Chapter Three IAS
Chapter Three IAS
Chapter Three IAS
Contents:
Firewall Definitions
IP Sec Architecture
IPv6 Security Considerations
Host Security
Firewall
A firewall is hardware, software, or a combination of both that is used to
prevent unauthorized programs or Internet users from accessing a private
network.
Host-based firewalls are needed because network firewalls cannot provide protection
inside a trusted network. Host firewall protects each host from attacks and unauthorized
access.
Types of Firewalls:
Network-based Firewalls:
Network firewall function on network level. In other words, these firewalls filter all
incoming and outgoing traffic across the network.
It protects the internal network by filtering the traffic using rules defined on the firewall. A
Network firewall might have two or more network interface cards (NICs).
Complexity
Limited Visibility
False sense of security
Limited adaptability
Performance impact
Limited scalability
Limited VPN support
Cost:
IPSec Architecture
IPSec (IP Security) architecture uses two protocols to secure the traffic or data flow.
These protocols are
ESP (Encapsulation Security Payload) and
AH (Authentication Header).
IPSec Architecture includes protocols, algorithms, DOI, and Key Management.
All these components are very important in order to provide the three main services:
Confidentiality
Authentication
Integrity
IP Security Architecture:
Cont.……..
6. DOI (Domain of Interpretation): DOI is the identifier that supports both AH and
ESP protocols. It contains values needed for documentation related to each other.
7. Key Management: Key Management contains the document that describes how
the keys are exchanged between sender and receiver.
3.3. IPv6 Security Considerations:
Auto-configuration
Stateless address auto-configuration (SLAAC) is an automatic method to self-assign
an IPv6 address to a host.
Misconfigured IPv6-enabled devices (resulting from an error in the configuration) could introduce
vulnerabilities, making the devices more prone to compromise.
Learning the IPv6 protocol and knowing how to configure IPv6 effectively are the most critical things to
protect and enhance IPv6 security on a network.
NSA recommends ensuring all network administrators have received the proper training and education to
Host security
Host security is a term that includes a range of security tools that individuals and organizations
implement and deploy at the host level of their computers.
Organizations and individuals install host security tools on a single computer or server in order
to protect the computer’s or server’s host.
Host security works by employing a centralized-management function and an agent that work
together to provide automated protection.
It detects, responds to, and reports host-based attacks, vulnerabilities, potential risks, and other
similar incidents.
Authentication vs. Authorization: Differences, Methods, and
Techniques
You cannot have a secure solution unless you have configured both
authentication and authorization correctly.
Authentication
authorization determines what a user can access and ensures that a user or entity
receives the right access or permissions in a system. Authentication is a prerequisite to
authorization.
Authentication is the process of verifying that a user is who they claim to be. For
example, when you go through security at an airport, you show your ID to authenticate
your identity.
Authorization The End