Securing Interconnect Networks By Bryan Roberts What is
Securing Interconnect Networks By: Bryan Roberts
What is an Interconnected Network? o Two or more networks or network segments o Connected among private, public, commercial, industrial or governmental levels o Use internet protocol o 3 different types
3 Types of Internetworks o Intranet n n n Set of networks using internet protocol and IP – based tools Single administrative entity Closed to specific users Most commonly internal network of an organization At least one web server to provide information
3 Types of Internetworks o Extranet n n Network or internetwork limited to a single organization Limited connections to the network Cannot consist of single LAN Must have at least one connection with an external network
3 Types of Internetworks o Internet n n Most popular Consists of connections to all types of networks Successor of Advanced Research Projects Agency Network (ARPANET) developed by U. S. government Communications backbone of World Wide Web
Basic Hardware Components of Networks o Network Interface Card (NIC) n Allows computers to communicate over a network n Allows users to connect to other users through cable or wireless connections o Repeaters n Electronic device that receives a signal and retransmits it at a higher power level n Most common is twisted pair which allows up to 100 meters away
Basic Hardware Components of Networks o Hubs n n Contains multiple ports of connectivity When a packet arrives at one port it copies it to all other ports for transmission Destination address does not change to a broadcast address Copies data to all nodes connected to hub
Basic Hardware Components of Networks o Others n Bridges p Connects n multiple segments at data link layer Switches p Forwards and filters datagrams between ports based on MAC address in packets n Routers p Device that forwards data packets between networks
Why is securing important? o Motivation is driven by contagious threats of internet viruses and worms o Breaching becomes an internal threat to the network if the system is cracked o CSI and FBI report 13 different types of attacks n Range from website defacement to financial fraud to internet worms and viruses
Types of protection o Anti-virus software n n Norton Macafee o Firewalls o Virtual Private Network (VPN), Secure Socket Layer (SSL) and IPSEC n Protect against the loss of confidential data
Securing Information Systems o These requirements must be satisfied: n n n Systems must be interconnected Threat must be capable of breaching a system and then being able to attack others One system breach affects another system breach, causing a chain effect
3 Ways to deal with threats o Protection n Primary defense, especially against unknown attackers who may not even be traceable o Detection n Useful in situations where identity of attackers can be established and legal measures can be taken against them o Reaction n Time taken to restore the system back to normal
Cryptographic Measures o Do not protect against availability loss o Do not stop the attackers from breaching the system o Render information unusable unless attackers decrypt the data
Firms o Use both protection countermeasures n n Firewalls Cryptographic countermeasures p SSL
Accessing Encrypted Confidential Documents o One must perform the following: n n Breach the information system and obtain access to the document Break the cryptographic security protecting the document to access its contents
Using protection and cryptographic countermeasures o Used in many enterprises o Secure information assets against confidentiality loss o Protection measures n Protect against breaching o Cryptographic measures n Protect unauthorized users from accessing sensitive data
Conclusion o Types used to secure n Anti-virus software n Firewalls n VPN’s, SSL, and IPSEC o Importance n It is important to secure your data in an interconnected network n Can cause huge failure if system is breached n Hackers and crackers can destroy a whole system if they gain access to information
- Slides: 17