C172 - Network Security Foundations
C172 - Network Security Foundations
⇐Iiotrox:#✗ ""
-
Course subjects
1
explore components of comp networks + network com protocols .
2 /
compare contrast transmission control / internet protocol ( TCP/IP) security + 051 model .
3 devices network
Networking essentials ,
+
types , basic commands
,
network topologies +
architectures
4 Explore concepts related to security vulnerabilities threats , ,
risk mitigation policies
,
+
access controls ,
device hardening .
* PA : Definitions + Reading
* 0A : scenario based
unit 2
intro to
networking foundations
module 1: TCP/IP + 051
Objectives :
-
TCIP / IP 051 Overview+
• models described as a set of procedures that sends data from one host
to another .
""""""""
application
HTTP ,
FTTP
application
,
telnet ,
NTP .
session
transport TCP ,
UDP Transport
network datalink
interface Ethernet
physical
•
Tcp/ip
0 transmission control Protocol and Internet Protocol
0 not as
widely used .
0 Layers
☒ network interface : physical cabling or wifi .
On network : internet protocol ( IP) or internet control message Protocol ( ICMP ) . logical transmission protocol .
☒ transport :
ensures data is delivered to correct app .
HTTP)
☐
hypertext transfer Protocol (
☐ simple Mail transfer protocol ( SMTP )
☐ DNS
-
OSI tB will be a big part of exam .
•
Developed by The International Standards organization ( Iso) .
Layers
•
⑧ Datalink layer : Responsible for error free delivery of data to the receiving device or node
Network for transmission of data b tween hosts in diff networks routing data
Layer :
Layer packets
+
.
!! transport layer :
provides service to app layer + relieves from network . Responsible 4 reliable data delivery .
0
segments + reassembles data
0 Often called heart of 051
0h Presentation layer : translates data from app to format required to transmit data over network .
App layer :
network apps ( HTTP or FTP eat) .
+
production of data transferred .
051
typically ref as # s not name
•
I
.
0 S
.
,
051 .
Please Physical I
_N→⑨Ñ
-
*
Data link 2
NIC functions @ layer 2 ,
Do -
Not -
Network 3 Presentation 6
Throw
-
Transport 4
5
Sausage -
Session 5
Pizza -
Presentation 6 transport
7-
Away -
Application network
datalink 2
I
physical
module 2 : network media ,
devices ,
+ standards
* know devices + where sit in 051 .
-
network media devices -
Cables
•
modem •
UTP
0
necessary for sending + receiving data .
o unshielded twisted pairs
° allow transport along analog lines ( phone / o twisted to protect against interference .
cable lines) .
0
invented by Alexander Graham Bell . Still
0
Types used today .
cable
on 0
types
⑨ DSL ⑨
Cat 3 → 10M pbs . Used for phone lines
satellite Cat 4 16 Mpbs up to 100 meters
on 8 →
. notused
•
Router * ☒ Cats → 100 Mpbs Ip to 100 meters Re
/
-
.
,
0 less chatty ,
allows more simultaneous 100 meters .
Higher quality cable .
0
Creates array of MAC addresses + works today .
knows °
Connectors used @
where packets go to . Datalink end of UTP cables .
Layer .
↳ RJII supports : 2 pairs used , in telephones .
↳ RJ 45 :
•
Bridge sup . 4 pairs ,
used w/ ethernet cables .
0
connects 2 or more networks .
•
Coaxial
0
bridge does not analyze only ,
forwards °
used
by cable tv companies .
info .
0
copper protected by metal shield
not Fiber
widely used •
0
anymore .
0
strengthen replicates regenerates signals .
data using light .
,
,
home .
0 Types
•
Hub Dumb * ☒
single -
mode → one glass of plastic fiber
{
.
does not 3
devices connected on network .
+ of multi mode cable Used for
long distances
data
.
.
screen .
