Steve Newlen's CIM 279 Network Security
Mastering Network Security Chapter Outlines
Chapter 5
- Defining an Access Control Policy
- Access Control Descriptors
- Direction
- Service
- Specific Host
- Individual Users
- Time of Day
- Public or Private
- Quality of Service (QoS)
- Definition of a Firewall
- When is a Firewall Required?
- Dial-In Modem Pool
- External Connections to Business Partners
- Between Departments
- Firewall Types
- Static Packet Filtering
- The TCP Flag Field
- ACK
- FIN
- PSH
- RST
- SYN
- URG
- Packet Filtering UDP Traffic
- Packet Filtering ICMP
- Static Packet Filtering Summary
Static packet filters are non-intelligent filtering devices. They offer
little protection against advanced types of attack. They look at a
minimal amount of information in order to determine which traffic
should be allowed to pass and which traffic should be blocked.
Many routers have the ability to perform static pack filtering.
- Dynamic Packet Filtering
- Dynamic Packet Filtering in Action
- UDP Traffic And Dynamic Packet Filtering
- Is My Transport supported?
- Dynamic Packet Filter Summary
Dynamic packet filters are intelligent devices that make traffic-control decisions based on packet attributes and state tables. State
tables enable the firewalling device to "remember" previous
communication packet exchanges and make judgements based on
this additional information.
The biggest limitation of a dynamic packet filter is that it cannot
make filtering decisions based on payload, which is the actual data
contained within the packet. In order to filter on payload, you must
use a proxy-based firewall.
- Proxies
- How a Poxy Passes Traffic
- Client Configuration in a Proxy Environment
- Benefits of a proxy Client
- Drawbacks to a Proxy Client
- Transparent Proxies
- Filtering Java, ActiveX, and HTML Scripts
- What Type of Firewall Should I Use?
- Should I Run My Firewall on UNIX or NT?
- UNIX versus NT
- NT versus UNIX
- You Decide...
- Additional Firewall Considerations
- Address Translataion
- Hiding NAT
- Static NAT
- Port Address Translations (PAT)
- Firewall Logging
- Firewall Deployment
- Chapter 5 SUMMARY
CHAPTER 9 -- Authentication and Encryption
- The Need for Improved Security
- Clear Text Transmissions
- Passively Monitoring Clear Text
- Clear Text Protocols
- FTP
- Telnet
- SMTP
- HTTP
- IMAP
- SNMPv1
- Good Authentication Required
- Session Hijacking
- Verifying the Destination
- C2MYAZZ
- DNS Poisoning
- Encryption 101
- Methods of Encryption
- Stream Cipher
- Block Cipher
- Public/Private Crypto Keys
- Encryption Weaknesses
- Mishandling or Human Error
- Cipher Deficiencies
- Brute Force Attacks
- Methods of Encryption and Their Associated Keys
Encryption |
Bits in Key |
Number of Possible Keys |
Netscape |
40 |
1.1x106 |
DES |
56 |
72.1x106 |
Triple DES (2 keys) |
112 |
5.2x1033 |
RC4/128 |
128 |
3.4x1038 |
Triple DES (3 keys) |
168 |
3.7x1050 |
Future standard? |
256 |
1.2x1077 |
|
|
|
- Government Intervention
- Good Encryption Required
- Solutions
- Data Encryption Standard (DES)
- Digital Certificate Servers
- IP Security (IPSEC)
- Kerberos
- Point-to-Point Tunneling Protocol
- Remote Access Dial-In User Service (RADIUS)
- RSA Encryption
- Secure Shell (SSH)
- Secure Sockets Layer (SSL)
- Security Tokens
- Simple Key Management for Internet Protocols (SKIP)
- Chapter 9 SUMMARY
CHAPTER 10 -- Virtual Private Networking
- VPN Basics
- VPN Usage
- Modem Pool Replacement
- Dedicated WAN Link Replacement
- Selecting a VPN Product
- Strong Authentication
- Adequate Encryption
- Adherence to Standards
- VPN Product Options
- Firewall-Based VPN
- Router-Based VPN
- Dedicated Hardware and Software
- VPN Alternatives
- Setting up a VPN
- Preparing the Firewall
- Our VPN Diagram
- Configuring Required Network Objects
- Defining Network Objects
- Defining the Firewalls
- Configuring the Remote Firewall
- Exchanging Keys
- Fetching Keys on the Remote Firewall
- Modifying the Security Policy
- Modifying the Security Policy on the Remote Firewall
- Testing the VPN
- Verifying the Data Stream
- Chapter 10 SUMMARY
Chapter 11 -- Virus, Trojans, and Worms: Oh My!
