ABSTRACT
Today's world is a networked world in which everyone is entering into outside world for mainly, for communication purpose. This is possible only due to the internet facility whose access is an immense source of information. Apart from being a source, we need to have secure communication channel through which the information passes. Loss of irreplaceable data is very real threat, especially for the business owners. They need to communicate with their vendors, employees, customers who are far away from each other. At this stage, Internet will be the easiest & fast source of information exchange for them. So, to keep this information safe & secure, a need felt to provide security to the Internet.
Network security is a complicated subject, historically only tackled by well-trained and experienced experts. Network, as it is vast, interconnected & complicated structure requires lot of understanding about each component, which is a part of it. So, Network Security tests our stamina about keeping the network as safe, secure as possible. As more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world. Network Security ensures the reliability, flexibility of an network's working so as to make smooth communication through the network. Any organization, before taking Internet access, first think of firewall.
Some history of networking is included, as well as an introduction to TCP/IP and internetworking. Some points are also concerned to the types of threats, from which one should be aware of, & providing protection against it.
INDEX
1. INTRODUCTION
2. SECURED COMMUNICATION
3. NEED OF SECURITY
- THREATS TO SECURITY
4. MECHANISMS OF SECURITY
5. CRYPTOGRAPHY
- SECRET - KEY ENCRYPTION
- PUBLIC - KEY ENCRYPTION
- FIREWALL AND INTERNET ACCESS.
- FIREWALL ARCHITECTURE
- PACKET - LEVEL FILTERS.
- SECURITY AND PACKET FILTER MECHANISM.
- ACCESSING SERVICES THROUGH A FIREWALL.
- NETWORK SECURITY TOOLS
- CONCLUSION
- REFERENCES
INTRODUCTION
Network
A ``network'' has been defined as
``Any set of interlinking lines resembling a net, a network of roads || an
interconnected system, a network of alliances.''
This definition suits our purpose well:
A computer network is simply a system of interconnected computers.
Security
Security by the name itself is very important for any individual, a machine or also in a network like the locks to help tangible property secure, computers and data networks need provisions that help keep the information secure. Security in an Internet environment is both important and difficult. It is important because information has a significant value -information can be bought and sold directly or used indirectly to create new products and services that yield high profits. Security in an internet is difficult because involves understanding when and how participating users, computers, services and networks can trust one another, as well as understanding the technical details of network hardware and protocols.
As the Internet is becoming more complex day by day security administrators face the risk of being attacked by external intruders that may
- Read Access - Read or copy confidential information.
- Write Access - Write to network or perhaps infect the system with the system with viruses and Trojan horses.
- Denial of Service - Deny authorized users normal network services.
A single computer can compromise the security of entire network. To guard against such threats the security of distributed system, security
policies must be adapted and security mechanisms must be employed to implement security policies.
Threats
There are four classes of Security threats to computers systems. These are
- Leakage
- Tempering
- Resource stealing
- Vandalism
Thus to guard against threats to the security of distributed system, security policies as well as security mechanisms must be employed thereby providing a secure communication link for a data transmission between interconnected host computer systems of network.
SECURED COMMUNICATION
Suppose two persons A & B are communicating. Both of them make sure that contents delivered are not altered by an intruder and are being transferred between them only. The following considerations below reflect these desirable properties of secure communication.
SECRECY
Only the sender and the intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message been somehow "encrypted" so that an intercepted message can be "decrypted" by an interceptor. For example, A might also want the mere fact that she's communicating with B to be a secret.
AUTHENTICATION
Here both the sender and receiver need to confirm the identity of the other party involved in the communication- to confirm that the other party is indeed who or what they claim to be.
For example - If A receives mail from B, in order to know that it has been sent by the B only A needs some authentication; likewise in network there are authentication protocols.
MESSAGE INTEGRITY
Here the sender and receiver want to ensure that apart from authentication the content of their communication is not altered, either maliciously or by accident in transmissions.
