BUILT SECURE NETWORKS
Of the various components that go into making a network
secure, one to the first things to establish is what exactly needs to be
protected. A number of different network element types exist on a network, and
all of these must be considered throughout the design process. Table 1-1 shows
a number of these different elements that must be considered when building a
secure network.
Table1-1
Network Security
Elements
Target
|
Potential
attacks
|
Routers
|
The types of attack used against a router depend on
the attacker’s intent. An access attack is used if the intent is to gain
access to the router or network. A denial of service (DoS) or distributed DoS(DDos)
attack brings down the router or to introduce routing changes to redirect
traffic and deny access to the network.
|
Firewalls
|
Attack against firewalls are virtually are the same as routers; however,
the techniques might differ depending on the size and types of firewall being
attacked
|
Switches
|
Any attack on specific network switch will affect
how traffic flows across that segment. Because network traffic concentrates at
the switches, it is important to ensure that all switches are secure. This
issue has become even more important with the deployment of layer 3 switches in
place of routers.
|
servers
|
Servers can be a large target for attackers because they are used for
data storage as well as computer and network access. If an attacker was able
to exploit a serve, many of the devices in the network will be instantly
vulnerable as data from the server can be used to access them.
|
The next thing to determine is that exactly needs to be down
for the network and elements on the network to stay secure. Three of the main
aspects of network data that need to be secured include confidentiality, integrity,
and availability, as outlined in table 1-2.
Table 1-2
Security Aspects
Confidentiality
|
The ability to maintain the confidentiality of the data
on company’s network could make or break a company. If any amount of data is
able to be harvested and distributed without authorization, number of things
could happen. This includes everything from identify theft and sabotage to
espionage.
|
Integrity
|
The integrity of data is one thing that many take for
granted. Has any data that has been received been altered in transit? If the
answer to this question is ever unknown, nothing that we rely on though this
data can be trusted, for example, what would happen if someone was able to
hack into the database of a credit reporting agency and alter late payments
or delinquencies on your account? The information that is received by
creditors would be incorrect, and thus decisions made based on this
information would be incorrect.
|
Availability
|
The availability of the device and data on networks is one of most
obvious and most noticed problems. Is the network available? Are the servers
up and running as they should be? Many attacks that are launched on companies
are not looking to exploit the data on their networks but to just interfere
with their business operations. These types of attacks also require less technical
skill and are thus easier to carry out.
|
No comments:
Post a Comment