🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 7 - 06 - Understand Different Types of Proxy Servers and their Benefits - 01_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Network Security Controls — Technical Controls Exam 212-82 Module Flow Discuss Essential Network Security Protocols Discuss Security Benefits of Network Segmentation Understand Different Types of Proxy Servers and their Benefits Discuss Fundamentals of VPN 7 an - T...

Certified Cybersecurity Technician Network Security Controls — Technical Controls Exam 212-82 Module Flow Discuss Essential Network Security Protocols Discuss Security Benefits of Network Segmentation Understand Different Types of Proxy Servers and their Benefits Discuss Fundamentals of VPN 7 an - T Understand Different Types of Firewalls and their Role &0 @ and its importance in Network Security ¢ B \ Discuss Other Network Security Controls | Understand Different Types of IDS/IPS and their Role Discuss Importance of Load Balancing in Network Security E\ Understand Different Types of Honeypots Understand Various Antivirus/Anti-malware Software Copyright © by L All Rights Reserved. ReproductionIs Strictly Prohibited. Understand Different Types of Proxy Sexvers and their Benefits Proxy servers play an important role in securing the servers connected to the Internet. They provide an additional layer of the security to the servers and reduce the probability of an attack on the servers. This section discusses proxy servers, their benefits, and types of proxy servers. Module 07 Page 877 Certified Cybersecurity Technician Copyright © by EG-Council Certified Cybersecurity Technician Network Security Controls — Technical Controls Exam 212-82 What are Proxy Servers? 01 I A proxy server is a dedicated computer, or a software system virtually located between a client and the actual 02 I It is a sentinel between an internal network and the open internet server 03 It serves clients requests on behalf of actual severs, thereby preventing actual servers from exposing themselves to the outside world 04 It provides an additional layer of defense to the network and can protect against certain operating system (OS) and web server specific attacks 05 Security professionals should deploy a proxy server to intercept malicious, offensive web content, computer viruses, etc., hidden in the client requests E==r==n..III.II'Ill.ll.ll.l.l..l.’...l"""""‘..l..'l.." RR Qo User Proxy Server Server Copyright © by EC-Councll. All Rights Reserved. Reproduction is Strictly Prohibited. What are Proxy Servers? A proxy server is an application that can serve as an intermediary when connecting with other computers. Security professionals should deploy a proxy server to intercept malicious, offensive web content, computer viruses, etc., hidden in the client requests. A proxy server is used: = As a firewall and to protect the local network from outside attacks. = To anonymously surf the web (to some extent). = To filter out unwanted content such as ads or “unsuitable” material (using specialized proxy servers). ®= To provide some protection against hacking attacks. How do proxy servers work? When a user uses a proxy for requesting a particular web page on an actual server, the proxy server receives it. It then sends this request to the actual server on behalf of the user’s request—it mediates between the user and the actual server to send and respond to the request. User Proxy Server Figure 7.86: Working of Proxy Module 07 Page 878 Certified Cybersecurity Technician Copyright © by EG-Council Certified Cybersecurity Technician Network Security Controls — Technical Controls Exam 212-82 A proxy server improves security, administrative control, and caching services. It is also used for evaluating the network traffic and maintaining user confidentiality. Proxy servers in an organization help in maintaining security and administrative However, attackers use proxy servers to hide their presence on the internet. Module 07 Page 879 controls. Certified Cybersecurity Technician Copyright © by EG-Gouncil Certified Cybersecurity Technician Network Security Controls — Technical Controls Exam 212-82 Benefits of Proxy Server 1 2 Acts as a security protector between the user devices and a server Enhances the security and privacy of client devices S 6 Controls access to specific types of restricted services 3 Improves the browsing speed Provides advanced logging capabilities for user activities 1 Hides internal IP addresses and filters requests from external sites 4 8 Reduces the chances of modifying cookies in the browser Enables authentication for the proxy servers before handling user configuration requests Benefits of Proxy Server The following are the benefits of using a proxy server while accessing a network: = |t acts as a security protector between the user devices and a server. = |t enhances the security and privacy of client devices. = |t improves the browsing speed. = |t provides advanced logging capabilities for user activities. = |tis used for controlling the access to specific types of restricted services. = |t helps the organization to hide its internal IP address. = |t reduces the chances of modifying cookies in the browser configuration and protects from any kind of malware. = |t filters requests from external sites. = |timproves the delivery of the requested web pages to the users. = |t enables authentication for the proxy servers before handling user requests and services. Module 07 Page 880 Certified Cybersecurity Technician Copyright © by EG-Gouncil Certified Cybersecurity Technician Network Security Controls — Technical Controls Exam 212-82 Functioning of a Proxy Sexver Q—‘ o ee Internal host requests to access a web site __, Therequest enters the proxy server which examines the header and packet content based on the rule base “J —= Server reconstructs the data packet with a different source IP address __, Proxy server transmits the packet to target address that conceals the actual end user who made the request If the data packet is returned, it is again sent to the proxy server to check with the rule base The returned packet is reconstructed by the proxy server and is sent to the source computer Copyright © by EC-: I. All Rights Reserved. Repr n Is Strictly Prohibited. Systems on internal network use a private address range Proxy Server £ 3. External Interface with registered IP ‘ address 24.67.233.7 L Internet et forwardedby the proxy Firewall i 4. Reply is forwarded by the proxytothe. requesting client 1. Request for a Web Page ". : : B - ’J 192.168.2.3 =]. 192.168.2.4 server 192.168.2.5 Copyright © by £ I. All Rights Reserv Functioning of a Proxy Server = The client first requests page. * The request for the web page is passed on to the proxy server, which checks the packet with its set of conventions for this service and decides whether the request is to be granted. Module 07 Page 881 a web page and recognizes the server that contains the web Certified Cybersecurity Technician Copyright © by EC-Council Certified Cybersecurity Technician Network Security Controls — Technical Controls Exam 212-82 = Once the proxy has made the decision to allow the request, a new packet is created with the source IP address of the proxy server. = This new packet is the request for the web page from the proxy server. The web server receives the request and returns the web page to the requesting host. = When the proxy receives the web page, it verifies its rules to determine whether this page is to be allowed. = Once the decision is made to proceed, the proxy creates a new packet with the web page as the payload and sends it to the original client. = This type of service significantly increases the security of the network, as no packets can travel directly from the client to the server. Systems on internal network use a private address range i : Proxy Server = address 24.67.233.7 vop........... 2. Request Is Internet forwarded by the proxy. — L 192.168.2.3 4. Reply Is forwarded by the proxy to the H requesting client cecesccsscssscnsasuns E...................................-:.....y.............................................................. T T \J - e [EESImEmEE H = e =S 3. External Interface with registered IP B LT I , AR v_—‘._w_(. y 1. Request for a Web Page Firewall 192.10824 server 192.168.2.5 Figure 7.87: Functioning of a Proxy Server Module 07 Page 882 Certified Cybersecurity Technician Copyright © by EG-Council

Use Quizgecko on...
Browser
Browser