Wednesday, 25 April 2012

Security Policy

A security policy is a formal statement of the rules by which people who are given access to 
an organization’s technology and information assets must abide.


The reason to have a security policy is to have a baseline of the current security condition and also setting up a framework for security purposes such as defining what type of behaviors is allowed or not allowed. It also determines which tools to use when necessary and the procedures on handling security incidents so as to mitigate them. 


Network security is a continuous process cycle and is built around the policy which usually involves 4 steps or more.


1.) Securing the network - Implement security solution such as authentication,encryption and firewalls to prevent unauthorized access and to protect information.


2.) Monitoring Security - Monitors system logging and real-time intrusion detection on the network to prevent violation towards the security policy.


3.) Test security - Validates the security and effectiveness through system auditing and pen-testing.


4.) Update/Improvise Security - Uses information from the previous phase to improvise and make changes to the security policy and having training for the staffs where necessary. 


The following diagram of the security policy life cycle:








References:
OLIVE teaching materials.







Common Network Attacks Threats and Solution


IP Spoofing


In computer context, IP spoofing is a term that refers to a person or program that disguise as a trusted source by falsifying the data, the purpose is to gain unauthorized access to the computer or inflict damage to the network.


The most common spoofing attack is called an IP spoofing. This type of attack takes advantage of the Internet Protocol (IP), which is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. The computer send data over the network by using IP, which the data has a header containing the source address of the sender, the attacker then modify the source header so it contain different address and so whoever receive the spoofed packet will then send back the to the modified source address, this technique is mainly used in Denial-of-service attacks (DoS) whereby the attacker does not care about the response. 


Packet filtering is one of the solution against IP spoofing attacks. There are 2 types of filtering method, firstly the ingress filtering which is usually perform by a router which blocks the packets outside the network with a source address inside the network. This helps to prevent an outside attacker spoofing the address of an internal machine.


Another filtering method would be egress filtering which is usually used with ingress filtering, it blocks the packets from inside the network containing a source address that is not inside. This helps to prevent an attacker within the network from launching IP spoofing attacks against external machines. It is also recommended to design network protocols and services that they do not rely on the IP source address for authentication.


The following diagram shows how this is done:




Denial of service attack



denial-of-service attack (DoS attack) is an attempt to make a computer or network resource unavailable  temporarily or indefinitely to its intended users.


One common method of attack involves flooding the target machine with external communications requests, such that it cannot respond to intended traffic, or making it responds so slow that it rendered them unavailable. Such attacks usually lead to a server overload, the DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the server so that they can no longer communicate smoothly.


The following diagram shows how this type of attack is performed:


Cisco CCNA Security: Learn Your Enemy - ICMP Flood Attack


The simplest solution was to completely disable ICMP from untrusted interfaces using firewall or packet filtering and the more complicated one was to limit down the rate of the ICMP requests transmission in case of attack.




Sniffer attack



A sniffer is an application that can capture network packets. Sniffers are also known as network protocol analyzer. If the network packets are not encrypted, the data within the network packet can be read using a sniffer. 


Sniffing refers to the process used by attackers to capture network traffic using a sniffer. Once the packet is captured using a sniffer, the contents of packets can be analyzed. Sniffers are used by hackers to capture sensitive network information, such as passwords and account information etc.


The following diagram shows how this type of attack is performed:







The only possible solution for sniffer attack is to have encryption setup end-to-end.






References:

http://en.wikipedia.org/wiki/IP_address_spoofing
http://www.webopedia.com/TERM/I/IP_spoofing.html
http://en.wikipedia.org/wiki/Denial-of-service_attack
http://www.omnisecu.com/security/sniffer-attack.htm