NEED FOR NETWORK SECURITY
Most of the security problems are intentionally caused by malicious people trying to gain some benefit or harm some one enforcing the security administrators to keep network free from programming errors. Thus in turn involves out mastering often intelligent, dedicated and sometimes well-funded adversaries and hence need for security rises. The issue is that network security calls for protections against malicious attack by hackers and intruders, but security is also associated with controlling and authorization mechanisms and the prevention of the effects of errors and equipment failures.
All communication over Internet uses the transmission control protocol /Internet protocol (TCP/IP). TCP/IP allows information to be send from one computer to another computer through variety of intermediate computer and separate network before its destination.
The great flexibility of TCP/IP has led to its worldwide acceptance as the basic Internet and Intranet communications protocol. At the same time, the fact that TCP/IP allows information to pass through intermediate computers makes it possible for a third party to interface with communications in the following ways:
- Eavesdropping. Information remains intact, but its privacy is compromised .For example, someone could learn your credit card number, record a sensitive conversation, or intercept classified information.
- Tampering. Information in transit is changed or replaced and then sent on to the recipient. For example, someone could alter an order for goods or change a person's resume.
- Impersonation. Information passes to a person who poses as the indirect recipients. Impersonation can take two forms
- Spoofing: - A person can pretend to be someone else.
For example, a person can pretend to have the email address jdoe@mozilla.com <mailto:jdoe@mozilla.com>, or a computer can identify itself as a site called www.mozilla.com http://www.mozilla.com
when it is not. This type of impersonation is known as spoofing.
- Misrepresentation: - A person or organization can misrepresent itself. For example, suppose the site www.mozilla.com http://www.mozilla.com pretends to be a furniture store when it is really just a site that takes credit-card payments but never sends any goods.
MECHANISMS FOR NETWORK SECURITY
Internet security problems can be divided into three broad sets.
CRYPTOGRAPHY
INTRODUCTION
FIREWALLS AND INTERNET ACCESS
NETWORK SECURITY TOOLS
SATAN, the System Administrator Tool for Analyzing Networks, is a network security analyzer designed by Dan Farmer and Wietse Venema. SATAN scans systems connected to the network noting the existence of well known, often exploited vulnerabilities. For each type of problem found, SATAN offers a tutorial that explains the problem and what can be done.
- ipacl
The ipacl package from Siemens. Forces all TCP and UDP packets to pass through an access control list facility. The configuration file allows packets to be accepted, rejected, conditionally accepted, and conditionally rejected based on characteristics such as source address, destination address, source port number, and destination port number. Should be portable to any system that uses System V STREAMS for its network code.
- TCP Wrappers
The tcp_wrapper package by Wietse Venema. Formerly called log_tcp. Allows monitoring and control over who connects to a hosts TFTP, EXEC, FTP, RSH, TELNET, RLOGIN, FINGER, and SYSTAT ports. Also includes a library so that other programs can be controlled and monitored in the same fashion.
Some more no. of tools are as follows:
- Logdaemon
- Portmap
- Rpcbind
- Sara
- Scanssh
- Securelib
- Rpcbind
CONCLUSION
Security is a very difficult topic. Everyone has a different idea of what ``security'' is, and what levels of risk are acceptable. The key for building a secure network is to define what security means to your organization . Once that has been defined, everything that goes on with the network can be evaluated with respect to that policy. Projects and systems can then be broken down into their components, and it becomes much simpler to decide whether what is proposed will conflict with your security policies and practices.
Many people pay great amounts of lip service to security, but do not want to be bothered with it when it gets in their way. It's important to build systems and networks in such a way that the user is not constantly reminded of the security system around him. Users who find security policies and systems too restrictive will find ways around them. It's important to get their feedback to understand what can be improved, and it's important to let them know why what's been done has been, the sorts of risks that are deemed unacceptable, and what has been done to minimize the organization's exposure to them.
Security is everybody's business, and only with everyone's cooperation, an intelligent policy, and consistent practices, will it be achievable.
REFERENCES
- Computer networks by Andrew Tannenbaum.
- Computer networking by John Martin.
- Internetworking with TCP/IP by Douglas E.Comer.
No comments:
Post a Comment