Key Takeaways
1. Security Fundamentals: Objectives, Attacks, Services
Computer Security: The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).
Core objectives. At the heart of computer security lies the CIA triad: Confidentiality (protecting data from unauthorized disclosure), Integrity (guarding against improper modification or destruction), and Availability (ensuring timely and reliable access). These objectives apply to both data and the systems that process it. Beyond the triad, Authenticity (verifying identity and source) and Accountability (tracing actions to an entity) are also crucial for a complete security posture.
Threats and attacks. Security is challenged by threats, which are potential dangers, manifested as attacks, which are deliberate attempts to violate security policy. Attacks are broadly categorized as passive (monitoring transmissions without altering resources, like eavesdropping or traffic analysis) or active (altering resources or affecting operations, like masquerade, replay, modification, or denial of service). Passive attacks are hard to detect but preventable; active attacks are hard to prevent but detectable.
Security services. To counter these attacks, security services are implemented. These are processing or communication services that enhance system security. Key services include Authentication (verifying identity), Access Control (limiting resource use), Data Confidentiality (protecting data from disclosure), Data Integrity (ensuring data is unchanged), Nonrepudiation (preventing denial of participation), and Availability (ensuring timely access). These services are the goals that security mechanisms aim to achieve.
2. The OSI Security Architecture: A Structured View
The OSI security architecture focuses on security attacks, mechanisms, and services.
Organizing security. To effectively manage security needs and evaluate solutions, a systematic approach is essential. The OSI security architecture provides this structure by defining security attacks, mechanisms, and services. This framework helps in understanding the relationships between threats, the tools to counter them, and the protective functions provided.
Mechanisms implement services. Security mechanisms are processes or devices designed to detect, prevent, or recover from security attacks. Examples include encipherment (encryption), digital signatures, access controls, data integrity checks, authentication exchanges, traffic padding, routing control, and notarization. These mechanisms are the building blocks used to provide the security services.
Relationship mapping. The architecture clarifies how specific mechanisms support various services. For instance, encipherment is key for confidentiality and traffic flow confidentiality. Digital signatures contribute to data origin authentication, data integrity, and nonrepudiation. Access control mechanisms directly support the access control service. This structured view aids in designing and analyzing security systems.
3. Core Security Design Principles
economy of mechanism means that the design of security measures embodied in both hardware and software should be as simple and small as possible.
Simplicity and safety. Effective security design follows established principles. Economy of mechanism emphasizes simplicity for easier testing and verification. Fail-safe defaults dictate that access should be denied by default, only permitting explicitly authorized actions, ensuring safer failure modes. Complete mediation requires every access attempt to be checked, preventing bypasses.
Openness and privilege. Open design advocates for public scrutiny of security mechanisms (like algorithms) to build confidence, while keeping keys secret. Separation of privilege requires multiple conditions to be met for access, limiting damage from single compromises. Least privilege ensures entities operate with only the minimum necessary permissions, reducing potential harm from attacks or errors.
Isolation and usability. Least common mechanism minimizes shared functions to reduce unintended communication paths and dependencies. Psychological acceptability stresses that security should not unduly hinder users, promoting compliance. Isolation separates critical resources, processes, or security mechanisms to limit impact. Encapsulation, modularity, layering (defense in depth), and least astonishment further contribute to robust, manageable, and user-friendly security systems.
4. Analyzing Threats: Attack Surfaces & Trees
An attack surface consists of the reachable and exploitable vulnerabilities in a system...
Identifying vulnerabilities. Understanding potential threats involves analyzing where a system is vulnerable. An attack surface maps these reachable and exploitable points, such as open network ports, vulnerable software code, or susceptible human users (social engineering). Analyzing the attack surface helps prioritize security efforts and identify areas for reduction.
Mapping attack paths. An attack tree is a hierarchical structure representing potential techniques to exploit vulnerabilities. The root is the attack goal, branching into subgoals and leaf nodes representing specific attack steps. Nodes can be AND (all subgoals needed) or OR (any subgoal needed), allowing analysis of different attack strategies.
Guiding defense. Attack surface analysis and attack trees are valuable tools for evaluating threats. They help developers and security analysts visualize attack vectors, understand dependencies between steps, and assess the difficulty or cost of different attack paths. This knowledge directly informs the design of security mechanisms and the selection of countermeasures to block or mitigate attacks at various points.
