Unit 4
Unit 4
UNIT-IV
NETWORK AND IP SECURITY
4.1 Network Security
Network Security is vital in protecting client data and information, keeping shared data secure
and ensuring reliable access and network performance as well as protection from cyber threats. A
well designed network security solution reduces overhead expenses and safeguards organizations
from costly losses that occur from a data breach or other security incident. Ensuring legitimate
access to systems, applications and data enables business operations and delivery of services and
products to customers.
Types of Network Security Protections
Firewall: Firewalls control incoming and outgoing traffic on networks, with predetermined
security rules. Firewall keep out unfriendly traffic and is a necessary part of daily computing.
Network Security relies heavily on Firewalls, and especially Next Generation Firewalls, which
focus on blocking malware and application-layer attacks.
Network Segmentation
Network segmentation defines boundaries between network segments where assets within the
group have a common function, risk or role within an organization. For instance, the perimeter
gateway segments a company network from the Internet. Potential threats outside the network
are prevented, ensuring that an organization‘s sensitive data remains inside. Organizations can go
further by defining additional internal boundaries within their network, which can provide
improved security and access control.
Email Security: Email security refers to any processes, products, and services designed to
protect your email accounts and email content safe from external threats. Most email service
providers have built-in email security features designed to keep you secure, but these may not be
enough to stop cybercriminals from accessing your information.
Data Loss Prevention (DLP): Data loss prevention (DLP) is a cybersecurity methodology that
combines technology and best practices to prevent the exposure of sensitive information outside
of an organization, especially regulated data such as personally identifiable information (PII) and
compliance related data: HIPAA, SOX, PCI DSS, etc.
Intrusion Prevention Systems (IPS): IPS technologies can detect or prevent network security
attacks such as brute force attacks, Denial of Service (DoS) attacks and exploits of known
vulnerabilities. A vulnerability is a weakness for instance in a software system and an exploit is
an attack that leverages that vulnerability to gain control of that system. When an exploit is
announced, there is often a window of opportunity for attackers to exploit that vulnerability
before the security patch is applied. An Intrusion Prevention System can be used in these cases to
quickly block these attacks.
Sandboxing: Sandboxing is a cybersecurity practice where you run code or open files in a safe,
isolated environment on a host machine that mimics end-user operating environments.
Sandboxing observes the files or code as they are opened and looks for malicious behavior to
prevent threats from getting on the network. For example malware in files such as PDF,
Microsoft Word, Excel and PowerPoint can be safely detected and blocked before the files reach
an unsuspecting end user.
Spyware: Much like its name, spyware is a computer virus that gathers information about a
person or organization without their express knowledge and may send the information gathered
to a third party without the consumer‘s consent.
Adware: Can redirect your search requests to advertising websites and collect marketing data
about you in the process so that customized advertisements will be displayed based on your
search and buying history.
Ransomware: This is a type of trojan cyberware that is designed to gain money from the person
or organization‘s computer on which it is installed by encrypting data so that it is unusable,
blocking access to the user‘s system.
attackers find a way to circumvent that security, they can steal data that is being transmitted,
obtain user credentials and hijack their sessions.
4. Code and SQL injection attacks
Many websites accept user inputs and fail to validate and sanitize those inputs. Attackers can
then fill out a form or make an API call, passing malicious code instead of the expected data
values. The code is executed on the server and allows attackers to compromise it.
5. Privilege escalation
Once attackers penetrate your network, they can use privilege escalation to expand their reach.
Horizontal privilege escalation involves attackers gaining access to additional, adjacent systems,
and vertical escalation means attackers gain a higher level of privileges for the same systems.
6. Insider threats: A network is especially vulnerable to malicious insiders, who already have
privileged access to organizational systems. Insider threats can be difficult to detect and protect
against, because insiders do not need to penetrate the network in order to do harm. New
technologies like User and Even Behavioral Analytics (UEBA) can help identify suspicious or
anomalous behavior by internal users, which can help identify insider attacks.
Network Protection Best Practices
Segregate Your Network
A basic part of avoiding network security threats is dividing a network into zones based on
security requirements. This can be done using subnets within the same network, or by creating
Virtual Local Area Networks (VLANs), each of which behaves like a complete separate
network. Segmentation limits the potential impact of an attack to one zone, and requires attackers
to take special measures to penetrate and gain access to other network zones.
Regulate Access to the Internet via Proxy Server
Do not allow network users to access the Internet unchecked. Pass all requests through a
transparent proxy, and use it to control and monitor user behavior. Ensure that outbound
connections are actually performed by a human and not a bot or other automated mechanism.
Whitelist domains to ensure corporate users can only access websites you have explicitly
approved.
Place Security Devices Correctly
Place a firewall at every junction of network zones, not just at the network edge. If you can‘t
deploy full-fledged firewalls everywhere, use the built-in firewall functionality of your switches
and routers. Deploy anti-DDoS devices or cloud services at the network edge. Carefully consider
where to place strategic devices like load balancers – if they are outside the Demilitarized Zone
(DMZ), they won‘t be protected by your network security apparatus.
Use Network Address Translation
Network Address Translation (NAT) lets you translate internal IP addresses into addresses
accessible on public networks. You can use it to connect multiple computers to the Internet using
a single IP address. This provides an extra layer of security, because any inbound or outgoing
traffic has to go through a NAT device, and there are fewer IP addresses which makes it difficult
for attackers to understand which host they are connecting to.
