Week 8 – CST– 311 Intro to Computer Networks

Module 8 – Security in Computer Networks

In this short week 8, we continued with security in computer networks, specifically, firewalls and intrusion detection systems. Firewalls are a combination of hardware and software which separate an organization’s network from the rest of the internet.

A system administrator implements a firewall to accomplish three goals. The first goal is that all traffic from outside to inside and vice versa must pass through the firewall. This can be accomplished by placing the firewall at the boundary between the organization’s network and the rest of the internet. It is also easier to manage access when locating a firewall at a single access point to the network. The second goal allows access only to authorized traffic. If all traffic is coming and going through the firewall, it can restrict access to unauthorized traffic. Lastly, the third goal is for a firewall to be immune to penetration. For this goal, the administrator must design and install the firewall properly. Failure to do so will compromise the efficiency which will provide a false sense of security.

Firewalls can be further categorized into three classifications: traditional packet filters, stateful filters, and application gateways. A packet filter examines each datagram in isolation to determine if the datagram should be dropped because it does not meet administrator-specific rules. Stateful filters track TCP connections and use the information to make filtering decisions. An application gateway is an application-specific server where all data must pass. To provide greater security, firewalls must combine packet filters with application gateways.

Intrusion detection systems or IDS are devices that generate an alert when they observe potentially malicious traffic. IDSs provide deep packet inspection. They look at the contents of a packet such as character strings and compare them against a database of known viruses or attack strings. An IDS can detect a wide range of attacks such as network mapping, port scans, TCP stack scans, DoS bandwidth-flooding attacks, worms, viruses, OS vulnerability attacks, and application vulnerability attacks.

Comments

Popular posts from this blog