5. Cryptography: The Essential Foundation
All of the techniques for providing security have two components: 1. A security-related transformation on the information to be sent. 2. Some secret information shared by the two principals...
Transforming data. Cryptography is fundamental to achieving many security services. It involves transforming data using algorithms and secret information (keys) to protect it. This transformation makes data unintelligible to unauthorized parties (confidentiality) or allows verification of its origin and integrity (authentication).
Symmetric vs. asymmetric. Two main types exist: symmetric (conventional) encryption uses the same secret key for both encryption and decryption, requiring secure key distribution. Asymmetric (public-key) encryption uses a pair of keys, one public for encryption/verification and one private for decryption/signing, simplifying key distribution but being computationally more intensive. Hash functions provide a fixed-size "fingerprint" for data integrity without using keys.
Building blocks. These cryptographic techniques are the core mechanisms for services like confidentiality (symmetric/asymmetric encryption), data integrity (hash functions, MACs), authentication (digital signatures, MACs), and key exchange (Diffie-Hellman, RSA). Their strength relies on the secrecy of keys and the computational difficulty of cryptanalysis or brute-force attacks, necessitating sufficient key lengths and robust algorithms like AES, 3DES, RSA, and SHA.
6. Securing Network Access & Authentication
The authentication service is concerned with assuring that a communication is authentic.
Verifying identity. Network access control (NAC) is crucial for managing who and what can connect to a network. A key part of NAC is user authentication, verifying a claimed identity electronically. This involves identification (presenting an ID) and verification (providing information to corroborate the ID), often using passwords, tokens, or biometrics.
Centralized authentication. In distributed environments, centralized authentication services like Kerberos are used. Kerberos relies on symmetric encryption and a trusted third party (Authentication Server and Ticket-Granting Server) to issue tickets and session keys, allowing users to authenticate once and access multiple services without repeatedly sending passwords. This counters threats like impersonation and replay attacks.
Public key infrastructure. Public-key cryptography also plays a vital role in authentication and key distribution. Public-key certificates, signed by trusted Certificate Authorities (CAs) like those defined in X.509, bind a public key to an identity, allowing secure distribution of public keys and verification of digital signatures. Public Key Infrastructure (PKI) provides the framework for managing these certificates and related services.
7. Protecting Data in Transit: TLS, SSH, IPsec
Confidentiality is the protection of transmitted data from passive attacks.
Securing network layers. Protecting data as it travels across networks is paramount. Security can be applied at different layers of the network stack. Transport-level security, like TLS (Transport Layer Security) and its predecessor SSL, operates above TCP, providing confidentiality and integrity for application data streams, commonly used for secure Web browsing (HTTPS).
Secure remote access. Secure Shell (SSH) is another transport-level protocol primarily used for secure remote login, replacing insecure protocols like Telnet. SSH provides server authentication, confidentiality, and integrity for the connection, and supports features like secure file transfer and port forwarding to tunnel other insecure protocols securely.
IP-level protection. IPsec provides security at the network layer (IP), offering authentication and encryption for IP packets themselves. It can operate in transport mode (protecting the IP payload between hosts) or tunnel mode (protecting the entire IP packet between security gateways, often used for VPNs). IPsec uses Security Associations (SAs) to define security parameters and relies on IKE for automated key management.
8. Wireless & Cloud Security Challenges
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.
Unique wireless risks. Wireless networks introduce distinct security challenges compared to wired ones. Broadcast communication is vulnerable to eavesdropping and jamming. Device mobility increases theft risk. Resource-constrained mobile devices are susceptible to DoS and malware. Unattended devices are vulnerable to physical attacks. Threats include accidental/malicious association, ad hoc networks, identity theft, man-in-the-middle, DoS, and network injection.
Mobile device security. Mobile devices (smartphones, tablets) pose significant risks to enterprise networks due to lack of physical control, use of untrusted devices/networks/apps, interaction with other systems, untrusted content, and location services. A security strategy requires device security (passwords, encryption, remote wipe), traffic security (encryption, VPNs, strong authentication), and barrier security (firewalls, IDS/IPS).
Cloud security. Cloud computing, while offering flexibility and scalability, introduces new security concerns as organizations relinquish control to cloud providers (CPs). Risks include abuse, insecure interfaces, malicious insiders, shared technology issues, data loss/leakage, account hijacking, and unknown risk profiles. Data protection in the cloud is critical, often involving encryption, access control, and relying on the CP for security services (SecaaS) like IAM, DLP, and intrusion management.