Monitor Network Traffic
Ensure you have complete visibility of incoming, outgoing and internal network traffic, with the
ability to automatically detect threats, and understand their context and impact. Combine data
from different security tools to get a clear picture of what is happening on the network,
recognizing that many attacks span multiple IT systems, user accounts and threat vectors.
Achieving this level of visibility can be difficult with traditional security tools. Cynet 360 is an
integrated security solution offering advanced network analytics, which continuously monitors
network traffic, automatically detect malicious activity, and either respond to it automatically or
pass context-rich information to security staff.
Use Deception Technology
No network protection measures are 100% successful, and attackers will eventually succeed in
penetrating your network. Recognize this and place deception technology in place, which creates
decoys across your network, tempting attackers to ―attack‖ them, and letting you observe their
plans and techniques. You can use decoys to detect threats in all stages of the attack lifecycle:
data files, credentials and network connections.
Cynet 360 is an integrated security solution with built-in deception technology, which provides
both off-the-shelf decoy files and the ability to create decoys to meet your specific security
needs. , while taking into account your environment‘s security needs.
Cable
At the most local level, all signals in an Ethernet or other LAN are available on the cable for
anyone to intercept. Each LAN connector (such as a computer board) has a unique address; each
board and its drivers are programmed to label all packets from its host with its unique address (as
a sender's "return address") and to take from the net only those packets addressed to its host. But
removing only those packets addressed to a given host is mostly a matter of politeness; there is
little to stop a program from examining each packet as it goes by. A device called a packet
sniffer can retrieve all packets on the LAN. Alternatively, one of the interface cards can be
reprogrammed to have the supposedly unique address of another existing card on the LAN so
that two different cards will both fetch packets for one address. (To avoid detection, the rogue
card will have to put back on the net copies of the packets it has intercepted.) Fortunately (for
now), LANs are usually used only in environments that are fairly friendly, so these kinds of
attacks occur infrequently.
Clever attackers can take advantage of a wire's properties and read packets without any physical
manipulation. Ordinary wire (and many other electronic components) emit radiation. By a
process called inductance an intruder can tap a wire and read radiated signals without making
physical contact with the cable. A cable's signals travel only short distances, and they can be
blocked by other conductive materials. The equipment needed to pick up signals is inexpensive
and easy to obtain, so inductance threats are a serious concern for cable-based networks. For the
attack to work, the intruder must be fairly close to the cable; this form of attack is thus limited to
situations with reasonable physical access.
If the attacker is not close enough to take advantage of inductance, then more hostile measures
may be warranted. The easiest form of intercepting a cable is by direct cut. If a cable is severed,
all service on it stops. As part of the repair, an attacker can easily splice in a secondary cable that
then receives a copy of all signals along the primary cable. There are ways to be a little less
obvious but accomplish the same goal. For example, the attacker might carefully expose some of
the outer conductor, connect to it, then carefully expose some of the inner conductor and connect
to it. Both of these operations alter the resistance, called the impedance, of the cable. In the first
case, the repair itself alters the impedance, and the impedance change can be explained (or
concealed) as part of the repair. In the second case, a little social engineering can explain the
change. ("Hello, this is Matt, a technician with Bignetworks. We are changing some equipment
on our end, and so you might notice a change in impedance.")
Signals on a network are multiplexed, meaning that more than one signal is transmitted at a
given time. For example, two analog (sound) signals can be combined, like two tones in a
musical chord, and two digital signals can be combined by interleaving, like playing cards being
shuffled. A LAN carries distinct packets, but data on a WAN may be heavily multiplexed as it
leaves its sending host. Thus, a wiretapper on a WAN needs to be able not only to intercept the
desired communication but also to extract it from the others with which it is multiplexed. While
this can be done, the effort involved means it will be used sparingly.
Microwave
Microwave signals are not carried along a wire; they are broadcast through the air, making them
more accessible to outsiders. Typically, a transmitter's signal is focused on its corresponding
receiver. The signal path is fairly wide, to be sure of hitting the receiver. From a security
standpoint, the wide swath is an invitation to mischief. Not only can someone intercept a
microwave transmission by interfering with the line of sight between sender and receiver,
someone can also pick up an entire transmission from an antenna located close to but slightly off
the direct focus point.
A microwave signal is usually not shielded or isolated to prevent interception. Microwave is,
therefore, a very insecure medium. However, because of the large volume of traffic carried by
microwave links, it is unlikely but not impossible that someone will be able to separate an
individual transmission from all the others interleaved with it. A privately owned microwave
link, carrying only communications for one organization, is not so well protected by volume.
Satellite Communication
Satellite communication has a similar problem of being dispersed over an area greater than the
intended point of reception. Different satellites have different characteristics, but some signals
can be intercepted in an area several hundred miles wide and a thousand miles long. Therefore,
the potential for interception is even greater than with microwave signals. However, because
satellite communications are generally heavily multiplexed, the risk is small that any one
communication will be intercepted.
Optical Fiber
Optical fiber offers two significant security advantages over other transmission media. First, the
entire optical network must be tuned carefully each time a new connection is made. Therefore,
no one can tap an optical system without detection. Clipping just one fiber in a bundle will
destroy the balance in the network.
Second, optical fiber carries light energy, not electricity. Light does not emanate a magnetic
field as electricity does. Therefore, an inductive tap is impossible on an optical fiber cable. Just
using fiber, however, does not guarantee security, any more than does using encryption. The
repeaters, splices, and taps along a cable are places at which data may be available more easily
than in the fiber cable itself. The connections from computing equipment to the fiber may also be
points for penetration. By itself, fiber is much more secure than cable, but it has vulnerabilities
too.
