Chapter -4 Network Security
Last updated
Last updated
LAN : Local Area Network
WAN â Wide Area Network
WLAN â Wireless Local Area Network
VPN â Virtual Private Network
EPN â Enterprise Private Network
PAN â Personal Area Network
CAN â Campus Area Network
MAN â Metropolitan Area Network
SAN â Storage Area Network
SAN â System-Area Network
POLAN â Passive Optical Local Area Network
Address Length
32 bits (4 bytes)
128 bits (16 bytes)
Address Format
Dotted decimal notation (e.g., 192.168.1.1)
Hexadecimal notation (e.g., 2001:0db8:85a3::8a2e:0370:7334)
Number of Addresses
Approximately 4.3 billion (2^32)
Approximately 340 undecillion (2^128)
Addressing Scheme
Unicast, Broadcast, Multicast
Unicast, Multicast, Anycast
Header Size
20 bytes (minimum)
40 bytes (fixed)
Address Configuration
Manual or DHCP
Stateless Address Autoconfiguration (SLAAC) and DHCPv6
Fragmentation
Performed by both sender and router
Only performed by the sender (routers do not fragment)
Routing
More complex routing (e.g., NAT, CIDR)
Simplified routing with hierarchical addressing
Security
IPsec is optional
IPsec is mandatory for end-to-end encryption
NAT (Network Address Translation)
Required to address address exhaustion
Not needed due to the vast address space
Broadcast Support
Supports broadcast communication
Does not support broadcast (uses multicast instead)
Quality of Service (QoS)
Limited QoS support
Improved QoS support with Flow Label field
Transition Mechanisms
Dual Stack, Tunneling, NAT64, etc.
Dual Stack, Tunneling, NAT64, etc. (but better support for IPv6)
Application Support
Well-supported by existing applications
Increasingly supported by modern applications and services
Network threats refer to potential dangers or risks that could compromise the confidentiality, integrity, and availability of data or network resources. These threats arise from vulnerabilities within a network or its components and could lead to unauthorized access, data loss, or other types of harm. Network threats are typically the "cause" of network attacks.
Common network threats include:
Malware: Software designed to harm or exploit network systems. This includes viruses, worms, trojans, ransomware, and spyware.
Phishing: The attempt to trick individuals into revealing sensitive information (e.g., usernames, passwords, credit card details) by masquerading as a trustworthy entity via email, websites, or other forms of communication.
Insider Threats: Threats originating from within the organization, such as disgruntled employees or contractors who intentionally or unintentionally compromise security.
Social Engineering: Manipulating individuals into divulging confidential information or performing actions that compromise network security (e.g., pretexting, baiting, or tailgating).
Denial of Service (DoS): A threat where attackers attempt to make network resources unavailable to users by overwhelming the network with traffic or requests.
Eavesdropping: Unauthorized interception and monitoring of network traffic, typically to capture sensitive data like passwords, credit card numbers, and communications.
Data Breaches: Unauthorized access to sensitive or private data, often resulting in the theft of personal, financial, or intellectual property.
Zero-Day Vulnerabilities: Threats arising from previously unknown security flaws that can be exploited by attackers before a patch or fix is made available.
Network attacks are specific actions or methods employed by attackers to exploit network vulnerabilities, causing harm or gaining unauthorized access to a network or system. These attacks can be used to steal data, disrupt services, or harm an organizationâs reputation.
Some common network attacks include:
Denial of Service (DoS) Attack: The attacker floods the target network or server with excessive requests to exhaust resources and make it unavailable to legitimate users. A Distributed Denial of Service (DDoS) attack is a more sophisticated version where the attack comes from multiple sources.
Man-in-the-Middle (MitM) Attack: The attacker intercepts and potentially alters the communication between two parties, often to steal sensitive information like login credentials or credit card details.
SQL Injection: An attack that exploits vulnerabilities in a web application's database layer. Malicious SQL queries are injected into input fields, which can allow attackers to access or manipulate database data.
Cross-Site Scripting (XSS): Attackers inject malicious scripts into web pages, which are then executed by the browser of users who visit the compromised page. This can lead to the theft of session cookies or user credentials.
Password Cracking: Attackers attempt to discover a user's password through brute force methods (trying every possible combination) or by using techniques like dictionary attacks, where they use a list of common passwords.
ARP Spoofing: The attacker sends fake Address Resolution Protocol (ARP) messages onto a network, which associates the attacker's MAC address with the IP address of another device (e.g., a router), allowing them to intercept network traffic.
Sniffing: Involves intercepting and capturing network traffic to extract sensitive data like login credentials or confidential communication. This is usually done using packet-sniffing tools.
Ransomware Attack: A form of malware that encrypts a victim's files or locks them out of their systems, demanding a ransom for the decryption key or to regain access.
Pharming: This attack redirects a website's traffic to a malicious website that looks similar to the original site, often to steal login credentials or financial information.
