Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 8

A PAPER PRESENTATION ON

PRESENTED BY

R.SIVA ALEKYA P.DEEPTI

08BQ1A0567

08BQ1A0562

VASIREDDY VENKATADRY INSTITUTE OF TECHNOLOGY,

NAMBUR, GUNTUR (DIST)

1
Network Security and and offers practical guidelines you
can put into place today to protect your
Abstract company's infrastructure and critical
Network security is a complicated data in the future.
subject, historically only tackled by
well-trained and experienced experts.
However, as more and more people
become ``wired'', an increasing number Contents
of people need to understand the basics
of security in a networked world. This • Introduction To The Networking
document explains the concepts needed • The Internet
to read through the hype in the
• Threats for The Network
marketplace and understand risks and
how to deal with them. Some history of • Possible Sources of The Threats
networking is included, as well as an • Firewalls
introduction to TCP/IP and
internetworking . We go on to consider • Types of Firewalls
risk management, network threats, • Application Gateways
firewalls, and more special-purpose
precautions against networking threats. • Packet Filtering
This is not intended to be a ``frequently • Precautions to be Taken
asked questions'' reference, nor is it a
``hands-on'' document describing how to • Applications
accomplish specific functionality. It is • Conclusion
hoped that the reader will have a wider
• References
perspective on security in general, and
better understand how to reduce and
manage risk personally, at home, and in
the workplace. These days, computer
security is a serious and complex Introduction to Networking
business. True security requires the A basic understanding of computer
coordination of staff and technology networks is requisite in order to
across the enterprise infrastructure, as understand the principles of network
well as educated and cooperative users. security. In this section, we'll cover
But even the best of information security some of the foundations of computer
policies and plans will fail if the networking, then move on to an
underlying network is not secure. You overview of some popular networks.
may think you are doing all you can to Following that, we'll take a more in-
protect your network, but think again. depth look at TCP/IP, the network
Security dangers you're not even aware protocol suite that is used to run the
can be lurking in every corner of your Internet and many intranets.
network. This package provides you
Once we've covered this, we'll go back
with an overview of network security,
and discuss some of the threats that
including firewalls, intrusion detection,
managers and administrators of

2
computer networks need to confront, and
then some tools that can be used to
reduce the exposure to the risks of
network computing. Threats for the Network:
A ``network'' has been defined as ``any There are many creative ways that
set of interlinking lines resembling a net, unscrupulous people use to access or
a network of roads an interconnected abuse unprotected computers:
system, a network of alliances.'' This
definition suits our purpose well: a
• Remote login - When
computer network is simply a system of someone is able to connect to your
interconnected computers. How they're computer and control it in some form.
connected is irrelevant, and as we'll soon This can range from being able to view
see, there are a number of ways to do or access your files to actually running
this programs on your computer.
• Application backdoors - Some
The Internet
programs have special features that
Internet: This is a word that we've heard allow for remote access. Others contain
way too often in the last few years. bugs that provide a backdoor or hidden
Movies, books, newspapers, magazines, access, that provides some level of
television programs, and practically control of the program.
every other sort of media imaginable
have dealt with the Internet recently. • SMTP session hijacking -
SMTP is the most common method of
sending e-mail over the Internet. By
gaining access to a list of e-mail
addresses, a person can send unsolicited
junk e-mail (spam) to thousands of
users. This is done quite often by
redirecting the e-mail through the SMTP
server of an unsuspecting host, making
the actual sender of the spam difficult to
trace.
• Operating system bugs - Like
applications, some operating systems
have backdoors. Others provide remote
access with insufficient security controls
or have bugs that an experienced hacker
can take advantage of.
• Denial of service - You have
probably heard this phrase used in news
reports on the attacks on major Web
sites. This type of attack is nearly
impossible to counter. What happens is
that the hacker sends a request to the
server to connect to it. When the server
responds with an acknowledgement and

