Network Architecture - International & Access Foundation Programmes

Document Details

IssueFreeRadon6091

Uploaded by IssueFreeRadon6091

Technological University Dublin

Nevan Bermingham

Tags

network architecture computer science network security firewalls

Summary

This presentation discusses network architecture, focusing on network security concepts such as firewalls, TCP/UDP ports, and various attack types. It details the role of firewalls as security measures and explains different attacks like denial-of-service and packet sniffing.

Full Transcript

INTERNATIONAL & ACCESS FOUNDATION PROGRAMMES COMPUTER SCIENCE MODULE Semester I Part 5 Networks: Network Security © Nevan Bermingham Overview What is network security? Why do we need network security? Who is vulnerable? Common security attacks a...

INTERNATIONAL & ACCESS FOUNDATION PROGRAMMES COMPUTER SCIENCE MODULE Semester I Part 5 Networks: Network Security © Nevan Bermingham Overview What is network security? Why do we need network security? Who is vulnerable? Common security attacks and countermeasures Firewalls & Intrusion Detection Systems Denial of Service Attacks TCP Attacks (Spoofing) Packet Sniffing Social Engineering Why do we need security? Protect vital information while still allowing access to those who need it Trade secrets, medical records, personal data etc. Provide authentication and access control for resources Login, Passwords, Biometrics Guarantee availability of resources Uptime 99.995% reliability Firewalls Basic problem – many network applications and protocols have security problems that are fixed over time Difficult for users to keep up with changes and keep host secure Solution  Administrators limit access to end hosts by using a firewall  Firewall is kept up-to-date by administrators Firewalls A firewall is like a castle with a drawbridge Only one point of access into the network This can have positives and negatives Can be hardware or software Some routers come with firewall functionality Unix systems, Windows XP/7/8 and Mac OS X have built in software firewalls Firewalls Internet Firewall Firewall DMZ (De-Militarized Zone) Web server, email Intranet server, web proxy, etc Firewalls Used to filter packets based on rules These are called packet filtering firewalls There are other types too, but they will not be discussed Here is what a computer with a default Windows 7 install looks like:  135/tcp open loc-srv  139/tcp open netbios-ssn  445/tcp open microsoft-ds  1025/tcp open NFS-or-IIS  3389/tcp open ms-term-serv  5000/tcp open UPnP Transmission Control Protocol (TCP) & User Datagram Protocol (UDP) - PORTS In the internet protocol suite, a port is an endpoint of communication in an operating system. 1024 well-known port numbers are reserved by convention to identify specific service types on a host A port is always associated with an IP address of a host Example http://www.example.com:8080 http://72.56.123.233:80/  List of register ports Transmission Control Protocol (TCP) & User Datagram Protocol (UDP) - PORTS Typical TCP Ports  21: File Transfer Protocol (FTP)  22: Secure Shell (SSH)  23: Telnet remote login service  25: Simple Mail Transfer Protocol (SMTP)  53: Domain Name System (DNS) service  80: Hypertext Transfer Protocol (HTTP) used in the World Wide Web  110: Post Office Protocol (POP3)  119: Network News Transfer Protocol (NNTP)  123: Network Time Protocol (NTP)  143: Internet Message Access Protocol (IMAP)  161: Simple Network Management Protocol (SNMP)  194: Internet Relay Chat (IRC)  443: HTTP Secure (HTTPS) Types of Attack Intrusion Detection –  Used to monitor for “suspicious activity” on a network  Based on well known patterns of behavior Dictionary Attack – Brute Force  Dictionary attack on the passwords Denial of Service  Make a network service unusable, usually by overloading the server or network TCP Attacks  create IP packets and routers process them purely based on destination address alone  End hosts may lie about other fields which do not affect delivery  Attacker can insert malicious data into the TCP stream, and the recipient will believe it came from the original Types of Attack Packet Sniffing  Affects any broadcast-based medium (cable, wifi, etc)  A Host listens to the data (plain text data – passwords)  Solution is to encrypt the data  Secure Sockets Layer (SSL) for https addresses - Web browsers know how to trust HTTPS websites based on certificate authorities  IPSec - Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. Social Engineering  People can be just as dangerous as unprotected computer systems  People can be lied to, manipulated, bribed, threatened, harmed, tortured, etc. to give up valuable information  Example - “Your account has been hacked, please resend

Use Quizgecko on...
Browser
Browser