You are on page 1of 86

Information Systems Security

Telecommunications
Domain #7

OSI Reference Model

Physical
Datalink
Network
Transport
Session
Presentation
Application

Routing
Dynamic
RIP I
RIP II
OSPF
BGP

Cabling Types - Coaxial


Copper wire insulated by braided metallic ground
shield
Less vulnerable to EMI
Two main types
10BASE2 (Thinnet) (185 meters)
10BASE5 (Thicknet) (500 meters)

Mainly used in one-way networks (TV)


Two-way networks required special equipment
Larger minimum arc radius than TP

Cabling Type - TP
Copper-based
Two major types
UTP
Least secure
Susceptible to EMI, cross-talk, and eavesdropping
Less security than fiber or coaxial
Most commonly used today

STP
Extra outer foil shielding

Cabling Type - Fiber

Data travels as photons


Higher speed, less attenuation, more secure
Expensive and harder to work with
Two major types
Multimode
Less expensive with slower speed

Single mode
Faster speeds available but more $ and delicate

Signal Issues
Attenuation
Interference from environment
Cable runs are too long
Poor quality cable

Cross Talk
Signals radiate from a wire and interfere with
other wires
Data corruption
More of a problem with UTP

Transmission Types
Analog
Carrier signal used to move data
Signal works at different frequencies
Used in broadband networks

Digital
Discrete units of voltage
Moves data in binary representation
Cleaner signal compared to analog

Encoding Techniques
Parameter

AM

FM

Digital

Signal-tonoise ratio
Cost

Low

Moderate

High

Moderate

Moderate

High

Performance Moderate
Excellent
Excellent
over time
Installation
Adjustments No
No
required
adjustments adjustments

Synchronous or Asynchronous
Sync
Prior agreement of data TX rules
Sending system sends a clocking pulse
Stop and start bits are not required
T-lines & optical lines use synchronous

Asynchronous
Must use start/stop bits
Dial-up connections use asynchronous

Broadband or Baseband
Baseband
TX media only uses one channel
Digital signaling
Used over TP or Coax

Broadband

Multiple channels
TXs more data at one time
Can use analog signaling
Used over coax or fiber (at 100Mbps or more)
Can carry video, audio, data, and images

Plenum Cable
Polyvinyl chloride can give off dangerous
chemicals if burned
Plenum rated cable is made of safe
fluoropolymers
Should be used in dropped ceilings and
raised floorings and other ventilation areas

Number of Receivers
Unicast
One system communicates to one system

Multicast
One system communicates to many systems
Class D addresses dedicated to this
Opt-in method (webcasts, streaming video)

Broadcast
One system communicates to all systems
Destination address contains specific values

Types of Networks
Local Area Network (LAN)
Limited geographical area
Ethernet and Token Ring

Metropolitan Area Network (MAN)


Covers a city or town
SONET, FDDI

Wide Area Network (WAN)


ATM, Frame Relay, X.25

Network Terms
Internet
Network of networks providing a communication
infrastructure
The web runs on top of this Internet
infrastructure

Intranet
Employs Internet technology for internal use
HTTP, web browsers, TCP/IP

Network Terms
Extranet
Intranet type of network that allows specific
entities to communicate
Usually business partners and suppliers
B2B networks
Shared DMZ area or VPN over the Internet

Network Configuration
DMZ
Network segment that is between the protected
internal network and the external (non-trusted)
network
Creates a buffer zone
Systems in DMZ will be the 1st to come under
attack and must be properly fortified

Physical Layer
Network Topologies
Physical connection of system and devices
Architectural layout of network
Choice determined by higher level technologies
that will run on it

Types (Bus, Ring, Star, Mesh)

BUS
Nodes are connected to a backbone
through drops
Linear bus one cable with no branches
Tree network with branches
Easy to extend
Single node failure affects ALL participants
Cable is the single point of failure

Ring
Interconnection of nodes in circle
Each node is dependent upon the physical
connection of the upstream node
Data travels unidirectionally
One node failure CAN affect surrounding
nodes
Used more in smaller networks

Star
All computers are connected to central
device
Central device is single point of failure
No node-to-node dependencies

Mesh
Network using many paths between points
Provides transparent rerouting when links
are down
High degree of fault tolerance
Partial Mesh Not every link is redundant
Internet is an example

Full Mesh All nodes have redundancy

Media Access
Dictates how system will access the media
Frames packets with specific headers
Different media access technologies
CSMA
Token Ring
Polling

Protocols within the data link


SLIP, PPP, L2F, L2TP, FDDI, ISDN

Carrier Sense Multiple Access


CSMA/CD (Collision Detection)
Monitors line to know when it is free
When cable not busy, data is sent
Used in Ethernet