Wireless
Wireless networking is becoming very popular, with good reason. With wireless (also known as
WiFi), people are not tied to a wired connection; they are free to roam throughout an office,
house, or building while maintaining a connection. Universities, offices, and even home users
like being able to connect to a network without the cost, difficulty, and inconvenience of running
wires. The difficulties of wireless arise in the ability of intruders to intercept and spoof a
connection.
As we noted earlier, wireless communications travel by radio. In the United States, wireless
computer connections share the same frequencies as garage door openers, local radios (typically
used as baby monitors), some cordless telephones, and other very short distance applications.
Although the frequency band is crowded, few applications are expected to be on the band from
any single user, so contention or interference is not an issue.
But the major threat is not interference; it is interception. A wireless signal is strong for
approximately 100 to 200 feet. To appreciate those figures, picture an ordinary ten-story office
building, ten offices "wide" by five offices "deep," similar to many buildings in office parks or
on university campuses. Assume you set up a wireless base station (receiver) in the corner of the
top floor. That station could receive signals transmitted from the opposite corner of the ground
floor. If a similar building were adjacent, the signal could also be received throughout that
building, too. Few people would care to listen to someone else's baby monitor, but many people
could and do take advantage of a passive or active wiretap of a network connection.
A strong signal can be picked up easily. And with an inexpensive, tuned antenna, a wireless
signal can be picked up several miles away. In other words, someone who wanted to pick up
your particular signal could do so from several streets away. Parked in a truck or van, the
interceptor could monitor your communications for quite some time without arousing suspicion.
Interception
Interception of wireless traffic is always a threat, through either passive or active wiretapping.
This illustrates how software faults may make interception easier than you might think. You may
react to that threat by assuming that encryption will address it. Unfortunately, encryption is not
always used for wireless communication, and the encryption built into some wireless devices is
not as strong as it should be to deter a dedicated attacker.
Theft of Service
Wireless also admits a second problem: the possibility of rogue use of a network connection.
Many hosts run the Dynamic Host Configuration Protocol (DHCP), by which a client negotiates
a one -time IP address and connectivity with a host. This protocol is useful in office or campus
settings, where not all users (clients) are active at any time. A small number of IP addresses can
be shared among users. Essentially the addresses are available in a pool. A new client requests a
connection and an IP address through DHCP, and the server assigns one from the pool.
This scheme admits a big problem with authentication. Unless the host authenticates users before
assigning a connection, any requesting client is assigned an IP address and network access.
(Typically, this assignment occurs before the user on the client workstation actually identifies
and authenticates to a server, so there may not be an authenticatable identity that the DHCP
server can demand.) The situation is so serious that in some metropolitan areas a map is
available, showing many networks accepting wireless connections.
Protocol Flaws
Internet protocols are publicly posted for scrutiny by the entire Internet community. Each
accepted protocol is known by its Request for Comment (RFC) number. Many problems with
protocols have been identified by sharp reviewers and corrected before the protocol was
established as a standard.
But protocol definitions are made and reviewed by fallible humans. Likewise, protocols are
implemented by fallible humans. For example, TCP connections are established through
sequence numbers. The client (initiator) sends a sequence number to open a connection, the
server responds with that number and a sequence number of its own, and the client responds with
the server's sequence number. That person could impersonate the client in an interchange.
Sequence numbers are incremented regularly, so it can be easy to predict the next number.
Impersonation
When we hear of ―impersonation,‖ we think of the act of deceiving someone by pretending to be
another person. In the context of social engineering and cyber security, impersonation has
evolved into a dangerous form of cyber-attack. Cyber criminals have been using it to gain access
to networks and systems to commit fraud and identity theft and sell data to the highest bidder on
the dark web.
Criminals known as ―pretexters‖ use the art of impersonation in many ways, playing the role of a
trusted individual to deceive their victims and gain access to sensitive information. The practice
of ―pretexting‖ is defined as presenting oneself as someone else to manipulate a recipient into
providing sensitive data such as passwords, credit card numbers, or other confidential
information.
Pretexting is also a common practice for gaining access to restricted systems or services.
Impersonators can play many roles during their careers, such as fellow employees, technicians,
IT support, auditors or managers. For a successful attack, the impersonator needs to carefully
research his target. Impersonation attacks take many forms and can target both individuals and
business entities.
Online Impersonation
Impersonating people online does not immediately classify as a criminal offence. For example,
although there are no federal online impersonation laws established yet, nine out of the 50 states
in the U.S. have legislation on the subject. In Texas, the act of using the name, online identity or
persona of another individual to defraud, harass, intimidate or threaten can be considered a
misdemeanor or third-degree felony punishable by a hefty fine, ban on using Internet-capable
devices or prison.
Online impersonation does not necessarily lead to fraud. Victims can experience defamation or
extreme embarrassment. More and more social media platforms see impersonation as a violation
of their terms of service and policy. According to Twitter‖s impersonation policy, ―accounts that
pose as another person, brand, or organization in a confusing or deceptive manner may be
permanently suspended.‖ Facebook says it does not condone this type of behavior in the
community and encourages users to report a profile or page that does not comply with their
policy.
