Domain 3 – Telecom and Network Security Flashcards
DSL
Digital Subscriber Line
ISDN
Integrated Services Digital Network
PAP
Password Authentication Protocol – clear text
CHAP
Challenge Handshake Authentication Protocol – protects password
Remote User Management
- Justification of remote access
- Support Issues
- Hardware and software distribution
Intrusion Detection…
- Notification
* Remediation
CIRT
Computer Incident Response Team CIRT Performs • Analysis of event • Response to incident • Escalation path procedures • Resolution – post implementation follow up
Network Based IDS
Commonly reside on a discrete network segment and monitor the traffic on that network segment.
Host Based IDS
Use small programs, which reside on a host computer. Detect inappropriate activity only on the host computer, not the network segment.
Knowledge Based IDS
Signature based Pros: Low false alarms Alarms Standardized Cons: Resource Intensive New or unique attacks not found
Behavioral Based IDS
Statistical Anomaly Pros : Dynamically adapts Not as operating system specific Cons: High False Alarm rates User activity may not be static enough to implement
CIRT – (CERT)
Computer Incident Response Team Responsibilities: • Manage the company’s response to events that pose a risk • Coordinating information • Mitigating risk, minimize interruptions • Assembling technical response teams • Management of logs • Management of resolution
Network Availability
- RAID – Redundant Array of Inexpensive Disks
- Back Up Concepts
- Manage single points of failure
RAID
Redundant Array of Inexpensive Disks
• Fault tolerance against server crashes
• Secondary – improve system performance
• Striping – Caching and distributing on multiple disks
• RAID employs the technique of striping, which involves partitioning each drive’s storage space into units ranging from a sector (512 bytes) up to several megabytes. The stripes of all the disks are interleaved and addressed in order.
• Hardware and software implementation
FRDS+
- Protect from disk failure – can reconstruct disks by automatically hot swapping while server is running
- Includes environmental
- FRDS+ adds hazard warnings
RAID Advisory Board
• Three types – Failure Resistant Disk Systems (FRDS) - the only current standard, Failure Tolerant Disk Systems, and Disaster Tolerant Disk Systems.
• FRDS: provides the ability to reconstruct the contents of a failed disk onto a replacement disk.
• Enables the continuous monitoring of these parts and the alerting of their failure
FRDS+
RAID 0 (STRIPPING)
- Creates one large disk by using multiple disks – striping
- No redundancy
- No fault tolerance (1 fail = all fail)
- Read/Write performance is increased
RAID 1 (MIRRORING)
- Mirroring
- Duplicates data on other disks (usually one to one ratio)
- Expensive (doubles cost of storage)
RAID 2 (HAMMING CODE PARITY)
- Multiple disks
- Parity information created using a hamming code
- Can be used in 39 disk array 32 Data and 7 recovery
- Not used, replaced by more flexible levels
RAID 3 (BYTE LEVEL PARITY) RAID 4 (BLOCK LEVEL PARITY)
- RAID 3 – Byte level
- RAID 4 – Block level
- Stripe across multiple drives
- Parity information on a parity drive
- Provides redundancy
- Can affect performance with single parity drive
RAID 5 (INTERLEAVE PARITY)
- Most popular
- Stripes data and parity information across all drives
- Uses interleave parity
- Reads and writes performed concurrently
- Usually 3-5 drives. If one drive fails, can reconstruct the failed drive by using the information from the other 2.
RAID 7 (SINGLE VIRTUAL DISK)
- Functions as a single virtual disk
- Usually software over Level 5 hardware
- Enables the drive array to continue to operate if any disk or any path to any disk fails.
RAID Summary
0 – Striping 1 – Mirroring 2 – Hamming code parity 3 – Byte level parity 4 – Block level parity 5 – Interleave parity 7 – Single Virtual Disk
Redundant Servers
- Primary Server mirrors to secondary server
- Fail-over or rollover to secondary in the event of a failure
- Server fault tolerance can be warm or hot
Server Cluster
- Group of independent servers managed as a single system
- Load Balancing
- Improves performance
- “Server Farm”
- Microsoft Cluster Server
Full Back Up
every file
Incremental Backup
- Only files that have been changed or added recently
- Only files with their archive bit set are backed up.
- This method is fast and uses less tape space but has some inherent vulnerabilities, one being that all incremental backups need to be available and restored from the date of the last full backup to the desired date should a restore be needed.
- Restore = last full backup plus each incremental
Differential Backup
- Only files that have changed since the last backup
- All files to the full backup (additive)
- Restore = full backup plus the last differential
Types of Tape Backup
- DAT – Digital Audio Tape
- QIC – Quarter Inch Cartridge – Small and slow
- 8mm Tape – Superceded by DLT
- DLT – Digital Linear Tape – 4mm tape – large and fast
Other media
CD – permanent backups, longer shelf life than tape
ZIP – JAZZ – Common
Tape Array – 32 to 63 Tape Array using RAID technology
HSM – Hierarchical. Provides a continuous on-line backup by using optical or tape ‘jukeboxes’, similar to WORMs.
