🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 7 - 06 - Understand Different Types of Proxy Servers and their Benefits - 01_ocred_fax_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls Module Flow Discuss Essential N...

Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls Module Flow Discuss Essential Network Understand Different Types of Security Protocols Proxy Servers and their Benefits Discuss Fundamentals of VPN Discuss Security Benefits 7 an and its importance in Network of Network Segmentation - T ¢ Security &0 B Understand Different Types @ \ Discuss Other Network Security of Firewalls and their Role Controls | Understand Different Types Discuss Importance of Load of IDS/IPS and their Role E\ Balancing in Network Security Understand Different Types Understand Various of Honeypots Antivirus/Anti-malware Software Copyright © by L All Rights Reserved. ReproductionIs Strictly Prohibited. Understand Different Types of Proxy Sexvers and their Benefits Proxy servers play an important role in securing the servers connected to the Internet. They provide an additional layer of the security to the servers and reduce the probability of an attack on the servers. This section discusses proxy servers, their benefits, and types of proxy servers. Module 07 Page 877 Certified Cybersecurity Technician Copyright © by EG-Council Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls What are Proxy Servers? 01 I A proxy server is a dedicated computer, or a software system virtually located between a client and the actual server 02 I It is a sentinel between an internal network and the open internet 03 It serves clients requests on behalf of actual severs, thereby preventing actual servers from exposing themselves to the outside world 04 It provides an additional layer of defense to the network and can protect against certain operating system (OS) and web server specific attacks 05 Security professionals should deploy a proxy server to intercept malicious, offensive web content, computer viruses, etc., hidden in the client requests E==r==n..III.II'Ill.ll.ll.l.l..l.’...l"""""‘..l..'l.." RR Qo User Proxy Server Server Copyright © by EC-Councll. All Rights Reserved. Reproduction is Strictly Prohibited. What are Proxy Servers? A proxy server is an application that can serve as an intermediary when connecting with other computers. Security professionals should deploy a proxy server to intercept malicious, offensive web content, computer viruses, etc., hidden in the client requests. A proxy server is used: = As a firewall and to protect the local network from outside attacks. = To anonymously surf the web (to some extent). = To filter out unwanted content such as ads or “unsuitable” material (using specialized proxy servers). ®= To provide some protection against hacking attacks. How do proxy servers work? When a user uses a proxy for requesting a particular web page on an actual server, the proxy server receives it. It then sends this request to the actual server on behalf of the user’s request—it mediates between the user and the actual server to send and respond to the request. User Proxy Server Figure 7.86: Working of Proxy Module 07 Page 878 Certified Cybersecurity Technician Copyright © by EG-Council Certified Cybersecurity Technician Exam 212-82 Network Security Controls —- Technical Controls A proxy server improves security, administrative control, and caching services. It is also used for evaluating the network traffic and maintaining user confidentiality. Proxy servers in an organization help in maintaining security and administrative controls. However, attackers use proxy servers to hide their presence on the internet. Module Module 07 Page Page 879 Certified Cybersecurity Technician Copyright ©© by EG-Gounell Certified Cybersecurity EG-Gouncil Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls Benefits of Proxy Server 1 2 3 4 Acts as a security Enhances the security Improves the Provides advanced protector between the and privacy of client browsing speed logging capabilities for user devices and a devices user activities server S 6 Z1 8 Controls access to Hides internal IP Reduces the chances Enables authentication specific types of addresses and filters of modifying cookies for the proxy servers restricted services requests from external in the browser before handling user sites configuration requests Benefits of Proxy Server The following are the benefits of using a proxy server while accessing a network: = |t acts as a security protector between the user devices and a server. = |t enhances the security and privacy of client devices. = |t improves the browsing speed. = |t provides advanced logging capabilities for user activities. = |tis used for controlling the access to specific types of restricted services. = |t helps the organization to hide its internal IP address. = |t reduces the chances of modifying cookies in the browser configuration and protects from any kind of malware. = |t filters requests from external sites. = |timproves the delivery of the requested web pages to the users. = |t enables authentication for the proxy servers before handling user requests and services. Module 07 Page 880 Certified Cybersecurity Technician Copyright © by EG-Gouncil Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls Functioning of a Proxy Sexver @-‘ Q—‘ Internal host requests to access a web site o ee 99 __, Therequest enters the proxy server which examines the header and packet content based on the rule base “J “ ‘ —= Server reconstructs the data packet with a different source IP address __, Proxy server transmits the packet to target address that conceals the actual end user who made the request If the data packet is returned, it is again sent to the proxy server to check with the rule base The returned packet is reconstructed by the proxy server and is sent to the source computer Copyright © by EC-C: EC-: I. All Rights Reserved. Repr n Is Strictly Prohibited. Systems on Internal internal network use a private address range Proxy Server B ’J £ = i -. 192.168.2.3 3. External Interface 4. Reply is forwarded : with registered IP ‘ by the proxytothe bythe : address 24.67.233.7. requesting client =] 3 et el 1L 1. Request for a Web Page " 192.168.2.4. forwardedby Firewall Internet the proxy server 192.168.2.5 Copyright © by by £ I. All All Rights Rights Re: Reserv Functioning of a Proxy Server = The client first requests a web page and recognizes the server that contains the web page. =* The request for the web page is passed on to the proxy server, which checks the packet with its set of conventions for this service and decides whether the request is to be granted. Module 07 Page 881 Certified Cybersecurity Technician Copyright © by EC-Council Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls = Once the proxy has made the decision to allow the request, a new packet is created with the source IP address of the proxy server. = This new packet is the request for the web page from the proxy server. The web server receives the request and returns the web page to the requesting host. = When the proxy receives the web page, it verifies its rules to determine whether this page is to be allowed. = Once the decision is made to proceed, the proxy creates a new packet with the web page as the payload and sends it to the original client. = This type of service significantly increases the security of the network, as no packets can travel directly from the client to the server. Systems on internal network use a private address range i - Proxy Server : B \J H T — L = = - e. =S 192.168.2.3 3. External Interface 4. Reply Is forwarded with registered IP e by the proxy to the address 24.67.233.7 H requesting client.............................................................. AR vop [EESImEmEE cecesccsscssscnsasuns E...................................-:.....y ,............ T LT I v_—‘._w_( y 2. Request Is 1. Request for a Web Page forwarded by Firewall 192.10824 Internet the proxy server 192.168.2.5 Figure 7.87: Functioning of a Proxy Server Module 07 Page 882 Certified Cybersecurity Technician Copyright © by EG-Council

Use Quizgecko on...
Browser
Browser