This week,
we learned about securing TCP, network layer security IPSEC and VPN, securing
wireless LANs, and operational security firewalls and intrusion detection.
TCP connections
can be secured with Secure Sockets Layer (SSL). SSL is widely used by
e-commerce and web-server authenticators to ensure confidentiality, integrity
and authentication of the site. It is supported by almost all web servers and
browsers and is identified as HTTP but with an S at the end. It is available to
all TCP applications and sits between the Application and TCP. It involves a
handshake, key derivation, data transfer, and connection closure. A and B use
their certificates to authenticate each other and exchange the shared secret,
then use the secret to make keys to exchange messages with. The data is
transferred in parts and then the connection is closed.
Virtual Private
Networks (VPN) are used to provide more security for private networks when
using public WIFI or less secured home WIFI. The data is encrypted before it
enters the public internet.
WIFI Each
packet is separately encrypted and can be decrypted even if previous packets
are lost. This can be implemented in hardware and software. WEP can be broken however, so WEP2 is used.
Firewalls
are used to isolate an organization from the internet by filtering packets. Firewalls
are used to prevent DOS attacks, modification/access of data, and only allows
authenticated users to use their network. Stateless packet filtering involves
an internet network with a router firewall. The router filters packets by
source/destination IP, TCP/UDP source and destination port numbers, ICMP
message types, and TCP SYN and ACK bits. Stateless packet filtering may block
IP protocol 17 and the entirety of port 23 resulting in UDP and telenet
connections being blocked. If an organization doesn’t want TCP connections from
the outside, they would drop all TCP SYN packets except to their web server. Stateful packet filtering tracks the status of
every TCO connection and drop packets that don’t make sense and won’t admit packets
if they created inactive connections at the firewall.
No comments:
Post a Comment