Email impersonation and vishing (voice phishing)
The act of sending phony emails that appear to come from a reputable source to gain personal
information is known as email phishing. To convince recipients that the message is real,
attackers can impersonate well-known institutions (public or private) or individuals such as a co-
worker or boss.
Companies are a more profitable target for impersonation emails, in crimes such as business
email compromise (BEC), CEO fraud and whaling attacks. Attackers use emails carefully
tailored to look like they come from business owners, executives or human resources personnel,
asking their target to carry out money transfers, pay invoices, or send important data.
In most cases, criminals rely on spoofing the email address and display name. The attacker
chooses the name of a high-ranking individual from a business and sets up an email that looks
similar to the victim‖s. Impersonators can use publicly available information such as a name
from LinkedIn to target people in an organization.
Commonly known as phone scams, vishing is also a popular attack vector among impersonators.
The phone call can be from someone pretending to be represent a bank, credit card company,
debt collector, healthcare provider and pretty much any other service or financial institution.
Tips to protect against impersonation attacks
Fighting online impersonation can be very difficult. Social media platforms and websites are
riddled with personal identifiable information, and a threat actor only needs basic access to this
information to impersonate you. A name or phone number will sometimes suffice. Constantly
monitoring your digital footprint and social media accounts is necessary.
When it comes to email impersonation attacks, awareness is key. Perpetrators can play the role
of a friend and send you an email asking you to click on a link, download an attachment or
transfer money. If you see an email from a friend that fits the M.O., call your friend and ask if
the message is legit. The same goes for emails or phone calls from ―your bank‖ or financial
institution that ask you to provide sensitive information over the phone or via a ―secure link‖.
Be suspicious about unsolicited messages and keep in mind that banks will usually call you in
the office to fill out any additional info. Double-check the email address before responding to
any requests and immediately report or flag it if suspicious. Email security solutions that block
spam or malicious attachments before reaching your computer have become a necessity.
Businesses and employees should always be vigilant and make sure that requests are verified
with the appropriate department. The IT department will not call to ask for the username and
password of your workstation to deliver a patch for your system. Workshops and training
employees on email best practices can also help filter out malicious content. If in doubt of the
validity of a request or unsure of authorization permission of an individual, contact a manager or
report the situation to the security staff on premise.
Both organizations and average users rely on a security solution that can protect them from
online phishing, fraud and malware attacks.
The ubiquity of social media complicates our ability to control our digital footprint, and our
identity. We no longer have the luxury of data privacy. Most online data is now public by default
and going private requires much effort.
plan for locating security controls to maximize their benefit to the company. Defines a process
for developing a network security architecture that includes four primary phases:
Assess: This phase of the process is for business and architecture reviews. The key steps in this
phase include data capture, business modeling, and risk assessments.
Design: This phase is intended to develop a response to the requirements and to build
customized logical design blueprints and recommendations.
Implement: This phase is for professional services, partners, etc. to add low-level design details
and deliver statement-of-works for real-world solutions.
Manage: This phase is geared towards continuous development and incremental improvements
of the security posture.
Network Security Architecture Frameworks
Network security architectures can be designed based on a few different frameworks. Two of the
most widely used models include zero trust and the Sherwood Applied Business Security
Architecture (SABSA).
Zero Trust
The zero trust security model is designed to replace traditional, perimeter-based security models
that place implicit trust in users, devices, and applications inside of the network. Zero trust
eliminates the network perimeter by treating all devices as potential threats regardless of their
location.
With zero trust architecture, all requests for access to corporate resources are evaluated on a
case-by-case basis. If the request is deemed legitimate based on role-based access controls
(RBACs) and other contextual data, then access is granted only to the requested asset at the
requested level for the duration of the current session.
A zero trust security architecture provides deep visibility and control over the actions performed
within the corporate network. This is accomplished using a combination of strong authentication
systems, including multi-factor authentication (MFA), and granular access control implemented
using micro-segmentation.
The Sherwood Applied Business Security Architecture (SABSA)
SABSA is a model for developing a security architecture based upon risk and business security
needs. The model identifies business security requirements at the beginning of the process and
works to trace them throughout the entire process of designing, implementing, and maintaining a
security architecture.
SABSA includes a matrix for security infrastructure modeling. This includes multiple different
layers (contextual, conceptual, logical, physical, component, and operational) and questions to be
asked (what, why, how, who, where, and when). At each intersection, the model defines the
component of the security architecture that should address that question at that layer.
Architecting Network Security with Check Point
For nearly thirty years, Check Point has set the standard for cybersecurity. Across the ever-
evolving digital world, from enterprise networks through cloud transformations, from securing
remote employees to defending critical infrastructures, we protect organizations from the most
imminent cyber threats.
Encryption
Encryption is a way of scrambling data so that only authorized parties can understand the
information. In technical terms, it is the process of converting human-readable plaintext to
incomprehensible text, also known as ciphertext. In simpler terms, encryption takes readable data
and alters it so that it appears random. Encryption requires the use of a cryptographic key: a set
of mathematical values that both the sender and the recipient of an encrypted message agree on.
Although encrypted data appears random, encryption proceeds in a logical, predictable way,
allowing a party that receives the encrypted data and possesses the right key to decrypt the data,
turning it back into plaintext. Truly secure encryption will use keys complex enough that a third
party is highly unlikely to decrypt or break the ciphertext by brute force — in other words, by
guessing the key.
Data can be encrypted "at rest," when it is stored, or "in transit," while it is being transmitted
somewhere else.
