Network Security

OSI MODEL

Also Known as Open System Model, This was developed as a way to help categorize how computers communicate with one another

  • Application Layer
  • Presentation Layer
  • Session Layer
  • Transport Layer
  • Network Layer (router) IP (also non-local)
  • Data Link Layer (switch, wap) mac address (local)
  • Physical Layer (modem, hub)

DOD MODEL

  • Process/Application layer
  • Host-to-Host layer
  • Internet layer
  • Network Access layer

Security Devices

  • Firewall : The purpose of a firewall is to manage the types of traffic that can enter and leave a protected network. First line of defence in protecting internal network from outside threat.

    • Stateless Inspection -> Examines every packets, doesn’t maintain an internal state from one packet to another.
    • Stateful Inspection -> Only Examine the state of a connection , stores information about active network connections
  • IDS : Identify when a network breach or attack has occured

    • Signature Based
    • Anomaly Based
    • Policy Based

https://github.com/proflamyt/Protocol-Based-Intrusion-Detection

  • VPN : facilitates an encrypted connection to a private network over the internet. remote host will be seen as a private host.
    • site-to-site VPN
    • remote-access VPN
    • SSL VPN (uses webserver) can operate in layer 2, 3, 7

      • VPN PROTOCOLS:

        • IPSec : Uses AH (authentication but not encryption) or ESP (authenticate and encrypt) , Only transmit one-to-one commmunication
        • GRE (Generic Routing Encapsulation) : one-to-many communication
        • Point-To-Point Tunneling Protocol : supports dial up
        • TLS : uses assymentric enc. (TLS 1.2 & 1.3 is considered save)
        • SSL : older ( TLS 1.0 and even SSL 3.0 unsafe)

Optimization/Performance Devices

  • Load Balancers : Spread and distribute work load. example: nginx

  • Proxy Server:

Appliance that request resources on behalf of client machine

example: nginx

DHCP

Dynamic Host COntrol Protocol, Assigns IP address to hosts on a network.

HOW DHCP WORKS:

  • A new computer sends a dhcp discovery packet to 255.255.255.255 (broadcast) on UDP port 67.
  • DHCP server which listens on that port , replies to the mac address of the requesting computer with an offer packet on UDP port 68.
  • This new computer that receives the offer packet now knows the DHCP server, and sends a request packet only this time only to the DHCP server
  • DHCP server replies with the acknowledgment packet which contains all necessary information, including the IP address for the new compuer
  • Once the new computer receives this info, it changes it’s details to match the information.

DNS

Matches Human readable names to IP addresses.

Types:

- Root Server
- TLD Servers
- Authoritative
- Non-Authoritative

NAT

  • Static NAT (maps public to private)
  • Dynamic NAT ()

https://www.vice.com/en/article/wnnmv9/undersea-cable-surveillance-is-easy-its-just-a-matter-of-money https://www.cybertalk.org/2022/04/22/hawaii-undersea-cable-attack-a-credential-theft-story/