]
•
ex : u , ,zµb each device must
ony won at any ( thousands of kilometers)
g.
. .
the traffic
designed for it + ignore the * gym , ,y mom
.
,
genera,, , , ,,, w , yan.gg.ge,
rest Less
expensive
.
.
051 Layers 0
Connector
types
•
° If •
displaying DNS
reply received , will
display time taven .
can be
measured
°
Useful : IP address
.
displays names to
mappings .
•
trace route / Haart •
dig
0 traces the route an IP packet faves to 0 Domain information groper
destination .
0
Query DNS name servers .
trace rt =
Windows 0 Replacement for ns lookup .
Useful :
where failed trouble • who is
ping
° .
see
,
taken
by a packet .
returned .
•
ip config
°
displays current route tables on a host .
0
provides user w/ the IP, subnet mask ,
°
Used
by local host to determine where to send
default traffic
gateway
+ . .
0
/ all command -
Default ,
collects MAC
•
Scp
address DHCP Secure
lease into
copy protocol
+ 0
.
,
/ release between
→ releases connections securely copies files
0 0
all + servers .
o
Primarily Windows encryption .
if ftp
config
• •
file transfer
Used to config kernel network inter Copies file from onehost
0
protocol
° to
-
. .
faces .
another .
Linux °
data is
unencrypted
primarily
0
.
•
ARP 0
FTPS uses SSL / TLS
- ifenryptien is needed .
0 ARP used to . . .
0
displays info about a user on a remote
system .
•
add •
nmap
⑧ remove 0 network mapper
On info found
by broadcasting to ability analysis + security scans .
packets .
management .
0 allow a user to
manage accounts + devices
onetstat -
r →
displays routing info for remotely .
network adapters .
0 Dif ? NÉE .
°
Centered around person + devices .
Shared network cable .
°
connects computer headphone sect 0 Used often in
,
tablet . begin .
q*oo_d_---r_-fBe
,
on bluetooth
frequently now .
I
☒ usb connections °
comps .
must connect w/
⑧ wifi hotspots physical wires
::0
.
'
°
devices connected in a limited area
0 If the wire is cut then the network fails .
0 ethernet / wifi
°
also called network segment b/c be
more comps can
.
0
popularized in 1960s added w/ network cables
0 1980s -
LANs support TCP/IP .
⑧
problem b/c cannot send + receive @ the
•
WLAN :
wireless Area Network same time .
0
popular for small businesses .
All comps will recieve AI network traffic .
•
SAN : storage Area Network
°
The main issue w/ this network type is overcrowd -
0 allows access to
storage devices specifically . ing .
disk arrays ect ) while , presenting them like network is still shared medium , but traffic is con -
°
Used to connect servers + storage devices .
°
Important differences :
0 reduce interference from LAN traffic ① network cable interrupted by each comp
•
CAN :
campus area network on ring .
0
multiple LANs over limited area ② cable connected back to self instead of
°
Similar to WLAN but smaller area
terminators
,
.
•
•
MAN : Metropolitan Area Network 0 Dual rings ( pictured) are used •
• •
⑥ ⑧ firm
connectivity .gg
0
Owned
by many orgs .
.
of
°
Offers 9 speeds compared to WAN .
•
Star
Topology :
central netw .
•
•
•
WAN : wide Area Network device connects to various other an
0
Internet is ex .
of WAN .
0 each device is only connected to central switch .
°
Network connects smaller networks °
Most common in LAN netw .
now .
transfer 0
protects from
0 ex :
global banks use WAN to
security data :F
so does not need to
connectivity .
patch
panel
go thru
°
internet . allows versatile
switch
network definitions set
up
•
.
client .
large businesses .
server :
Sys . stores data t.info .
Connection passes
⑧ client : machine that needs -
access to thru headquarters to connect devices .
0
peer -
to -
• ex :
bitcoin + +or . 1- ions .
0
self -
healing network .