Properties of Trustworthy Encryption Systems
1. It is based on sound mathematics:
Good cryptographic algorithms are not just invented. They are derived from solid principles.
2. It has been analyzed by competent experts and found to be sound even the best cryptographic
experts can think of only so many possible attacks. The developers may become too convinced
of the strength of their own algorithm. A review by critical outside experts is essential.
3. It has stood the ―test of time‖.
As new algorithm gains popularity, people continue to review both its mathematical foundations
and the way that it builds upon those foundations.
Although a long period of successful use and analysis is not a guarantee of a good algorithm, the
flaws in many algorithms are discovered relative soon after their release.
Three algorithms are popular in the commercial world, namely
DES (data encryption standard),
RSA (Rivest-Shamir-Adelman),
AES (advanced encryption standard).
Encryption Systems are classified based on types of Key and based on block. Based on key two
classifications are
1. Symmetric Key Encryption-Same key (Public key) used for both Encryption and
Decryption
2. Asymmetric Key Encryption-For Encryption and Decryption two separate key are used
(Public key and Private Key)
Based on block two classifications are
1. Stream Cipher - characters are processed one at a time.
2. Block Cipher - A fixed size block is extracted from the whole plain text and then, the
character is processed one at a time. We will start to see the significance of this
classification once we start digging into the algorithm demonstrations.
works like a filter that turns all your data into "gibberish". Even if someone were to get their
hands on your data, it would be useless.
What are the benefits of a VPN connection?
A VPN connection disguises your data traffic online and protects it from external access.
Unencrypted data can be viewed by anyone who has network access and wants to see it. With a
VPN, hackers and cyber criminals can‘t decipher this data.
Secure encryption: To read the data, you need an encryption key. Without one, it would take
millions of years for a computer to decipher the code in the event of a brute force attack. With
the help of a VPN, your online activities are hidden even on public networks.
Disguising your whereabouts: VPN servers essentially act as your proxies on the internet.
Because the demographic location data comes from a server in another country, your actual
location cannot be determined. In addition, most VPN services do not store logs of your
activities. Some providers, on the other hand, record your behavior, but do not pass this
information on to third parties. This means that any potential record of your user behavior
remains permanently hidden.
Access to regional content: Regional web content is not always accessible from everywhere.
Services and websites often contain content that can only be accessed from certain parts of the
world. Standard connections use local servers in the country to determine your location. This
means that you cannot access content at home while traveling, and you cannot access
international content from home. With VPN location spoofing, you can switch to a server to
another country and effectively ―change‖ your location.
Secure data transfer: If you work remotely, you may need to access important files on your
company‘s network. For security reasons, this kind of information requires a secure connection.
To gain access to the network, a VPN connection is often required. VPN services connect to
private servers and use encryption methods to reduce the risk of data leakage.
Why should you use a VPN connection?
Your ISP usually sets up your connection when you connect to the internet. It tracks you via an
IP address. Your network traffic is routed through your ISP's servers, which can log and display
everything you do online.
Your ISP may seem trustworthy, but it may share your browsing history with advertisers, the
police or government, and/or other third parties. ISPs can also fall victim to attacks by cyber
criminals: If they are hacked, your personal and private data can be compromised.
This is especially important if you regularly connect to public Wi-Fi networks. You never know
who might be monitoring your internet traffic and what they might steal from you, including
passwords, personal data, payment information, or even your entire identity.
What should a good VPN do?
You should rely on your VPN to perform one or more tasks. The VPN itself should also be
protected against compromise. These are the features you should expect from a comprehensive
VPN solution:
Encryption of your IP address: The primary job of a VPN is to hide your IP address from your
ISP and other third parties. This allows you to send and receive information online without the
risk of anyone but you and the VPN provider seeing it.
Encryption of protocols: A VPN should also prevent you from leaving traces, for example, in
the form of your internet history, search history and cookies. The encryption of cookies is
especially important because it prevents third parties from gaining access to confidential
information such as personal data, financial information and other content on websites.
Kill switch: If your VPN connection is suddenly interrupted, your secure connection will also be
interrupted. A good VPN can detect this sudden downtime and terminate preselected programs,
reducing the likelihood that data is compromised.
Two-factor authentication: By using a variety of authentication methods, a strong VPN checks
everyone who tries to log in. For example, you might be prompted to enter a password, after
which a code is sent to your mobile device. This makes it difficult for uninvited third parties to
access your secure connection.
What kinds of VPNs are there?
There are many different types of VPNs, but you should definitely be familiar with the three
main types:
SSL VPN
Often not all employees of a company have access to a company laptop they can use to work
from home. During the corona crisis in Spring 2020, many companies faced the problem of not
having enough equipment for their employees. In such cases, use of a private device (PC, laptop,
tablet, mobile phone) is often resorted to. In this case, companies fall back on an SSL-VPN
solution, which is usually implemented via a corresponding hardware box.
The prerequisite is usually an HTML-5-capable browser, which is used to call up the company's
login page. HTML-5 capable browsers are available for virtually any operating system. Access is
guarded with a username and password.
Site-to-site VPN
A site-to-site VPN is essentially a private network designed to hide private intranets and allow
users of these secure networks to access each other's resources.
A site-to-site VPN is useful if you have multiple locations in your company, each with its own
local area network (LAN) connected to the WAN (Wide Area Network). Site-to-site VPNs are
also useful if you have two separate intranets between which you want to send files without users
from one intranet explicitly accessing the other.
