Chapter # 06 Security Technology
Chapter # 06 Security Technology
Chapter # 06 Security Technology
Security Technology
Access Controls
Firewalls
VPNS
Access Control
Access control is the method by which
systems determine whether and how to
admit a user into a trusted area of the
organization.
Access Control
Access Control
Discretionary access controls (DACs)
provide the ability to share resources in a
peer-to-peer configuration that allows users to
control and possibly provide access to
information or resources at their disposal.
The users can allow general, unrestricted
access, or they can allow specific people or
groups of people to access these resources.
Access Control
Nondiscretionary access controls
(NDACs) are managed by a central
authority in the organization.
A form of nondiscretionary access controls
is called lattice-based access control
(LBAC), in which users are assigned a
matrix of authorizations for particular areas
of access.
Access Control Mechanism
What is a Firewall?
a choke point of control and monitoring
interconnects networks with differing trust
imposes restrictions on network services
only authorized traffic is allowed
auditing and controlling access
can implement alarms for abnormal behavior
What is a Firewall?
Firewall Limitations
cannot protect from attacks bypassing it
eg sneaker net, utility modems, trusted
organisations, trusted services (eg SSL/SSH)
cannot protect against internal threats
eg disgruntled or colluding employees
cannot protect against access via WLAN
if improperly secured against external use
cannot protect against malware imported
via laptop, PDA, storage infected outside
Types of Firewalls / Firewall
Processing Modes
packet filters
Application-level gateways, &
Circuit-level gateways.
Firewalls – Packet Filters
simplest, fastest firewall component
foundation of any firewall system
examine each IP packet (no context) and
permit or deny according to rules
hence restrict access to services (ports)
possible default policies
that not expressly permitted is prohibited
that not expressly prohibited is permitted
Firewalls – Packet Filters
Firewalls – Packet Filters
Attacks on Packet Filters
IP address spoofing
fake source address to be trusted
add filters on router to block
source routing attacks
attacker sets a route other than default
block source routed packets
Firewalls - Application Level
Gateway (or Proxy)
have application specific gateway / proxy
has full access to protocol
user requests service from proxy
proxy validates request as legal
then actions request and returns result to user
can log / audit traffic at application level
need separate proxies for each service
some services naturally support proxying
others are more problematic
Firewalls - Application Level
Gateway (or Proxy)
Firewalls - Circuit Level Gateway