Download common network environments, connectivity and

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Business intelligence wikipedia , lookup

Telecommunication wikipedia , lookup

Transcript
TOPIC 10
COMMON NETWORK
ENVIRONMENTS, CONNECTIVITY
AND SECUTRITY ISSUES
CONTENT:
10.1 DATA TRANSMISSION
10.2 NETWORK COMPONENTS
10.3 USE OFNETWORKS TO SUPPORT HYPER-LINKING SYSTEMS SUCH AS
WORLD WIDE WEB (WWW)
10.4 COMMON NETWORK ENVIRONMENTS
10.5 ISSUES OF CONFIDENTIALITY
10.6 ENCRYPTION AND AUTHENTICATION TECHNIQUES
Data transmission is, very generally speaking, the conveyance of
any kind of information from one space to another. Historically this
could be done by courier, a chain of bonfires or semaphores, and
later by Morse code over copper wires.
In recent computer terms, it means sending a stream of bits or bytes
from one location to another using any number of technologies to
do so. Among them are copper wire, optical fibre, radio-link, laser,
radio or infra-red light.
A related concept to data transmission is the data transmission
protocol used to make the data transfer legible. Current protocols
favor packet based communication.
A computer network is a system for communication between
computers. These networks may be fixed (cabled, permanent)
or temporary (as via modems or null modems).
The public switched telephone network (PSTN) is the
concentration of the world's public circuit-switched telephone
networks, in much the same way that the Internet is the
concentration of the world's public IP-based packet-switched
networks. Originally a network of fixed-line analog telephone
systems, the PSTN is now almost entirely digital, and now
includes mobile as well as fixed telephones.
WHAT IS ENCRYPTION ?
Encryption refers to algorithmic schemes that encode plain text into non-readable form
or cyphertext, providing privacy. The receiver of the encrypted text uses a “key” to
decrypt the message, returning it to its original plain text form. The key is the trigger
mechanism to the algorithm.
Until the advent of the Internet, encryption was rarely used by the public, but was
largely a military tool. Today, with online marketing, banking, healthcare and other
services, even the average householder is aware of encryption.
Web browsers will encrypt text automatically when connected to a secure server,
evidenced by an address beginning with https. The server decrypts the text upon its
arrival, but as the information travels between computers, interception of the
transmission will not be fruitful to anyone “listening in.” They would only see
unreadable gibberish.
There are many types of encryption and not all of it is reliable. The same computer
power that yields strong encryption can be used to break weak encryption schemes.
Initially, 64-bit encryption was thought to be quite strong, but today 128-bit encryption
is the standard, and this will undoubtedly change again in the future.
Though browsers automatically encrypt information when
connected to a secure website, many people choose to use
encryption in their email correspondence as well. This can easily
be accomplished with encryption programs that feature plug-ins or
interfaces for popular email clients. The most longstanding of
these is called PGP (Pretty Good Privacy), a humble name for
very strong military-grade encryption program. PGP allows one to
not only encrypt email messages, but personal files and folders as
well.
Encryption can also be applied to an entire volume or drive. To
use the drive, it is “mounted” using a special decryption key. In
this state the drive can be used and read normally. When finished,
the drive is dismounted and returns to an encrypted state,
unreadable by interlopers, Trojan horses, spyware or snoops.
Some people choose to keep financial programs or other sensitive
data on encrypted drives.
Encryption schemes are categorized as being symmetric or asymmetric. Symmetric
key algorithms such as Blowfish, AES and DES, work with a single, prearranged key
that is shared between sender and receiver. This key both encrypts and decrypts text.
In asymmetric encryption schemes, such as RSA and Diffie-Hellman, the scheme
creates a “key pair” for the user: a public key and a private key. The public key can
be published online for senders to use to encrypt text that will be sent to the owner of
the public key. Once encrypted, the cyphertext cannot be decrypted except by the one
who holds the private key of that key pair. This algorithm is based around the two
keys working in conjunction with each other. Asymmetric encryption is considered
one step more secure than symmetric encryption, because the decryption key can be
kept private.
Strong encryption makes data private, but not necessarily secure. To be secure, the
recipient of the data -- often a server -- must be positively identified as being the
approved party. This is usually accomplished online using digital signatures or
certificates.
As more people realize the open nature of the Internet, email and instant messaging,
encryption will undoubtedly become more popular. Without encryption, information
passed on the Internet is not only available for virtually anyone to snag and read, but
is often stored for years on servers that can change hands or become compromised in
any number of ways. For all of these reasons encryption is a goal worth pursuing.
SECURITY ISSUES FOR TELECOMMUTING
Information and telecommunications technologies make telecommuting an
option for many organizations and workers. Organizations promote
telecommuting to allow their employees to work from home, while on travel, at a
client site, or in a telecommuting center. While offering potential benefits,
telecommuting introduces new risks to the organization. This bulletin highlights
security issues related to telecommuting and proposes solutions that may help
organizations manage the telecommuting environment more effectively.
Telecommuting is the use of telecommunications to create an "office" away
from the established (physical) office. The telecommuting office can be in an
employee's home, a hotel room or conference center, an employee's travel site,
or a telecommuting center. The telecommuter's office may or may not have the
full computer functionality of the established office. For example, an employee
on travel may read email. On the other side of the spectrum, an employee's
home may be equipped with Integrated Services Digital Network (ISDN) access
to provide the employee full computer capability at high speeds.
The Risk of Telecommuting
One of the popular buzz words for management in the '90s, telecommuting is becoming
accepted as the way to do business. However, opening up an organization's information
systems to dial-in and other forms of access presents significant security risks.
One risk is that intruders will be able to access corporate systems without having to be on
site. Hackers, electronic eavesdroppers at conference sites, or shoulder surfers watching
