IS Chap 6
IS Chap 6
Technology:
Firewalls and VPNs
LEARNING OBJECTIVES
Technical controls are essential in enforcing policy for the many IT functions
that are not under direct human control
Technical control solutions, properly implemented, can improve an
organization’s ability to balance the often conflicting objectives of making
information readily and widely available and of preserving the information’s
confidentiality and integrity
Access Control
Access control: a selective method by which system specify who may use a
particular resource and how they may use it
combination of policies(who can do what), programs (software that enforces
these rules), and technologies(tools or systems that help enforce the rules)
Mandatory access controls (MACs): use data classification schemes; they
give users and data owners limited control over access to information
resources
Discretionary access controls (DACs): This type of control allow the user
to decide who can access the resources they control like files and folders
For example in a peer-to-peer network user can choose to share files with
others if they want to
Access Control
Identification in access control is the process where a user first tells the
system who they are. Before they can get access, the system needs to
check and confirm that the identity provided by the user is valid.
Identifiers can be composite identifiers, concatenating elements—
department codes, random numbers, or special characters—to make them
unique
Most organizations use a single piece of unique information, such as a
complete name or the user’s first initial and surname
Authentication
Authentication is the process of proving that you are who you say you are
after you have identified yourself to the system. It’s like showing proof to
confirm your identity before the system lets you in.
Authentication factors
Something you know
Password: a private word or a combination of characters that only the user should know
scanning a fingerprint, or using a face recognition system
Authentication
A MAC Layer Firewall uses these unique MAC addresses to make decisions
about which network traffic to allow or block.
The firewall knows the MAC address of each device connected to the network
The firewall uses an Access Control List (ACL), which is like a set of rules.
The ACL specifies which types of data packets (like web requests, file
transfers, etc.) are allowed or blocked for each device based on its MAC
address.
When data tries to enter or leave the network, the MAC layer firewall checks
the MAC address of the sender or receiver.
If the packet matches the rules in the ACL (for example, a rule allowing web
requests to a specific MAC address), the firewall allows it.
If it doesn’t match, the firewall blocks it
Employee computers and guest devices
MAC Layer Firewalls
Hybrid Firewalls
company with sensitive internal data on its servers and a lot of online
traffic:
Packet-Filtering Firewall: This firewall checks the incoming data at
the network’s edge, allowing only traffic from specific, approved
sources and blocking anything suspicious.
Proxy Server: Once the packet-filtering firewall has approved the
data, it sends the request to a proxy server. The proxy server further
checks the request by acting as a go-between; it connects to the
company’s web server on behalf of the external client, limiting direct
access to the company’s network.
Secure Connection: Only after passing these checks can a user
access the requested data, keeping the company’s internal network
well-protected.
Hybrid Firewalls
How easy is it to set up and configure the firewall? Does the organization
have staff on hand that are trained to configure the firewall, or would the
hiring of additional employees be required?
Can the firewall adapt to the growing network in the target organization?
Most important factor is provision of required protection
Second most important issue is cost
Configuring and Managing
Firewalls
The organization must provide for the initial configuration and
ongoing management of firewall(s)
Each firewall device must have its own set of configuration rules
regulating its actions
Firewall policy configuration is usually complex and difficult
Configuring firewall policies is both an art and a science
When security rules conflict with the performance of business,
security often loses
Configuring and Managing
Firewalls
Best practices for firewalls
All traffic from the trusted network is allowed out.
Firewall device is never directly accessed from public network.
Simple Mail Transport Protocol (SMTP) data are allowed
to pass through firewall.
Configuring and Managing
Firewalls
Telnet access to internal servers should be blocked.
When Web services are offered outside the firewall, HTTP traffic should be
blocked from reaching internal networks.
All data that are not verifiably authentic should be denied.
Configuring and Managing
Firewalls
Firewall rules
Firewalls operate by examining data packets and performing comparison
with predetermined logical rules.
The logic is based on a set of guidelines most commonly referred to as
firewall rules, rule base, or firewall logic.
Most firewalls use packet header information to determine whether a
specific packet should be allowed or denied.
Well – Known Port Numbers
Transport mode
Data within IP packet are encrypted, but header information is not
Allows user to establish secure link directly with remote host, encrypting
only data contents of packet
Two popular uses:
End-to-end transport of encrypted data
Remote access worker connects to an office network over Internet by connecting
to a VPN server on the perimeter
Transport mode VPN
Virtual Private Networks (VPNs)
Tunnel mode
Establishes two perimeter tunnel servers to encrypt all traffic that will
traverse an unsecured network
Entire client package encrypted and added as data portion of packet from
one tunneling server to another
Primary benefit to this model is that an intercepted packet reveals nothing
about the true destination system
Example of tunnel mode VPN: Microsoft’s Internet Security and
Acceleration (ISA) Server
Tunnel mode VPN
Summary