MIS course plan

Security

by

Matthew Martin

 

Contents

  1. Firewalls
    1. Rules
    2. Logs
    3. Simple Network Set-up
    4. Demilitarised Zone (DMZ)
    5. Testing

 

top of page

 

Security is a key aspect of networking today. When considering security a number of different types of potential threats need to be taken into account. These can be summarised into two categories:

A number of different approaches are required in order to establish and then maintain the security of the system.

top of page

Security Procedures And Threats

The organisations procedures for security are an extremely important factor it tackling security issues. They need to attempt to cover a range of possibilities, yet at the same time not be so complex as to make it difficult for staff to understand or carry them out. Security policies need to take into account a range of possible security breaches:

Having good logging facilities provides a record of abuses. This can be useful in identifying holes in security and also the pattern of repeat attacks.

top of page

Firewalls

A firewall is a hardware or software product that provides the most fundamental protection. Typically a firewall is either a specialised piece of hardware or a piece of software typically running on a special server. In either case the firewall sits between the local network and the outside world. You can think of it as being something like a bouncer that checks incoming communications, if they are not on the list of allowed communications, then they are not allowed in. In addition the firewall checks all outgoing communications too, preventing them if they are not on the list.

Rules

Firewalls typically work using a set of rules, stating which services are allowed and denied. This can be very valuable, for instance where a hacker may try to use a computer system remotely using Telnet or access files using FTP, the ports for these services can be locked down by the firewall. In addition to ports being blocked specific software applications can also be blocked. This is sometimes used in order to stop staff from using chat rooms (IRC). It is also possible to limit access to the network according to the source of the connection, time and other ways also.

The firewall rules set is either default deny or default allow. Default deny means that all traffic is blocked unless there is a specific rule allowing it. Default allow permits all traffic unless there is a specific rule denying it. The default deny is more secure.

top of page

Logs

Any good firewall will also provide logging facilities, allowing all traffic that has been blocked to be examined by the administrator. This can be very valuable when trying to identify a hacker attempting to break into a system, since they may make many failed attempts to gain access to the system and also using software to probe the defences as they perform reconnaissance. Identifying a hacker scouting out the system at this stage can alert the administrator to the threat and may also allow the pattern of the attack to be determined.

top of page

Simple Network Set-up

It is perfectly possibly, as well as being a very good idea, to have a firewall running on a stand-alone PC. However, here that will not be considered, since we a looking at the set-up of a firewall on a network.

The simplest network set-up, but by no means the least effective, is to have firewall software running on a dedicated server, which has two separate LAN adapters (Network Interface Cards, NICs). One LAN adapter (NIC) connects to the Internet via a router, the other LAN adapter connects to the local network. All communications to the outside world are routed through the firewall server. Since the firewall server uses two separate LAN adapters, connections with the Internet are completely controlled by the firewall.

top of page

Demilitarised Zone (DMZ)

A more sophisticated arrangement is to use a DMZ. This involves using an area behind the firewall where computers are placed that provide services requiring Internet access, for such things as e-mail (POP3 & SMTP), web servers (HTTP) and file server (FTP). This is the DMZ. A second firewall is placed between the DMZ and the local network. This arrangement is said to be a deep defence.

Attackers will normally only be able to see the computers in the DMZ, computers further inside the defences are obscured. Consequently attacks will tend to be concentrated on the computers in the DMZ. The services provided by the computers in the DMZ can be carefully limited, thus limiting the range of services that can potentially be exploited.

top of page

Testing

A good systems administrator will test their firewall defences, attempting to penetrate it in order to determine how secure it actually is. This can allow the rules to be adjusted and also provide the administrator with a chance to learn what the logs look like when a particular type of attack has taken place.

 

 

by

Matthew Martin

top of page