employees enter IDs and passwords, present very real threats. In addition to intruders
whose goal may be mischief, hacking is attractive to people trying to steal or misuse
corporate information. Electronic access to records may be difficult to trace and thus
more appealing than trying to bribe employees or gain physical access.
Another risk of telecommuting is that corporate information can be read, and potentially
modified, while it is in transit. Telecommuting also presents organizations with more
commonplace risks. These include the risk of losing corporate information and resources
when they are outside the protective shell of the organization.
Security Issues for Telecommuting Centers
Telecommuting centers, normally located in outlying suburbs, offer another
choice for organizations. From a security perspective, they may provide
hardware for encryption, removable hard drives, and increased availability.
However, by concentrating telecommuters, the centers may make themselves a
more attractive target for eavesdropping. At a minimum, organizations should
require robust authentication from telecommuting centers. If communications
encryption is supported by the center, organizations should be aware that data
may not be encrypted while it is inside the center. The encryption may occur at a
modem pool.
Home System Availability
In addition to the possibility of failure or theft of a home computer, it may not be
compatible with office configurations. For example, the home computer may use a different
operating system. This and other circumstances may complicate set up, software support,
troubleshooting, or repair. Organizations should ensure that policies are in place to cover all
of these situations.
Security Issues for Telecommuting from Home
In addition to risks to internal corporate systems and data in transit, telecommuting from home
raises other concerns related to whether employees are using their own computers or using
computers supplied to them by the organization.
Security Issues for Data Transfer
In addition to gaining access to internal systems, intruders can also eavesdrop on an entire
session. Eavesdropping is not technically difficult if there is physical access to cable or wire
used for communication or logical access to switching equipment. If a telecommuting
employee is transferring data that an eavesdropper would want, encryption may be necessary.
Eavesdropping is more likely if an employee is at a large conference or other location where
an eavesdropper may set up equipment in hopes of hearing something useful. Some
conferences offer equipment to attendees to use to check email, transfer files, etc. Attendees
find this useful, since they do not need to provide laptops; however, this could be a target for
electronic eavesdropping.
Software- or hardware-based encryption provides strong protection against electronic
eavesdropping. However, encryption is more expensive (in initial and operating costs) than
robust authentication. It is most useful if highly confidential data needs to be transmitted or if
moderately confidential data is transmitted in a high-threat area. Since employees do not
always know when they are in a high-threat area, management must train employees to
consider this potential threat.
Security Technologies
With the rapid growth of interest in the Internet, network security has become a major
concern to companies throughout the world. The fact that the information and tools
needed to penetrate the security of corporate networks are widely available has increased
that concern.
Because of this increased focus on network security, network administrators often spend
more effort protecting their networks than on actual network setup and administration.
Tools that probe for system vulnerabilities, such as the Security Administrator Tool for
Analyzing Networks (SATAN), and some of the newly available scanning and intrusion
detection packages and appliances, assist in these efforts, but these tools only point out
areas of weakness and may not provide a means to protect networks from all possible
attacks. Thus, as a network administrator, you must constantly try to keep abreast of the
large number of security issues confronting you in today's world.
Security Issues When Connecting to the Internet
When you connect your private network to the Internet, you are physically connecting
your network to more than 50,000 unknown networks and all their users. Although
such connections open the door to many useful applications and provide great
opportunities for information sharing, most private networks contain some
information that should not be shared with outside users on the Internet. In addition,
not all Internet users are involved in lawful activities.
Protecting Confidential Information :
Confidential information can reside in two states on a network. It can reside on physical
storage media, such as a hard drive or memory, or it can reside in transit across the
physical network wire in the form of packets. These two information states present
multiple opportunities for attacks from users on your internal network, as well as those
users on the Internet. We are primarily concerned with the second state, which involves
network security issues.
The following are five common methods of attack that present opportunities to
compromise the information on your network:
Network packet sniffers
IP spoofing
Password attacks
Distribution of sensitive internal information to external
sources
Man-in-the-middle attacks
When protecting your information from these attacks, your concern is to prevent the
theft, destruction, corruption, and introduction of information that can cause
irreparable damage to sensitive and confidential data. This section describes these
common methods of attack and provides examples of how your information can be
compromised.
Summary
When defining a security policy for your organization, it is important to strike a balance
between keeping your network and resources immune from attack and making the system
so difficult to negotiate for legitimate purposes that it hinders productivity.
You must walk a fine line between closing as many doors as possible without encouraging
trusted users to try to circumvent the policy because it is too complex and time-consuming
to use.
Allowing Internet access from an organization poses the most risk to that organization.
This chapter has outlined the types of attacks that may be possible without a suitable level
of protection. If a compromise occurs, tools and applications are available to help flag
possible vulnerabilities before they occur—or to at least help the network administrator
monitor the state of the network and its resources.
It is important to stress that attacks may not be restricted to outside, unknown parties, but
may be initiated by internal users as well. Knowing how the components of your network
function and interact is the first step to knowing how to protect them.
Security Technologies.htm