Can connect to Iif
nodes .
module 6 : Network Architectures Module 7 : virtual + Cloud Computing
centralization BAM irtvalithtion typically associated w/
-
: vms
•
Beginning : all data kept on mainframe
,
use, operating as servers within datacenter ,
server hardware
•
cloud computing
⑤
.
- -
d[
instruct
is a modern ex -
-
ample .
terminal result ☐ Software .
,
One ex office 365 data center
gives admin superpowers
0 0
.
.
in .
Decentralization
Hyper visors * need to know for
-
-
exam .
Center .
0
open source or commercial .
•
Became possible w/ IBM microcomputers -1980s .
•
Can install 05 on VM ,
runs lik installed on
•
Cons physical hardware .
hostos
0
mismanaged local security ↳ 05 comp
-
. on -
0
Data may be incompatible between users due •
hypervisor is
RES-OURCETRA-t-F.CI .
Let's
program differences
to everyone know how much allowed
they are
.
•
Pros to use .
°
no network needed ! -
Type 1 Hypervisor
" "
. .
run .
0
popular w/ enterprise 0
VMware Esxi
apps
0
Open
-
source KVM
y
.
,
0 shared responsibility switch Éf • Must be installed on bare metal server .
of centralized server 1 •
pro -
has complete access to all machine's
⑤
server
& decentralized client
underlying hardware .
0
allows implementation of § comp .
0 con -
data inconsistency if multi . users have
given IP address
↳ to connect to VM needed
Type 2 Hypervisor
*ifith①
↳ move
•
run as app comp
upgrades hard
can on .
server it is a •
runs all requests thru comp 05 .
which
o °
on the no
comp .
.
both lead to
is station
degraded performance
°
server + Wor . .
0
Many machines allow this
automatically
across oses .
/
-
HELPFUL TO KNOW DIF
:[ https://youtu.be/pGGDdKZvYpI
]:
?⃝
Cloud popular w/ app devs
•
Computing
-
.
, , resource
pooling elastic accessible
Dev Allows to scale 7 de depend
, ,
+ measurable .
.
app or -
•
on -
demand ing on need .
SaaS -
software as a service
•
Cloud providers
•
software as a service
, ,
development models
•
like a water bill only for what ,
pay you
•
Private cloud -
use .
single company 's on -
pre -
•
mares
connectivity across world better ,
Mises data center .
faster °
all equipment to is
.
belongs +
managed
-
n,""""""°"
y,,p
maintaining hardware +
repairing
" " " "" " "
YY0V
people 0
state of the art security
each client's
protected by
0
Y0V
is
space
VPC + Firewalls .
Common
-
.
WI universities .
Must-have connection
°
b tween data centers
hyÉ
via or .
É
servers +
Physical
É
-
Iaas -
infa structure as a service
•
cornerstones
0 server
virtualization
o
storage
o
network
• customizable ,
but user responsible for more
things .
•
virtual Private Cloud (VP C) means each users
network is isolated
•
Virtual servers also used for PaaS + SaaS
•
User is responsible for backups .
Always deploy 2 of
↳
everything .
Paas -
Platform as a service .
on top .
module 8 : Network Security Overview
Me
NETWORK SECURITY TERMINOLOGY °
Zero -
Day
asset person / device / location / info that
•
☒ the threat
:
or exploit is not known to
public .
an .
,
.
•
Sec 0ps • ATTACKER TYPES
:
security operations ; protects
assets + reduces risk .
•
•
Vulnerability testers
abilities .
0
blue team : defends
Ware / facilities / people which approach but debrief cross train later
,
+ -
.
can be
exploited .
•
Script kiddies
usually
-
,
o
physical security °
For
example using script mods ,
to mine in
⑧ Data is
encrypted + that key is changed RuneScape .
freq on premise .
0
These are
unpredictable ble .
they
don't
⑧ Doesn't work if someone can steal understand consequences of what
your the
%
they could do .
packet
°
can break these .