3
tries to establish a session, it cannot find determined by the routers along that
the system that made the request. By path. But the source providing the packet
inundating a server with these can arbitrarily specify the route that the
unanswerable session requests, a hacker packet should travel. Hackers sometimes
causes the server to slow to a crawl or take advantage of this to make
eventually crash. information appear to come from a
trusted source or even from inside the
• E-mail bombs - An e-mail bomb
network! Most firewall products disable
is usually a personal attack. Someone
source routing by default.
sends you the same e-mail hundreds or
thousands of times until your e-mail Possible Sources of Threats
system cannot accept any more
How, though, does an attacker gain
messages.
access to your equipment? Through any
• Macros - To simplify connection that you have to the outside
complicated procedures, many world. This includes Internet
applications allow you to create a script connections, dial-up modems, and even
of commands that the application can physical access. (How do you know that
run. This script is known as a macro. one of the temps that you've brought in
Hackers have taken advantage of this to to help with the data entry isn't really a
create their own macros that, depending system cracker looking for passwords,
on the application, can destroy your data data phone numbers, vulnerabilities and
or crash your computer. anything else that can get him access to
your equipment?)
• Viruses - Probably the most
well-known threat is computer viruses. In order to be able to adequately address
A virus is a small program that can copy security, all possible avenues of entry
itself to other computers. This way it can must be identified and evaluated. The
spread quickly from one system to the security of that entry point must be
next. Viruses range from harmless consistent with your stated policy on
messages to erasing all of your data. acceptable risk levels.
• Spam - Typically harmless but
always annoying, spam is the electronic Firewalls
equivalent of junk mail. Spam can be
dangerous though. Quite often it
contains links to Web sites. Be careful of
clicking on these because you may
accidentally accept a cookie that
provides a backdoor to your computer.
• Redirect bombs - Hackers can
use ICMP to change (redirect) the path
information takes by sending it to a
different router. This is one of the ways
that a denial of service attack is set up.
As we've seen in our discussion of the
• Source routing - In most cases, Internet and similar networks,
the path a packet travels over the connecting an organization to the
Internet (or any other network) is Internet provides a two-way flow of

4
traffic. This is clearly undesirable in
many organizations, as proprietary
information is often displayed freely
Packet Filtering
within a corporate intranet (that is, a Packet filtering is a technique whereby
TCP/IP network, modeled after the routers have ACLs (Access Control
Internet that only works within the Lists) turned on. By default, a router will
organization). pass all traffic sent it, and will do so
without any sort of restrictions.
In order to provide some level of
Employing ACLs is a method for
separation between an organization's
enforcing your security policy with
intranet and the Internet, firewalls have
regard to what sorts of access you allow
been employed. A firewall is simply a
the outside world to have to your
group of components that collectively
internal network, and vice versa.
form a barrier between two networks.
There is less overhead in packet filtering
A number of terms specific to firewalls
than with an application gateway,
and networking are going to be used
because the feature of access control is
throughout this section, so let's introduce
performed at a lower ISO/OSI layer
them all together.
(typically, the transport or session layer).
Due to the lower overhead and the fact
that packet filtering is done with routers,
which are specialized computers
optimized for tasks related to
networking, a packet filtering gateway is
Types of Firewalls often much faster than its application
layer cousins. Figure above shows a
There are three basic types of firewalls, packet filtering gateway.
and we'll consider each of them.
Because we're working at a lower level,
Application Gateways supporting new applications either
The first firewalls were application comes automatically, or is a simple
gateways, and are sometimes known as matter of allowing a specific packet type
proxy gateways. These are made up of to pass through the gateway. (Not that
bastion hosts that run special software to the possibility of something
act as a proxy server. This software runs automatically makes it a good idea;
at the Application Layer of our old opening things up this way might very
friend the ISO/OSI Reference Model, well compromise your level of security
hence the name. Clients behind the below what your policy allows.)
firewall must be proxitized (that is, must There are problems with this method,
know how to use the proxy, and be though. Remember, TCP/IP has
configured to do so) in order to use absolutely no means of guaranteeing that
Internet services. Traditionally, these the source address is really what it
have been the most secure, because they claims to be. As a result, we have to use
don't allow anything to pass by default, layers of packet filters in order to
but need to have the programs written localize the traffic. We can't get all the
and turned on in order to begin passing way down to the actual host, but with
traffic. two layers of packet filters, we can