Site-to-site VPNs are mainly used in large companies. They are complex to implement and do
not offer the same flexibility as SSL VPNs. However, they are the most effective way to ensure
communication within and between large departments.
Client-to-Server VPN
Connecting via a VPN client can be imagined as if you were connecting your home PC to the
company with an extension cable. Employees can dial into the company network from their
home office via the secure connection and act as if they were sitting in the office. However, a
VPN client must first be installed and configured on the computer.
This involves the user not being connected to the internet via his own ISP, but establishing a
direct connection through his/her VPN provider. This essentially shortens the tunnel phase of the
VPN journey. Instead of using the VPN to create an encryption tunnel to disguise the existing
internet connection, the VPN can automatically encrypt the data before it is made available to the
user.
This is an increasingly common form of VPN, which is particularly useful for providers of
insecure public WLAN. It prevents third parties from accessing and compromising the network
connection and encrypts data all the way to the provider. It also prevents ISPs from accessing
data that, for whatever reason, remains unencrypted and bypasses any restrictions on the user's
internet access (for instance, if the government of that country restricts internet access).
The advantage of this type of VPN access is greater efficiency and universal access to company
resources. Provided an appropriate telephone system is available, the employee can, for example,
connect to the system with a headset and act as if he/she were at their company workplace. For
example, customers of the company cannot even tell whether the employee is at work in the
company or in their home office.
There are two specific requirements of key management for public key cryptography.
Secrecy of private key: Throughout the key lifecycle, secret keys must remain secret from all
parties except those who are owner and are authorized to use them.
Assurance of public keys: In public key cryptography, the public keys are in open domain and
seen as public pieces of data. By default there are no assurances of whether a public key is
correct, with whom it can be associated, or what it can be used for. Thus key management of
public keys needs to focus much more explicitly on assurance of purpose of public keys.
Cryptography and Network Security Page 15
Srinivas University BCA V Semester
The most crucial requirement of ‗assurance of public key‘ can be achieved through the public-
key infrastructure (PKI), a key management systems for supporting public-key cryptography.
Public Key Infrastructure (PKI)
PKI provides assurance of public key. It provides the identification of public keys and their
distribution. An anatomy of PKI comprises of the following components.
Public Key Certificate, commonly referred to as ‗digital certificate‘.
Private Key tokens.
Certification Authority.
Registration Authority.
Certificate Management System.
Digital Certificate
For analogy, a certificate can be considered as the ID card issued to the person. People use ID
cards such as a driver's license, passport to prove their identity. A digital certificate does the
same basic thing in the electronic world, but with one difference.
Digital Certificates are not only issued to people but they can be issued to computers, software
packages or anything else that need to prove the identity in the electronic world.
Digital certificates are based on the ITU standard X.509 which defines a standard certificate
format for public key certificates and certification validation. Hence digital certificates are
sometimes also referred to as X.509 certificates.
Public key pertaining to the user client is stored in digital certificates by The Certification
Authority (CA) along with other relevant information such as client information, expiration date,
usage, issuer etc.
CA digitally signs this entire information and includes digital signature in the certificate.
Anyone who needs the assurance about the public key and associated information of client, he
carries out the signature validation process using CA‘s public key. Successful validation assures
that the public key given in the certificate belongs to the person whose details are given in the
certificate.
The process of obtaining Digital Certificate by a person/entity is depicted in the following
illustration.
As shown in the illustration, the CA accepts the application from a client to certify his public
key. The CA, after duly verifying identity of client, issues a digital certificate to that client.
Certifying Authority (CA)
As discussed above, the CA issues certificate to a client and assist other users to verify the
certificate. The CA takes responsibility for identifying correctly the identity of the client asking
for a certificate to be issued, and ensures that the information contained within the certificate is
correct and digitally signs it.
Key Functions of CA
The key functions of a CA are as follows −
Generating key pairs − The CA may generate a key pair independently or jointly with the client.
Issuing digital certificates − The CA could be thought of as the PKI equivalent of a passport
agency − the CA issues a certificate after client provides the credentials to confirm his identity.
The CA then signs the certificate to prevent modification of the details contained in the
certificate.
Publishing Certificates − The CA need to publish certificates so that users can find them. There
are two ways of achieving this. One is to publish certificates in the equivalent of an electronic
telephone directory. The other is to send your certificate out to those people you think might
need it by one means or another.
Verifying Certificates − The CA makes its public key available in environment to assist
verification of his signature on clients‘ digital certificate.
Revocation of Certificates − At times, CA revokes the certificate issued due to some reason such
as compromise of private key by user or loss of trust in the client. After revocation, CA
maintains the list of all revoked certificate that is available to the environment.
Classes of Certificates
There are four typical classes of certificate −
Class 1 − These certificates can be easily acquired by supplying an email address.
Class 2 − These certificates require additional personal information to be supplied.
Class 3 − These certificates can only be purchased after checks have been made about the
requestor‘s identity.
Class 4 − They may be used by governments and financial organizations needing very high
levels of trust.
Registration Authority (RA)
CA may use a third-party Registration Authority (RA) to perform the necessary checks on the
person or company requesting the certificate to confirm their identity. The RA may appear to the
client as a CA, but they do not actually sign the certificate that is issued.
Certificate Management System (CMS)
It is the management system through which certificates are published, temporarily or
permanently suspended, renewed, or revoked. Certificate management systems do not normally
delete certificates because it may be necessary to prove their status at a point in time, perhaps for
legal reasons. A CA along with associated RA runs certificate management systems to be able to
track their responsibilities and liabilities.