-
sniffer listens + records net -
them Allows
change you've left the Sys device down add
to
.
wiretap .
unlocked .
• Default
passwords or
leaving loop high security areas . They immune to
holes .
EMF .
apps
the
pollute network .
run on comp .
On
Trojan Horse
ex : 0 10s of thousands of ports tho ( rip) .
•
Solution Mandatory -
anti-virus 0 There's an for that ! Port scanners
app
.
0
Advanced Persistent Threats automates + allows for more in -
depth
" "
APT ; waits for the opportune moment port scanning
⑨
.
• ransome
ware or
highly destructive
•
Taking control
0
Protections
A integrity
'
input fields NH intro to CIA
É
1. user are checked for long / CIA
unplanned writing .
! Triangle •
confidentiality
HAHA
jÉ
* data moves
2. enable NX bit CPU limits info
only
°
execute code
- -
-
-
. , , inside triangle .
access
,
, ,
Spoofing
or
contradicts avail
of confidentiality
• ,
availability .
due to advances in
networking .
☒
Unencrypted info
☒
Not
" " regularly purging .
"
§§%
° ^
Physical theft
☒
⑧ social
"
engineering
¥ ooo
Accidents / Malfunctions
!
⑧
-
- -
S
1
client
0 Protections
•
is
\ makes request ☒
encrypt info @ rest + in -
transit
3 req , to server * ⑧
made to
,
µ
.
z hacker encrypt / physically secure laptops .
intercepts w/ ☒
delete files
hacker ,
µi fave server securely
,µ☒y
train social
s server
data is sent
Tl 4 hacker
☒
employees on
engineering
☒
to client so Pretends to
complex passwords
be client
nos "
least privilege :
,
•
only assign
-
info from
hacker server per mish
.
•
Integrity
•
Denial of Service (Dos ) 0 Risks
0
floods user w/ packets moving network ☒ man -
in -
the middle atks
unreachable . ☒ intentional / unintentional data deletion
o
Ping Flood -
sends tons of ICMP echo
regs .
☒ Malfunctions
Ends up like feedback
electromagnetic pulse ( EMP) atks
•
in .
a sound
Sys . Makes comp not 0
Prevention
work well ☒ All data transmissions
.
encrypt
☒ avoidable or core able .
One-way Hash calls : create value,
0
Smurf Attack sends tons of ICMP echo regs
: .
•
Important job in Sec 0ps Server high avail clustering tech
-
.
.
Honeypot
:
☒
• use data that seems legit to trick
Regular back ups
attackers away from real data .
comps .
•
Sometimes viruses aren't dangerous right
away
0
Troj Horse
,
Rootkits backdoor atks , .
MODULE 10 : FIREWALLS ,
IDS , IPS
NH FIREWALLS •
Stateful Inspection
•
Network firewall : barrier intercepts traffic +
0 State : connection state b tween 2 comps .
inspects making
,
sure everything is safe .
0
prevents many rules having to be set on
0 limits type of traffic which can reach . Senders side to notify protocol packet
•
Physical ,
VMs
,
or
apps .
relieved .
°
0
host -
based firewall : firewall app on work creates temporary rules to taper down
station . on traffic .
•
App level
F / R E WALLS o
Highly responsive , inspects content of
packets .
Layer 7 Firewall
§ Also Known
°
LAYER 7: .
application
3
LATER 6 : w NK INTRUSION DETECTION + PREVENTION
presentation
- •
Intrusion Detection system : IDs malicious
1-1
LAYERS : traffic based on DB of known behaviors +
Session STATEFUL
I
payload sigs IDS .
"
intercepts
LAYER 2:
§ threats .
datalink I
°
in -
line : IPS works best when wired
middle
A-
LAYER 1 : a-
as a man in the network .
€ It data from
physical copy pastas one side of
•
Filters
File is blocked based known history
on its
cooperates at layer 3+4
.
no .
