Week 8 – CST– 311 Intro to Computer
Networks
Module 8 – Security in Computer Networks
In this short week 8, we continued with security in
computer networks, specifically, firewalls and intrusion detection systems. Firewalls
are a combination of hardware and software which separate an organization’s
network from the rest of the internet.
A system administrator implements a firewall to accomplish
three goals. The first goal is that all traffic from outside to inside and vice
versa must pass through the firewall. This can be accomplished by placing the
firewall at the boundary between the organization’s network and the rest of the
internet. It is also easier to manage access when locating a firewall at a
single access point to the network. The second goal allows access only to
authorized traffic. If all traffic is coming and going through the firewall, it
can restrict access to unauthorized traffic. Lastly, the third goal is for a firewall
to be immune to penetration. For this goal, the administrator must design and
install the firewall properly. Failure to do so will compromise the efficiency which
will provide a false sense of security.
Firewalls can be further categorized into three classifications:
traditional packet filters, stateful filters, and application gateways. A packet
filter examines each datagram in isolation to determine if the datagram should
be dropped because it does not meet administrator-specific rules. Stateful filters
track TCP connections and use the information to make filtering decisions. An application
gateway is an application-specific server where all data must pass. To provide
greater security, firewalls must combine packet filters with application
gateways.
Intrusion detection systems or IDS are devices that
generate an alert when they observe potentially malicious traffic. IDSs provide
deep packet inspection. They look at the contents of a packet such as character
strings and compare them against a database of known viruses or attack strings.
An IDS can detect a wide range of attacks such as network mapping, port scans,
TCP stack scans, DoS bandwidth-flooding attacks, worms, viruses, OS
vulnerability attacks, and application vulnerability attacks.
Comments
Post a Comment