Unit 2 NSAC
Unit 2 NSAC
Security Threats
eSEC01_v1.0
OVERVI
EW
• Goals of Information Security
• Attacks on Different Layers
• Attack Examples
• Worms, Viruses, Trojan Horse, Trap Door
• Stack and Buffer Overflow
• System Threats- intruders
• Communication Threats- Tapping and Piracy
• Firewalls
• Security Methodology-The Three D’s of Security
• Website Attacks: SQILA, XSS, LDAP, Injection Attack
GOALS OF INFORMATION
SECURITY
SECURITY
Confidentialit Integrit Availabilit
y y y
FIREWALLS
• A firewall is a network security
device, either hardware or software-
based, which monitors all incoming
and outgoing traffic and based on a
defined set of security rules it
accepts, rejects or drops that
specific traffic.
• Accept : allow the traffic
Reject : block the traffic but reply
with an “unreachable error”
Drop : block the traffic with no
reply
• A firewall establishes a barrier
between secured internal networks
and outside untrusted network,
such as the Internet.
NEED OF FIREWALL
• Before Firewalls, network security was performed by Access
Control Lists (ACLs) residing on routers. ACLs are rules that
determine whether network access should be granted or
denied to specific IP address.
But ACLs cannot determine the nature of the packet it is
blocking. Also, ACL alone does not have the capacity to
keep threats out of the network. Hence, the Firewall was
introduced.
• Connectivity to the Internet is no longer optional for
organizations. However, accessing the Internet provides
benefits to the organization; it also enables the outside
world to interact with the internal network of the
organization. This creates a threat to the organization. In
order to secure the internal network from unauthorized
traffic, we need a Firewall.
WORKING OF FIREWALL
• Firewall match the network traffic against the rule set defined in its table.
Once the rule is matched, associate action is applied to the network
traffic. For example, Rules are defined as any employee from HR
department cannot access the data from code server and at the same
time another rule is defined like system administrator can access the data
from both HR and technical department. Rules can be defined on the
firewall based on the necessity and security policies of the organization.
• From the perspective of a server, network traffic can be either outgoing or
incoming. Firewall maintains a distinct set of rules for both the cases.
Mostly the outgoing traffic, originated from the server itself, allowed to
pass. Still, setting a rule on outgoing traffic is always better in order to
achieve more security and prevent unwanted communication.
• Incoming traffic is treated differently. Most traffic which reaches on the
firewall is one of these three major Transport Layer protocols- TCP, UDP or
ICMP. All these types have a source address and destination address. Also,
TCP and UDP have port numbers. ICMP uses type code instead of port
number which identifies purpose of that packet.
TYPES OF FIREWALL
• Five types of firewall include the following:
1.packet filtering firewall
2.circuit-level gateway
3.application-level gateway (aka proxy firewall)
4.stateful inspection firewall
5.next-generation firewall (NGFW)
17
FIREWALL
CHARACTERISTICS
Originally, firewalls focused primarily on service control, but they have
since evolved to provide all four:
• Service control: Determines the types of Internet services that can be
accessed, inbound or outbound. The firewall may filter traffic on the basis
of IP address, protocol, or port number; may provide proxy software that
receives and interprets each service request before passing it on; or may
host the server software itself, such as a Web or mail service.
• Direction control: Determines the direction in which particular service
requests may be initiated and allowed to flow through the firewall.
• User control: Controls access to a service according to which user is
attempting to access it. This feature is typically applied to users inside the
firewall perimeter (local users). It may also be applied to incoming traffic
from external users; the latter requires some form of secure
authentication technology, such as is provided in IPsec (Chapter 8).
• Behavior control: Controls how particular services are used. For
example, the firewall may filter e-mail to eliminate spam, or it may enable
external access to only a portion of the information on a local Web server.