Privilege Escalation: This attack involves exploiting a vulnerability to gain higher access privileges than a user is authorized for, typically allowing the attacker to control or steal sensitive data from the systems
An Intrusion Detection System (IDS) is a security mechanism that monitors network traffic or system activity for suspicious or malicious behavior. Its main goal is to identify potential threats and alert administrators about unauthorized or anomalous activities.
Function: IDS analyzes network traffic or system logs to detect known attack patterns, anomalies, or violations of security policies. When it detects suspicious activity, it generates an alert to notify the network administrator.
Types of IDS:
Network-based IDS (NIDS): Monitors network traffic for signs of malicious activity.
Host-based IDS (HIDS): Monitors a single system or host (e.g., a server or workstation) for suspicious activity.
Function: Detects and removes malware (viruses, worms, trojans, etc.).
Prevention: Uses signatures and heuristics for real-time protection on individual devices.
Limitations: May miss new or unknown threats without updated signatures.
1. Power:
Importance: A data center requires a constant, reliable power supply to ensure the continuous operation of servers, networking equipment, and other critical systems.
Requirements:
Uninterruptible Power Supply (UPS): Provides backup power during outages.
Generators: Backup power for extended outages.
Redundant Power: Multiple power feeds and circuits to avoid single points of failure.
2. HVAC (Heating, Ventilation, and Air Conditioning):
Importance: Proper cooling is essential to prevent servers and equipment from overheating, which can lead to failures and damage.
Requirements:
Cooling Systems: Efficient air conditioning units or cooling solutions to regulate temperature.
Ventilation: Proper airflow management to ensure optimal distribution of cool air and removal of heat.
Redundancy: Backup cooling systems in place to ensure continuous airflow.
3. Fire Suppression:
Importance: Protecting data centers from fire risks is critical, as a fire could destroy both hardware and data.
Requirements:
Fire Detection: Early detection systems (e.g., smoke detectors) to identify potential fires quickly.
Fire Suppression Systems: Systems such as FM-200 or Inergen, which suppress fire without damaging sensitive equipment.
Fire Barriers: Fire-resistant walls, doors, and floors to contain fire and prevent it from spreading.
4. Redundancy:
Importance: Redundancy ensures that a data center can continue operating even if one or more systems fail.
Requirements:
Redundant Power Supplies: Multiple power sources and backup generators.
Network Redundancy: Dual network connections and routers to ensure continuous communication.
Data Redundancy: Backup storage systems (e.g., RAID, cloud replication) to avoid data loss.
5. MOU/MOA (Memorandum of Understanding / Memorandum of Agreement):
Importance: Defines agreements and responsibilities between data center operators and clients or partners.
Requirements:
MOU: A non-binding document that outlines mutual understandings and intentions between parties.
MOA: A more formal and binding agreement that specifies the obligations and responsibilities of each party regarding the operation and management of the data center.
1. Network Segmentation (e.g., Microsegmentation & DMZ):
Microsegmentation:
Definition: The practice of dividing a network into smaller, isolated segments to limit the spread of threats and enhance security.
How It Works: By using firewalls and software-defined network policies, microsegmentation can isolate workloads within data centers or cloud environments.
Benefit: Reduces the attack surface and prevents lateral movement of attackers within the network.
Demilitarized Zone (DMZ):
Definition: A perimeter network that acts as a buffer between a trusted internal network and untrusted external networks (like the internet).
How It Works: Public-facing services (e.g., web servers, email servers) are placed in the DMZ, while the internal network is protected behind a firewall.
Benefit: Limits external access to only certain services, reducing the risk of compromising the internal network.
Definition: A logical subgroup within a physical network that isolates traffic and groups devices together, regardless of their physical location.
How It Works: VLANs segment a network into smaller broadcast domains to improve security, performance, and management.
Benefit: Increases network efficiency by reducing unnecessary traffic and improving security by isolating sensitive departments or systems.
Definition: A secure, encrypted connection between two points over a public network (e.g., the internet).
How It Works: VPNs encrypt data packets to ensure privacy and integrity when transmitting over unsecured networks.
Benefit: Provides secure remote access for users or connects branch offices to the main network, ensuring privacy.
Definition: A layered security approach where multiple security controls are implemented at different levels (network, host, application) to protect against threats.
How It Works: Layers include firewalls, intrusion detection/prevention systems, antivirus software, access controls, and more.
Benefit: If one layer fails, other layers provide additional protection, enhancing overall security.
Definition: A security model that assumes no one (inside or outside the network) is trusted by default and requires verification for every request.
How It Works: It relies on strict identity verification, least-privilege access, continuous monitoring, and real-time analytics to ensure that users and devices are always authenticated before accessing resources.
Benefit: Reduces the risk of internal and external breaches by verifying trust at every access point.
Definition: A security solution that enforces policies on which devices can access a network, based on predefined rules.
How It Works: NAC systems assess devices (e.g., whether they have up-to-date antivirus software or meet certain security criteria) before granting network access.
Benefit: Ensures that only compliant and secure devices are allowed to access the network, preventing unauthorized or insecure devices from connecting.