0
Layer 3 - IP address
. Layer 4- TCP or UDP
.
IPS
inspects incoming / outgoing traffic 5
•
+ compare BOTH
to DB .
I☐
0 Packet Filters Check . - .
Protocol i Monitors
typically IP) Intercepts /
☒ •
IDs
•
•
network to
☒ Source IP malicious blocks threats
detect threats .
Destination IP traffic
Many network
•
•
Listens
☒ Source TCP / UDP
port #
•
Avail virtual . ports , op i10
.
port #
-
! has cables
•
, •
routed physi
header ( address label) config
-
.
Admin tap
Circut Mode Cally to create
Level
Gateways
• -
choke points
0 middle -
man
,
conceals ID of client +
server .
0
Changes IP + TCP / UDP #
0 Allows traffic btween networks .
0
foundation of Ad AT + PAT .
MODULE 11 : 051 + SECURITY
NH LAYER 4 : TRANSPORT
"* LAYER 7- : TCP / UDP
physical •
•
Threats •
Ensures data is relieved + delivered based
o
wiretapping on app needs .
☒ threat on CAT 6
,
not fiber optic •
TCP us .
UDP
cables 0 TCP -
connection oriented -
reliable provides .
.
,
EMF .
0 UDP -
connection less , not as reliable, used
0 Protect in music
streaming often .
o
security locks on doors .
•
Threats
0
physical often overlooked , but renders 0 Port scanner -
scans victim 's
comp for
rest obsolete w/o
open ports
.
•
Prevention
NH LAYER 2 :
Data link 0
packet filter firewall-
•
Represents how comp .
logically connect to
0
port redirection exactly - what it sounds
network .
like . Redirects web requests to
lesser
includes ethernet wifi known port Not
very effective
• + .
.
•
Threats
0 Ethernet switches + ULAN NH LAYERS : SESSION
⑧ 2 modes which can be config ⑧
Allow comps dif . b tween connections w/ in
.
on .
☐ trunk -
interconnect multi .
switches •
Threats
for multi VLANS .
.
° Attack on Remote Procedure Protocol (RPC)
Attacker exploit trunk config RPC is used
can .
+
preform ☒ to exe
procedures on
other
VLAN
hopping attack .
comps ( like sending a
print job .
•
Prevention •
Prevention
005 App patches
config
°
network in access mode
+
.
0
Dos / DDoS ( TLS ) [ replaced 55L?
•
ping sweep - sends pings to see which
°
TLS / SSL -
man in the middle atk .
susceptible
• Prevention
comp are online be
. +
may °
to other atks .
App -
Spoofing
0
be NH LAYER 7 : APPLICATION
• can
Layer 2+3 .
, .
•
Prevention •
Threats
0
ping sweep -
the API .
•
prevent
oauth users twice .
/ Reverse proxy
MODULE 12 : ENCRYPTION
ANY ENCRYPTION TECHNIQUES + METHODS •
1psec
•
Symmetric key encryption same key : o Internet Protocol Security
@ layer
encrypts data as decrypts data network 3
0
.
secures .
PLAINTEXT Plaintext
a # Er Text
Agog ⑤ ⑤ ⑤ gateway to
encrypt data from 2 comp .
BBB
D%B § £ •
Ñ☒B encrypted data
sender
encrypt decrypt recipient B- Ñ
A- uses same a
key
*☒☒D_ncryp→ÉEfDBMµ§ •☒☒dnocryptiesD07µ§
o§
shared secret
Hgq§ag_←Ep←→q MFp-FT-EE.EE#o
key •
1psec
Keys used to
create encrypted
•
" packets
0 The encryption is most vulnerable when
.
•
Data
payload encrypted
sender exchange + recipient the
key .
•
Asymmetric Encryption o
composed of
allows 2
parties to
exchange encrypt .
