the router that you use to separate your network
from your ISP’s network. Internal perimeter networks represent additional boundaries where you have
other security mechanisms in place, such as intranet firewalls and filtering routers.
Figure 51-2 depicts two perimeter networks (an outermost perimeter network and an internal perimeter
network) defined by the placement of the internal and external routers and the firewall server.
External Internal
router router
Untrusted Trusted
network network
Outermost Internal
perimeter network perimeter network
(just inside the firewall)
Positioning your firewall between an internal and external router provides little additional protection
from attacks on either side, but it greatly reduces the amount of traffic that the firewall server must
evaluate, which can increase the firewall’s performance. From the perspective of users on an external
network, the firewall server represents all accessible computers on the trusted network. It defines the
point of focus, or choke point, through which all communications between the two networks must pass.
The outermost perimeter network is the most insecure area of your network infrastructure. Normally, this
area is reserved for routers, firewall servers, and public Internet servers, such as HTTP, FTP, and Gopher
servers. This area of the network is the easiest area to gain access to and, therefore, is the most frequently
attacked, usually in an attempt to gain access to the internal networks. Sensitive company information
that is for internal use only should not be placed on the outermost perimeter network. Following this
precaution helps avoid having your sensitive information stolen or damaged.
When you design your security measures, understand their costs and weigh those costs against the
potential benefits. To do that, you must understand the costs of the measures themselves and the costs
and likelihood of security breaches. If you incur security costs out of proportion to the actual dangers,
you have done yourself a disservice.
Human Factors
Many security procedures fail because their designers do not consider how users will react to them. For
example, because they can be difficult to remember, automatically generated nonsense passwords often
are written on the undersides of keyboards. For convenience, a secure door that leads to the system’s only
tape drive is sometimes propped open. For expediency, unauthorized modems are often connected to a
network to avoid onerous dial-in security measures.
If your security measures interfere with essential use of the system, those measures will be resisted and
perhaps circumvented. To get compliance, you must make sure that users can get their work done, and
you must sell your security measures to users. Users must understand and accept the need for security.
Any user can compromise system security, at least to some degree. For instance, passwords can often be
found simply by calling legitimate users on the telephone, claiming to be a system administrator, and
asking for them. If your users understand security issues, and if they understand the reasons for your
security measures, they are far less likely to make an intruder’s life easier.
At a minimum, users should be taught never to release passwords or other secrets over unsecured
telephone lines (especially cellular telephones) or e-mail. Users should be wary of people who call them
on the telephone and ask questions. Some companies have implemented formalized network security
training so that employees are not allowed access to the Internet until they have completed a formal
training program.
Summary
After reading this chapter, you should be able to evaluate your own network and its usability
requirements, and weigh these requirements against the risk of compromise from unknown users and
networks.
When defining a security policy for your organization, it is important to strike a balance between keeping
your network and resources immune from attack and making the system so difficult to negotiate for
legitimate purposes that it hinders productivity.
You must walk a fine line between closing as many doors as possible without encouraging trusted users
to try to circumvent the policy because it is too complex and time-consuming to use.
Allowing Internet access from an organization poses the most risk to that organization. This chapter has
outlined the types of attacks that may be possible without a suitable level of protection. If a compromise
occurs, tools and applications are available to help flag possible vulnerabilities before they occur—or to
at least help the network administrator monitor the state of the network and its resources.
It is important to stress that attacks may not be restricted to outside, unknown parties, but may be
initiated by internal users as well. Knowing how the components of your network function and interact
is the first step to knowing how to protect them.
Review Questions
Q—Name three common network attacks used to undermine network security.
A—Password attacks, IP spoofing, denial-of-service attacks, dictionary attacks, and man-in-the-middle
attacks.
Q—What are the three main types of networks that must be considered when defining a security policy?
A—Trusted, untrusted, unknown.
Q—List some of the areas of possible vulnerability in your own network.
A—Internet connection, modems on PCs.
Q—What tools and applications are available to help monitor and test for system and network
vulnerabilities?
A—Scanning tools, SATAN, packet sniffers, and intrusion detection devices.
Q—List five important considerations to address when defining a security policy.
A—1. Know your enemy
2. Count the cost
3. Identify any assumptions
4. Control your secrets
5. Human factors
6. Know your weakness
7. Limit the scope of access
8. Understand your environment
9. Limit your trust
10. Remember physical security
11. Make security pervasive