Network Security Fundamentals
Network Security Fundamentals
Fundamentals
What is Network Security?
Threats
What is a threat?
About Threats
Basic Security
Assumptions
Modern networks are very large, very
interconnected, and run both
ubiquitous protocols, such as IP, and
proprietary protocols.
Computer systems and applications
that are attached to these networks
are becoming increasingly complex.
Basic Security
Requirements
Confidentiality
Integrity
System and data
availability
Confidentiality
Ensuring that information is
accessible only to those authorized
to have access
Questions and
Answers
How could be compromised
the confidentiality in a
network?
Confidentiality How?
Limiting access to network resources
using network access control.
Limiting access to files and objects using
operating system-based access controls.
Limiting user access to data by
application level controls.
Limiting the readability of information
should there be a breach, through
encryption
Integrity
Safeguarding the accuracy and
completeness of information and
processing methods
Only authorized subjects can change
sensitive information, ensuring the
authenticity of data.
Questions and
Answers
How could be compromised
the integrity in a network?
Availability
Providing uninterrupted access to
computing resources and data even
during accidental or deliberate
network or computer disruptions.
The availability service is increasingly recognized as
one of the most important security services and
possibly the most difficult to provide.
Questions and
Answers
How could be compromised
the availability in a network?
What is necessary to
accomplish the
Network Security
Objetives?
Data Classification
To optimally allocate resources and
secure assets, it is essential that
some form of data classification
exists.
By identifying which data has the
most worth, administrators can make
the greatest effort to secure that
data.
Classification scheme in
government organizations,
including the military
Unclassified
Sensitive But Unclassified (SBU)
Confidential
Secret
Top secret
Public
Sensitive
Private
Confidential
Age
For many types of data, its importance changes
with time.
Useful life
Often data is valuable for only a set window of time
Personal association
Data of this type usually involves something of a
personal nature.
Roles in data
classification systems
Owner
The owner is the person who is ultimately
responsible for the information.
Custodian
The custodian is usually a member of the IT staff
who has the day-to-day responsibility for data
maintenance.
User
Users do bear responsibility for using the data in
accordance with established operational
procedures.
Information classification
procedure
Security Controls
A security control is any mechanism
that you put in place to reduce the
risk of compromise of any of the
three objectives: confidentiality,
integrity, and availability.
Categorization
By the implementation
By the type of control
Technical
Controls that involve electronics,
hardware, software.
Physical
Controls that are mostly mechanical.
Administrative Controls
Security-awareness training
Security policies and standards
Change controls and configuration controls
Security audits and tests
Good hiring practices
Background checks of contractors and
employees
Technical Controls
Firewalls and IPSs
Virtual private network (VPN)
concentrators and clients
TACACS+ and RADIUS servers
One-time password (OTP) solutions
Smart cards
Biometric authentication devices
Network Admission Control (NAC) systems
Routers with ACLs
Physical Controls
Deterrent
The control scare away a certain percentage
of adversaries to reduce the number of
incidents.
Detective
The control detects security breaches and
helps to determine how the network was
breached.
Administrative
Involves government agencies enforcing
regulations.
Ethics
"Act only according to that
maxim whereby you can, at
the same time, will that it
should become a universal
law., Immanuel Kant
Information Security
Ethics Codes
International Information Systems
Security Certification Consortium, Inc
(ISC)2 code of ethics
Computer Ethics Institute
Internet Activities Board (IAB)
Generally Accepted System Security
Principles (GASSP)