Common Backup Problems
- Slow transfer of data to backup
- Retrieval time to restore
- Off hour processing and monitoring
- Server disk space expands over time
- Loss of data between last back up
- Physical security of tapes
Single Points of Failure Cabling Failures
Coaxial:
many workstations or servers attached to the same segment of cable, which creates a single point of failure if it is broken (similar to cable TV cabling). Exceeding cable length is a source of failure.
Single Points of Failure Cabling Failures
Twisted Pair: (CAT3 and CAT 5)
The difference between the two has to do with the tightness the copper wires are wound. Tightness determines its resistance to interference. CAT3 is older. Cable length is a common failure
Single Points of Failure Cabling Failures
Fiber Optic
Immune to EMI. Longer usable length (upto 2kms). Drawback is costs.
Technology Failures
Ethernet
- Most Popular
* Extremely resistance to failure, especially in a star-wired config.
Technology Failures
Token Ring
- Since token is passed by every station on the ring
* NIC set at wrong speed or in error state can bring the network down
Technology Failures
FDDI – Fiber Distributed Data Interface
- Dual rings fault tolerance (if first ring fails, the secondary ring begins working)
- Sometimes uses second ring for improved performance
Technology Failures
Leased Lines
T1 and ISDN – go with multiple vendors to reduce failures
Technology Failures
Frame Relay
- Public switched WAN
- Highly Fault Tolerant
- Bad segment diverts packets
- Can use multiple vendors for high availability
Other Single Points of Failure
- Can be any device where all traffic goes through a single device - Router, firewall, hub, switch
- Power failure – surges, spikes – install UPS
Note: Trivial File Transfer Protocol (TFTP)
is good tool for router configuration
Classes of Network Abuse
Class A
unauthorized access through circumvention of security access controls. Masquerading, logon abuse (primarily internal attacks)
Classes of Network Abuse
Class B
non-business use of systems
Classes of Network Abuse
Class C
Eavesdropping
• Active: Tampering with a transmission to create a covert signaling channel or probing the network
• Passive: Covertly monitoring or listening to transmissions that is unauthorized.
• Covert Channel: using a hidden unauthorized communication
• Tapping: refers to the physical interception of a transmission medium (like splicing of cable).
Classes of Network Abuse
Class D
Denial of Service Saturation of network services
Classes of Network Abuse
Class E
Network Intrusion – penetration (externally)
• Spoofing – A spoofing attack involves nothing more than forging one’s source address. It is the act of using one machine to impersonate another.
• Piggy Backing – attack using another users connection
• Back Door – attack via dial up or external connection
Classes of Network Abuse
Class F
Probing
• Gives an intruder a road map of the network for DoS attack
• Gives a list of available services
• Traffic analysis via ‘sniffers’ which scans the host for available services
o Like a telephone wiretap allows the FBI to listen in on other people’s conversations, a “sniffing” program lets someone listen in on computer conversations.
• Tools: Telnet (manual), vulnerability scanners (automatic).
Common DoS Attacks
- Filling hard drive space with email attachments
- Sending a message that resets a targets host subnet mask causing routing disruption
- Using up all of the target’s resources to accept network connections
Buffer Overflow Attack
- When a process receives much more data than expected.
- Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.
PING
Packet Internet Groper – uses ICMP – Internet Control Message Protocol
PING of Death
Intruder sends a PING that consists of an illegally modified and very large IP datagram, thus overfilling the system buffers and causing the system to reboot or hang.
SYN Attack
- Attacks the buffer space during a Transmission Control Protocol (TCP)
- Attacker floods the target system’s ‘in-process’ queue with connection requests causing the system to time-out.
Teardrop Attack
- Modifying the length of the fragmentation fields in the IP Packet
- When a machine receives this attack, it is unable to handle the data and can exhibit behavior ranging from a lost Internet connection to the infamous blue screen of death. Becomes confuse and crashes.
Smurf Attack
• (Source Site) Sends spoofed network request to large network (bounce site) all machines respond to the (target site). IP broadcast addressing.
Fraggle Attack
• The “smurf” attack’s cousin is called “fraggle”, which uses UDP echo packets in the same fashion as the ICMP echo packet.
Session Hijacking Attacks :
IP Spoofing
IP spoofing is used to convince a system that it is communicating with a known entity that gives an intruder access. IP spoofing involves altering the packet at the TCP level. The attacker sends a packet with an IP source address of a known, trusted source. E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.
Session Hijacking Attacks
TCP Sequence number
tricks the target in believing that it’s connected to a trusted host and then hijacks the session by predicting the target’s choice of an initial TCP Sequence number. Then it’s used to launch various other attacks on other hosts.