☐
provides encryption
ed data w/o first Used w/ Internet
key exchange
°
exchanging private /
shared keys Advanced Encryption standard ( AES)
•
⑧
algorithm creates keys -
public key
°
symmetric key cipher -
near impenetrable .
0 0 .
.
0 Downside -
lots of computational
power needed
⑨ b/c of this combo of
, many use
asym +
sym encryption
OTLS :
uses
sym +
asym encrypt .
•
Elliptic Curve
Cryptography
weakness of PKI math formulas
0
-
based on
☐
Transport Layer Encryption
0
creates secure internet channel b tween
client + server .
Public form
key is
0
in of Cert Cert
by .
authority
Public
key
⑤
Is
µqg§R '
-
1Ñ☒Ñ
1-
-
Public key
tis
$
-
T
+
data encrypted
data can q
server
by using only be decrypted 8 Private
keep it
longer than meant to
°
scalable single tenant
you are
-
. ,
•
Verify w/ cloud
provider if backups
°
owner of equipment responsible for
everything
.
in to time
kept factor -
you
're allowed
to
keep data .
data reside
can
physically .
DEK
0
Asymmetric .
°
Store
encrypt ☐ Ekin key management
•
Data in transit
clouds .
•
Federated identity management : allows users
authenticate via fb ,
google ect
to
,
.
↳
prevents storage of usernames +
pass on
your
server .
•
network security
0
separate public +
private servers to prevent
cross server attacks .
of firewalls
Using layers
°
+ Sec
prevents
this too .
/ - - / , / - - / ,
ÉR]
° ° ° °
ADDS NETS EC !
PUBLIC Private
SERVER server
☒• CLOUD SECURITY
Cloud platform security
•
0 Service account
Audit
logs
o
Public
☒
providers keep -
shows what users
to
Private might
are up .
MODULE 14 : WIRELESS SECURITY
#É¥itp¥ •
WAP or Wireless Router
most often found in homes
networks w/o password unencrypted
°
•
a = . + small
• 3 DES offices .
0
antiquated , runs DES encryption 3 times .
Distribution
ROUTER
0
still used w/ some but can be brute
ROUTER
orgs , a
p
system or r
•
AES n -
b -
192 -
bit Ñtst
☒ 256 -
bit * most devices use this now .
•
802 IX .
Security standard
0
symmetric key alg .
0
provides network control @ port level .
Most modern CPUs support AES Provides authentication based EAP / Ex ten
0
Allow CPU
0
-
Nl .
on -
to process
encryption @ high speeds . sible Authentication Protocol .
•
WEP client has
client granted
✓ Ap prop access
info
.
Auth -
Deprecated f
°
in 2004 , k
client not
0
Can be busted in Ll
day today " th A
.
s
0
Made to
provide same Sec to wireless netw .
i:f client not p
•
granted network
as wired .
client •
access .
✗
0
One code
encrypts every packet on netw .
•
WPA
°
can also check antivirus on client +
°
Encrypts every packet on network w/ unique refuse access based on that .
8- 63 alphanumeric key .
÷iÉattat÷
'
3 .
•
De auth Attack
•
WPA 2 °
DOS atk -
0
Wireless stand for 15 Why
encryption
°
.
years .
Prevent
main dif
mandatory for CCMP access to hetw
0 :
support . .
WPA 3 access
gain
•
.
0 released 2018 °
Defense
0
encrypts each device on unsure network .
⑨
WPA 3 -
0
uses SAE + PFS encrypted .
SAE -
slows down brute force atks .
•
Fake Access
☒ PFS -
if one session
very is compromised ,
°
attacker sets up illegitimate wireless net -
attacker
Ñntwinfa~,ET_zf--_
o-qo-t-B.co
a-o@___G__@h-_g_@_ Protect
• Use VPN
•
Ad hoc ☒
do not connect to Un secure networks
to peer network WAP
peer
0 -
no .
!
P