Private Key Tokens
While the public key of a client is stored on the certificate, the associated secret private key can
be stored on the key owner‘s computer. This method is generally not adopted. If an attacker
gains access to the computer, he can easily gain access to private key. For this reason, a private
key is stored on secure removable storage token access to which is protected through a password.
Different vendors often use different and sometimes proprietary storage formats for storing keys.
For example, Entrust uses the proprietary .epf format, while Verisign, GlobalSign, and Baltimore
use the standard .p12 format.
Hierarchy of CA
With vast networks and requirements of global communications, it is practically not feasible to
have only one trusted CA from whom all users obtain their certificates. Secondly, availability of
only one CA may lead to difficulties if CA is compromised.
In such case, the hierarchical certification model is of interest since it allows public key
certificates to be used in environments where two communicating parties do not have trust
relationships with the same CA.
The root CA is at the top of the CA hierarchy and the root CA's certificate is a self-signed
certificate.
The CAs, which are directly subordinate to the root CA (For example, CA1 and CA2) have CA
certificates that are signed by the root CA.
The CAs under the subordinate CAs in the hierarchy (For example, CA5 and CA6) have their
CA certificates signed by the higher-level subordinate CAs.
Certificate authority (CA) hierarchies are reflected in certificate chains. A certificate chain traces
a path of certificates from a branch in the hierarchy to the root of the hierarchy.
The following illustration shows a CA hierarchy with a certificate chain leading from an entity
certificate through two subordinate CA certificates (CA6 and CA3) to the CA certificate for the
root CA.
Verifying a certificate chain is the process of ensuring that a specific certificate chain is valid,
correctly signed, and trustworthy. The following procedure verifies a certificate chain, beginning
with the certificate that is presented for authentication −
A client whose authenticity is being verified supplies his certificate, generally along with the
chain of certificates up to Root CA.
Verifier takes the certificate and validates by using public key of issuer. The issuer‘s public key
is found in the issuer‘s certificate which is in the chain next to client‘s certificate.
Now if the higher CA who has signed the issuer‘s certificate, is trusted by the verifier,
verification is successful and stops here.
Else, the issuer's certificate is verified in a similar manner as done for client in above steps. This
process continues till either trusted CA is found in between or else it continues till Root CA.
The channel created in the last step is then used to securely negotiate the way the IP circuit will
encrypt data across the IP circuit.
Now, the IKE Phase 2 is conducted over the secure channel in which the two hosts negotiate the
type of cryptographic algorithms to use on the session and agreeing on secret keying material to
be used with those algorithms.
Then the data is exchanged across the newly created IPsec encrypted tunnel. These packets are
encrypted and decrypted by the hosts using IPsec SAs.
When the communication between the hosts is completed or the session times out then the IPsec
tunnel is terminated by discarding the keys by both the hosts.
IP Security Architecture
IPSec (IP Security) architecture uses two protocols to secure the traffic or data flow. These
protocols are ESP (Encapsulation Security Payload) and AH (Authentication Header). IPSec
Architecture includes protocols, algorithms, DOI, and Key Management. All these components
are very important in order to provide the three main services:
Confidentiality
Authentication
Integrity
IP Security Architecture:
1. Architecture:
Architecture or IP Security Architecture covers the general concepts, definitions, protocols,
algorithms and security requirements of IP Security technology.
2. ESP Protocol: ESP(Encapsulation Security Payload) provide the confidentiality service.
Encapsulation Security Payload is implemented in either two ways:
ESP with optional Authentication.
ESP with Authentication.
Packet Format
Authentication Header covers the packet format and general issue related to the use of AH for
packet authentication and integrity.
5. Authentication Algorithm:
Authentication Algorithm contains the set of the documents that describe authentication
algorithm used for AH and for the authentication option of ESP.
6. DOI (Domain of Interpretation):
DOI is the identifier which support both AH and ESP protocols. It contains values needed for
documentation related to each other.
7. Key Management:
Key Management contains the document that describes how the keys are exchanged between
sender and receiver.
address. Similarly, if the next header is an IP header, the outer header and the inner IP header can
be used to determine IPsec policy.
Tunnel mode works only for IP-in-IP datagrams. Tunneling in tunnel mode can be useful when
computer workers at home are connecting to a central computer location. In tunnel mode, IPsec
policy is enforced on the contents of the inner IP datagram. Different IPsec policies can be
enforced for different inner IP addresses. That is, the inner IP header, its next header, and the
ports that the next header supports, can enforce a policy. Unlike transport mode, in tunnel mode
the outer IP header does not dictate the policy of its inner IP datagram.
Therefore, in tunnel mode, IPsec policy can be specified for subnets of a LAN behind a router
and for ports on those subnets. IPsec policy can also be specified for particular IP addresses, that
is, hosts, on those subnets. The ports of those hosts can also have a specific IPsec policy.
However, if a dynamic routing protocol is run over a tunnel, do not use subnet selection or
address selection because the view of the network topology on the peer network could change.
Changes would invalidate the static IPsec policy. For examples of tunneling procedures that
include configuring static routes, see Protecting a VPN With IPsec.
In Oracle Solaris, tunnel mode can be enforced only on an IP tunneling network interface. For
information about tunneling interfaces. The ipsecconf command provides a tunnel keyword to
select an IP tunneling network interface. When the tunnel keyword is present in a rule, all
selectors that are specified in that rule apply to the inner packet.