9. Combating Malicious Software
Programs can present two kinds of threats: 1. Information access threats: Intercept or modify data on behalf of users who should not have access to that data. 2. Service threats: Exploit service flaws in computers to inhibit use by legitimate users.
Malware propagation. Malicious software (malware) poses significant threats. It propagates through infected content (viruses attaching to executables or documents), vulnerability exploits (worms spreading via network/software flaws or drive-by-downloads), and social engineering (trojans disguised as useful software, spam/phishing tricking users). Blended malware combines multiple propagation methods.
Malware payloads. Once active, malware performs various actions. Payloads include system corruption (damaging files, ransomware, real-world damage via logic bombs), attack agents (turning systems into zombies/bots for DDoS, spamming, sniffing), information theft (keyloggers, spyware, phishing for credentials, reconnaissance), and stealthing (backdoors for covert access, rootkits hiding malware presence).
Countermeasures. Defending against malware involves prevention (policy, awareness, vulnerability/threat mitigation), detection (identifying infection), identification (specific malware type), and removal (cleaning infected systems). Countermeasures are deployed at hosts (scanners, behavior blockers, rootkit detection), network perimeters (firewalls, IDS/IPS scanning), and through distributed intelligence gathering systems that correlate data from multiple sensors.
10. Detecting Intruders & Managing Passwords
Most readers are familiar with the concerns caused by the existence of hackers who attempt to penetrate systems that can be accessed over a network.
Intruder types. Intruders, or hackers/crackers, pose a significant threat. They are classified as masqueraders (unauthorized outsiders), misfeasors (authorized users misusing privileges), or clandestine users (gaining supervisory control to evade detection). Their motives range from thrill-seeking to criminal gain or espionage.
Intrusion detection. Since prevention is imperfect, detection is vital. Intrusion detection systems (IDSs) aim to detect intruder activity by analyzing audit records. Approaches include statistical anomaly detection (identifying deviations from normal behavior profiles) and rule-based detection (matching activity patterns against known attack signatures). The base-rate fallacy highlights the challenge of achieving high detection rates with low false alarms. Distributed IDSs coordinate sensors across networks for broader coverage. Honeypots are decoy systems to lure and study attackers.
Password security. Passwords are the primary authentication mechanism but are vulnerable to guessing and cracking attacks (offline dictionary, specific account, popular password, user mistakes, electronic monitoring). Countermeasures include using one-way hash functions with salt to protect stored passwords, enforcing strong password policies (length, complexity, no common words), using proactive password checkers (like Bloom filters) to reject weak choices, and implementing account lockout mechanisms.
11. Building Network Defenses: Firewalls
The first category might be termed a gatekeeper function.
Perimeter defense. Firewalls serve as gatekeepers, establishing a controlled link between a protected network (like an enterprise LAN) and external networks (like the Internet). They enforce an access policy, allowing only authorized traffic to pass, creating a single choke point for security management, monitoring, and auditing. Firewalls protect against external attacks but have limitations against internal threats or those bypassing the firewall.
Types of firewalls. Firewalls operate at different levels. Packet filtering firewalls examine individual packet headers (IP addresses, ports, protocols) based on a ruleset. Stateful inspection firewalls track the state of network connections (especially TCP) to make more intelligent filtering decisions. Application-level gateways (application proxies) act as relays for specific application protocols, inspecting application data. Circuit-level gateways establish two connections and relay traffic without inspecting content, focusing on connection setup control.
Basing and location. Firewalls can be based on dedicated bastion hosts (hardened systems running proxy services), implemented as software on individual hosts (host-based firewalls), or run on personal computers/routers (personal firewalls). Location is critical: firewalls can be external, in a DMZ (demilitarized zone) for public services, or internal to segment the network. Various configurations, including using multiple firewalls and DMZs, are employed to create layered defenses and support specific network topologies like VPNs.
Last updated:
Review Summary
Network Security Essentials receives mixed reviews from readers. Many find it helpful for learning network security concepts, praising its clear explanations and concise content. It's particularly useful for beginners and students in networking classes. Some readers appreciate its comprehensive coverage of security and encryption topics. However, a few reviewers found it challenging, especially those lacking coding knowledge. The book's average rating is 3.73 out of 5 based on 200 reviews. Overall, it seems to be a valuable resource for those studying or working in IT security.
Download PDF
Download EPUB
.epub
digital book format is ideal for reading ebooks on phones, tablets, and e-readers.