5
differentiate between a packet that came sometimes is, and this can needlessly
from the Internet and one that came from increase the severity of a break-in
our internal network. We can identify dramatically.
which network the packet came from Avoid systems with single points of
with certainty, but we can't get more failure
specific than that.
Any security system that can be broken
by breaking through any one component
isn't really very strong. In security, a
degree of redundancy is good, and can
help you protect your organization from
Precaution to be taken
a minor security breach becoming a
catastrophe.
Stay current with relevant operating
system patches
Precautions To Be Taken Be sure that someone who knows what
From looking at the sorts of attacks that you've got is watching the vendors'
are common, we can divine a relatively security advisories. Exploiting old bugs
short list of high-level practices that can is still one of the most common (and
help prevent security disasters, and to most effective!) means of breaking into
help control the damage in the event that systems.
preventative measures were unsuccessful
Watch for relevant security advisories
in warding off an attack.
In addition to watching what the vendors
Hope you have backups
are saying, keep a close watch on groups
This isn't just a good idea from a like CERT and CIAC. Make sure that at
security point of view. Operational least one person (preferably more) is
requirements should dictate the backup subscribed to these mailing lists
policy, and this should be closely
Have someone on staff be familiar
coordinated with a disaster recovery
with security practices
plan, such that if an airplane crashes into
your building one night, you'll be able to Having at least one person who is
carry on your business from another charged with keeping abreast of security
location. Similarly, these can be useful developments is a good idea. This need
in recovering your data in the event of an not be a technical wizard, but could be
electronic disaster: a hardware failure, or someone who is simply able to read
a breakin that changes or otherwise advisories issued by various incident
damages your data. response teams, and keep track of
various problems that arise. Such a
person would then be a wise one to
Don't put data where it doesn't need consult with on security related issues,
to be as he'll be the one who knows if web
Although this should go without saying, server software version such-and-such
this doesn't occur to lots of folks. As a has any known problems, etc.
result, information that doesn't need to This person should also know the ``dos''
be accessible from the outside world and ``don'ts'' of security, from reading

6
such things as the ``Site Security vendor. Ask any consultants you talk to
Handbook about their vendor affiliations,
The business of building firewalls is in certifications, and whatnot. Ask what
the process of becoming a commodity difference it makes to them whether you
market. Along with commodity markets choose one product over another, and
come lots of folks who are looking for a vice versa. And then ask yourself if a
way to make a buck without necessarily consultant who is certified in technology
knowing what they're doing. XYZ is going to provide you with
Additionally, vendors compete with each competing technology ABC, even if
other to try and claim the greatest ABC best fits your needs.
security, the easiest to administer, and
the least visible to end users. In order to
try to quantify the potential security of
Applications:
firewalls, some organizations have taken As government networks are becoming
to firewall certifications. The increasingly complex, they are more
certification of a firewall means nothing vulnerable to security breaches. Just like
more than the fact that it can be the commercial sector, the federal
configured in such a way that it can pass government has experienced dramatic
a series of tests. Similarly, claims about growth in the number of attacks on
meeting or exceeding U.S. Department information networks. According to
of Defense ``Orange Book'' standards, CERT, a federally-funded security
C-2, B-1, and such all simply mean that research institute, security incidents have
an organization was able to configure a grown at an annual rate of 94 percent
machine to pass a series of tests. This since 2000. With heightened national
doesn't mean that it was loaded with the security concerns, the government
vendor's software at the time, or that the recognizes that even random,
machine was even usable. In fact, one unclassified data can be re-constituted,
vendor has been claiming their operating allowing sensitive or classified
system is ``C-2 Certified'' didn't make information to be accessed and misused
mention of the fact that their operating by unauthorized users. This white paper
system only passed the C-2 tests without looks at how the government is seeking
being connected to any sort of network out best practices for securing mission
devices. critical data traversing its networks
Such gauges as market share, Conclusions
certification, and the like are no Security is a very difficult topic.
guarantees of security or quality. Taking Everyone has a different idea of what
a little bit of time to talk to some ``security'' is, and what levels of risk are
knowledgeable folks can go a long way acceptable. The key for building a secure
in providing you a comfortable level of network is to define what security means
security between your private network to your organization . Once that has
and the big, bad Internet. been defined, everything that goes on
Additionally, it's important to note that with the network can be evaluated with
many consultants these days have respect to that policy. Projects and
become much less the advocate of their systems can then be broken down into
clients, and more of an extension of the their components, and it becomes much

7
simpler to decide whether what is References:
proposed will conflict with your security
policies and practices. Books
Many people pay great amounts of lip 1. Network security
service to security, but do not want to be • Charlie Kaufman
bothered with it when it gets in their
way. It's important to build systems and • Radia perlman
networks in such a way that the user is • Mike speciner
not constantly reminded of the security 2. Corporate Computer And
system around him. Users who find Network Security
security policies and systems too
restrictive will find ways around them. • Raymond panko
It's important to get their feedback to Website:
understand what can be improved, and
it's important to let them know why www.howstuffworks .com
what's been done has been, the sorts of
risks that are deemed unacceptable, and
what has been done to minimize the
organization's exposure to them.
Security is everybody's business, and
only with everyone's cooperation, an
intelligent policy, and consistent
practices, will it be achievable

You might also like