In transport mode, ESP, AH, or both, can protect the datagram.
The following figure shows an IP header with an unprotected TCP packet.
Unprotected IP Packet Carrying TCP Information
In transport mode, ESP protects the data as shown in the following figure. The shaded area
shows the encrypted part of the packet.
Protected IP Packet Carrying TCP Information
The ipsecconf command includes keywords to set tunnels in tunnel mode or transport mode.
Note: When you specify the AH protocol, only packet authentication (providing data integrity) is
enabled. When you specify the ESP protocol, both packet authentication and packet encryption
(providing data privacy) can be enabled.
At least two security associations, inbound and outbound, are required between end-stations.
Security associations are stored in the Security Association Database (SAD) when IPsec is
enabled on an end-station. Security associations are created from security policies.
Authentication Header covers the packet format and general issue related to the use of AH for
packet authentication and integrity.
Explanation
Security Parameters Index (32 bits) − Identifies a security association. This field is mandatory.
The value of zero is reserved for local, implementation- specific use and MUST NOT be sent on
the wire.
Sequence Number (32 bits) − A monotonically increasing counter value; this provides an anti-
replay function, as discussed for AH. The first packet sent using a given SA will have a
Sequence number of 1.
Payload Data (variable) − This is a transport-level segment (transport mode) or IP packet
(tunnel mode) that is protected by encryption. The type of content that was protected is indicated
by the Next Header field.
Padding (0-255 bytes) − Padding for encryption, to extend the payload data to a size that fits the
encryption's cipher block size, and to align the next field.
Pad Length (8 bits) − Indicates the number of pad bytes immediately preceding this field.
Next Header (8 bits) − Identifies the type of data contained in the payload data field by
identifying the first header in that payload.
4.9 Assignment-4
Multiple Choice Questions
1. Which controls incoming and outgoing traffic on networks, with predetermined security
rules?
(A) Firewall (B) IP (C) Network (D) TCP
2. What is Full form of RBAC in Network Protection?
(A) Rule Based Access Control (B) Role Based Access Control
(C) Random Based Access Control (D) Rotation Based Access Control
3. Which can detect or prevent network security attacks such as brute force attacks, Denial
of Service (DoS) attacks and exploits of known vulnerabilities?
(A) IPS Technologies (B) DLP (C) Authorization (D) Access Control
4. ―Attackers gain access to a network and can monitor or steal sensitive information, but
without making any change to the data, leaving it intact‖- Which type of attack it is?
(A) Active (B) Passive (C) DOS (D) Brute Force
5. What is full form of VLAN?
(A) Variable Local Area Networks (B) Virtual Local Area Networks
(C) Virtual Locational Area Networks (D) Virtual Local Access Networks
6. Which type of signals are not carried along a wire; they are broadcast through the air,
making them more accessible to outsiders?
(A) Small Signals (B) Large Signals (C) Air Signals (D) Microwave
7. Which is also a common practice for gaining access to restricted systems or services?
(A) Man in Middle Attack (B) Cyber Attack (C) Pretexting (D) Post texting
8. Which is a way of scrambling data so that only authorized parties can understand the
information?
(A) Encryption (B) Decryption (C) Plaintext (D) Scrambling Text
9. Full form of ARPANET?
(A) Advanced Research Projects Agency Network
(B) Advanced Research Project and Network
(C) Advanced reorganized Plan Agency Network
(D) Added Research Project Agency Network
10. Identify Odd man out from the following
(A) Publishing Certificates (B) Verifying Certificates
(C) Revocation of Certificates (D) Authorized Certificates
11. Identify Odd man out from the following
(A) Class1 Certificate (B) Class 2 Certificate
(C) Class3 Certificates (D) Class 5 Certificates
12. What is full form of IETF in connection with IPSec?
(A) Internet Engineering Task Force (B) Intranet Engineering Task Force
(C) Internal Engineering Task Force (D) Internal Enforcement Task Force
13. Which provides data integrity, authentication and anti-replay in IPSec?
(A) Authentication Header (B) Authentication Protocol
(C) Authorization (D) Availability
14. What is full form of ESP?
(A) Encrypted System Protocol (B) Encapsulation Security Payload
(C) Encrypted Standard Protocol (D) Encapsulation Security Protocol
15. What is the one word used for Extra bits or space added to the original message in order
to ensure confidentiality?
(A) Combining (B) Integrating (C) Join (D) Padding
16. Which mode works only for IP-in-IP datagrams?
(A) Tunnel (B) Transport (C) Transmission (D) Network
17. Who is known by the name crackers in the context of Computer Security?
(A) Black Hat Hackers (B) White Hat Hackers (C) Elite Hackers (D) Script Kiddle
18. In computing, which is a network security system that monitors and controls incoming?
and outgoing network traffic based on predetermined security rules?
(A) Spyware (B) Cookie (C) Spam (D) Firewall
19. A Computer Virus is a
(A) Hardware (B) Software (C) Bacteria (D) Freeware
20. Network security architecture does not include
(A) Access (B) Design (C) Implement (D) Execute
21. What is full form of SD-WAN?
(A) Software-defined Wide Area Network
(B) Software-demand Wide Area Network
(C) Standard- defined Wide Area Network
(D) Simulation-defined Wide Area Network
22. Which is a cybersecurity practice where you run code or open files in a safe, isolated
environment?
(A) Hard box (B) Soft Box (C) Sandboxing (D) Cipher Text
23. DMZ stands for?