background image
558 Chapter 15: Network Security Technologies
Often there is a trade-off between redundancy, availability, and cost. Good security reduces
costs.
WARNING
You do not have network security if it is undocumented in any way or if no designated person
has the time and authority to enforce policies.
Security policies define the type of security put into place. They are identified by several
different terms:
·
Permissive or open--Everything that is not explicitly prohibited is allowed. This is
similar to a highway where all traffic is permitted, except where the signs say "no trucks
allowed." All other traffic flows normally--except the trucks, of course.
·
Restrictive or closed--Everything that is not explicitly allowed is prohibited. This is
similar to backstage passes at major concerts. At the end of the show, people are allowed
to enter the star's dressing room only if their names appear on the security guard's
backstage pass list. All others are explicitly denied entrance to the star's dressing room.
Security Issues
Firewalls are a major piece of the security puzzle. Other pieces are remote-access users, such
as mobile users, telecommuters, and SOHO users. All of these access users need to be
authenticated somehow--usually by a password. The goal is to keep security as simple as
possible while providing a flexible and secure network.
Network security issues involve technology weaknesses, configuration weaknesses, and policy
weaknesses:
·
Technology weaknesses--TCP/IP has many weaknesses that can be exposed by
attackers, including session hijacking, in which a user monitors traffic between two hosts
and injects traffic as if it were one of the hosts, stealing the session. Because UNIX and
Windows NT servers use TCP/IP, they are vulnerable to these types of attacks. Figure 15-
4 shows a denial-of-service (DoS) attack. With denial of service, an attacker deliberately
overwhelms a server with too many requests or too much data, thereby denying service to
legitimate users. This problem is very hard to solve because the affected system cannot
determine whether the person is a legitimate user or an attacker. Other weaknesses
include:
-- IP spoofing--Spoofing is pretending to be someone you are not by providing
false information to gain unauthorized access.
87200333.book Page 558 Wednesday, August 22, 2001 1:41 PM