- Viruses: The Statistics
- Financial Repercussions
- What is a Virus?
- Replicaiton
- File Infection
- Boot Sector Replication
- Common Traits of File Infection and Boot Sector Replication
- Concealment
- Small Footprint
- Attribute Manipulation
- Stealth
- Anti-virus Countermeasures
- Encryption
- Polymorphic Mutation
- Bomb
- Social Engineering Viruses
- Replication
- Concealment
- Bomb
- Worms
- The Vampire Worm
- The Great Internet Worm
- The WANK Worm
- Other Worms
- Trojan Horses
- Why Trojan Horses are not Viruses
- Did I purchase a Trojan Horse?
- Preventative Measures
- Access Control
- Checksum Verification
- Process Monitoring
- Virus Scanners
- Virus Scanner Variations
- Problems with Large Environments
- Heuristic Scanners
- Application-Level Virus Scanners
- Deploying Virus Protection
- Protecting the Desktop Systems
- Enable BIOS Boot Sector Protection
- On-Demand Scanning
- Memory-Resident Scanning
- Options Not Considered
- Protecting the NT and NetWare Servers
- On-Demand Scanning
- Memory-Resident Scanning
- File Permissions
- Options Not Considered
- Protecting the UNIX System
- File Integrity Checking
- Process Monitoring
- File Permissions
- Options Not Considered
- Chapter 11 SUMMARY
CHAPTER 12 -- Network Disasters
- Disaster Categories
- Network Disasters
- Cabling
- Thinnet and Thicknet
- Twisted Pair
- Fiber Cabling (fibre)
- Excessive Cable Lengths
- Topology
- Ethernet
- Token Ring
- FDDI
- Lerased Line or T1 Connections
- Frame Relay
- Single Points of Failure
- Consolidated Equipment
- Taking Advantage of Redundant LAN Routes
- Dial Backup for WAN Connections
- Saving Configuration Files
- Terminal Logging
- TFTP Server
- Server Disasters
- Uninterruptible Power Supply (UPS)
- RAID
- RAID 0
- RAID 1
- RAID 2
- RAID 3 and RAID 4
- RAID 5
- RAID 10 and RAID11
- Redundant Servers
- Clustering
- Tape Backup
- Full Backups
- Incremental Backups
- Differential Backups
- Server Recovery
- Installing the server operating system
- Installing any required drivers
- Instgalling any required service packs
- Installing any required hotfixes or security patches
- Installing backup software
- Installing any required patches to the backup software
- Restoring your last full backup tape
- Restoring any incremental or differential tapes as required.
- Simulating Disasters
- Importance of disaster simulation
- Nondestructive Testing
- Document Your Procedures
- OctopusHA+ for NT Server
- An Octopus Example
- Installing Octopus
- Configuring Octopus
- Testing Octopus
- Chapter 12 Summary
Chapter 16 -- The Anatomy of an Attack
- Collecting Information
- The whois Command
- Domain Name
- Physical Location
- Administrative Contact
- Phone Numbers
- Valid Subnet
- What a War Dialer Can Find
- The nslookup Command
- Search Engines
- Probing the Network
- The traceroute Command
- Host and Service Scanning
- Ping Scanning
- Port Scanning
- TCP Half Scanning
- FIN Scanning
- Passive Monitoring
- Checking for Vulnerabilities
- Manual Vernabilities Checks
- Automated Velnerabilities Scanners
- Launching the Attack
- Hidden Accounts
- Man in the Middle
- C2MYAZZ
- Buffer Overflows
- An Example of a Buffer Overflow
- Other Buffer Overflow Attacks
- SYN Attack
- Teardrop Attacks
- Launching a teardrop Attack
- Smurf
- Blocking Smurf at the Source
- Blocking Smurf at the Bounce Site
- Blocking Smurf at the Target Site
- Brute Force Attacks
- Physical Access Attacks
- Chapter 16 -- The Anatomy of an Attack Summary