Salami Attack
A series of minor computer crimes that are part of a larger crime.
Rainbow Series
- Redbook – TNI - Trusted Network Interpretation
- Time and technological changes lessen the relevancy of the TNI to contemporary networking.
- Deals with technical issues outside the scope of the Orange Book wrt to networks
- Redbook interprets the Orange Book
- Orange Book – Trusted Computer Security Evaluation Criteria
TNI Evaluation Classes
D – Minimal protection C – Discretionary protection C1 – Discretionary Security Protection C2 – Controlled Access protection B – Mandatory B1 – Labeled Security B2 – Structured B3- Security Domains
Protocols
is a standard set of rules that determines how computers communicate with each other across networks despite their differences (PC, UNIC, Mac..)
Layered architecture
shows how communication should take place
• Clarify the general functions of a communication process
• To break down complex networking processes into more manageable sublayers
• Using industry-standard interfaces enables interoperability
• To change the features of one layer without changing all of the code in every layer
• Easier troubleshooting
Layer 7
Application Security: Confidentiality, authentication, data integrity, non-repudiation
Technology: gateways
Protocols: FTP, SMB, TELNET, TFTP, SMTP, HTTP, NNTP, CDP, GOPHER, SNMP, NDS, AFP, SAP, NCP, SET n Responsible for all application-to-application communications. User information maintained at this layer is user data.
Layer 6
Presentation Security: confidentiality, authentication, encryption
Technology: gateway
Protocols: ASCII, EBCDIC, POSTSCRIPT, JPEG, MPEG, GIF n Responsible for the formatting of the data so that it is suitable for presentation. Responsible for character conversion (ASCII/EBCDIC), Encryption/Decryption, Compression, and Virtual Terminal Emulation. User information maintained at this layer is called messages.
Layer 5
Session Security: None
Technology: gateways
Protocols: Remote Procedure Calls (RPC) and SQL, RADIUS, DNS, ASP n Responsible for the setup of the links, maintaining of the link, and the link tear-down between applications.
Layer 4
Transport Security: Confidentiality, authentication, integrity
Technology: gateways
Protocols: TCP, UDP, SSL, SSH-2, SPX, NetBios, ATP n Responsible for the guaranteed delivery of user information. It is also responsible for error detection, correction, and flow control. User information at this layer is called datagrams.
Layer 3
Network Security: confidentiality, authentication, data integrity
Technology: virtual circuits (ATM), routers
Protocols: IP, IPX, ICMP, OSPF, IGRP, EIGRP, RIP, BOOTP, DHCP, ISIS, ZIP, DDP, X.25 n Responsible for the routing of user data from one node to another through the network including the path selection. Logical addresses are used at this layer. User information maintained at this layer is called packets.
Layer 2
Data Link Security: confidentiality,
Technology: bridges, switch
Protocols: L2F, PPTP, L2TP, PPP, SLIP, ARP, RARP, SLARP, IARP, SNAP, BAP, CHAP, LCP, LZS, MLP, Frame Relay, Annex A, Annex D, HDLC, BPDU, LAPD, ISL, MAC, Ethernet, Token Ring, FDDI n Responsible for the physical addressing of the network via MAC addresses. Ther are two sublevels to the Data-Link layer. MAC and LLC. The Data-Link layer has error detection, frame ordering, and flow control. User information maintained at this layer is called frames.
Layer 1
Physical Security: confidentiality
Technology: ISDN, Hubs, Repeaters, Cables
Protocols: 10BaseT, 100BaseT, 1000BaseT, 10Base2, 10Base5, OC-3, OC-12, DS1, DS3, E1, E3, ATM, BRI, PRI, X.23 n Responsible for the physical transmission of the binary digits through the physical medium. This layer includes things such as the physical cables, interfaces, and data rate specifications. User information maintained at this layer is called bits (the 1s and 0s).
Data encapsulation
is the process in which information from one packet is wrapped around or attached to the data of another packet. In OSI model each layer encapsulates the layer immediately above it.
OSI Layers
- Process down the stack and up the stack
* Each layer communicates with corresponding layer through the stack.
OSI Security - 6 Security Services.
A security service is a collection of security mechanisms, files, and procedures that help protect the network. • Logging and monitoring • Authentication • Access control • Data confidentiality • Data integrity • Non-repudiation
OSI Security - 8 Security Mechanisms.
A security mechanism is a control that is implemented in order to provide the 6 basic security services. • Encipherment • Digital signature • Access Control • Data Integrity • Authentication • Traffic Padding • Routing Control • Notarization
TCP
Transmission Control Protocol
• Connection Oriented
• Sequenced Packets
• Acknowledgment is sent back for received packets
• If no acknowledgement then packet is resent
• Packets are re-sequenced
• Manageable data flow is maintained