CSMA/CA (Collision Avoidance)

Listens to determine is line is busy


Sends out a warning that message is coming
All other nodes go into waiting mode
Used in 802.11 WLANs

Wireless Standards (802.x)

802.11 2.4 GHz range at 1-2 Mbps


802.11b 2.4 GHz up to 11 Mbps
802.11a 5 GHz up to 54 Mbps
802.11g 2.4 GHz up to 54 Mbps
802.11i Security protocol (replace WEP)
802.15 Wireless PANs
802.16 Wireless MANs

Access Points
Connects a wireless network to a wired
network
Devices must authenticate to the AP before
gaining access to the environment
AP works on a specific frequency that the
wireless device must tune itself to

Service Set ID (SSID)


WLANs can be logically separated by using
subnet addresses
Wireless devices and APs use SSID when
authenticating and associating
Should not be considered a security
mechanism

Authenticating to the AP
Station sends probe to all channels looking
for the closest AP
AP will respond with the necessary
information and a request for credentials
If WEP key is required, AP sends a
challenge to the device and device encrypts
with key and send it back
If no WEP key, could request SSID value
and MAC value

Wired Equivalent Protocol (WEP)


Protocol used to encrypt traffic for all IEEE
wireless standards
Riddled with security flaws
Improper implementation of security
mechanisms
No randomness (uses the same password)
No Automated Dynamic Key Refresh
Method (DKRM), requires manual refresh

More WEP Woes


Small initialization vector values
Uses a 24-bit value
Exhaust randomness is as little as 3 hours

Uses stream cipher (RC4)


No data integrity
Use XORs flip a bit in ciphertext the
corresponding bit in plaintext is flipped

Wireless Application Protocol (WAP)


Requires a different protocol stack than
TCP/IP
WAP allows wireless devices to access the
Internet
Provides functions at each of the OSI layers
similar to TCP/IP
Founded in 1997 by cell phone companies

Wireless Transport Layer Security


Security layer of the WAP
Provides privacy, integrity, and
authentication for WAP applications
Data encrypted with WTLS must be
decrypted and reencrypted with SSL or TLS

Common Attacks

Eavesdropping on traffic and spoofing


Erecting a rogue AP
Man-in-the-middle
Unauthorized modification of data
War driving
Cracking WEP
Birthday attacks
Weak key attacks (airsnort, WEPCrack)

War Driving
Necessary Components
Antenna (omnidirectional is best)
Sniffers (TCPDump, Ethereal)
NetStumbler, AirSnort, or WEPCrack

NetStumbler finds APs and Logs

Network name
SSID
MAC
Channel ID
WEP (yes or no)

Wireless Countermeasures

Enable WEP
Change default SSID and dont broadcast
Implement additional authentication
Control the span of the radio waves
Place AP in DMZ
Implement VPN for wireless stations
Configure firewall for known MAC and IP

TCP/IP Suite
TCP connection oriented transport layer
protocol that provides end-to-end reliability
IP connectionless network layer protocol
that provides the routing function
Includes other secondary protocols

Port and Protocol Relations


Well known port numbers are 0-1023
FTP is 20 and 21
SMTP is 25
SNMP is 161
HTTP is 80
Telnet is 23
HTTPS is 443

Source is usually a high dynamic number


while destination is usually under 1024

Address Resolution Protocol (ARP)


Maps the IP address to the MAC address
Data link understands MAC, not IP
Element in man-in-the middle attacks
Intruder spoofs its MAC address against the
destinations IP address into ARP cache

Countermeasures
Static ARP, active monitoring, and IDS to detect
anomalies

ARP Poisoning
Insert bogus IP to MAC addressing mapping
in remote system
Misdirect traffic to attackers computer
Ideal scenario for man-in-the-middle attack

Internet Control Message Protocol


(ICMP)

Status and error messaging protocol


Ping is an example
Used by hackers for host enumeration
Redirects traffic by sending bogus ICMP
messages to a router

Simple Network Management


Protocol (SNMP)
Master and agent model
Agents gather status information about
network devices
Master polls agent and provides an overall
view of network status
Runs on ports 161 and 162

Simple Mail Transfer Protocol


(SMTP)
Transmits mail between different mail
servers
Security issue with mail servers
Improperly configured mail relay
Sendmail functions

Other Protocols
FTP
TFTP
Telnet

Repeater Device

Works at the physical layer


Extends a network
Helps with attenuation
No intelligence built in

Hub Devices
Works at the physical layer
Connects several systems and devices
Also called multipoint
repeater/concentrators
All data is broadcast
No intelligence

Bridge Device
Functions at the data link layer
Extends a LAN by connecting similar or
dissimilar LANs
Filtering capabilities
Uses the MAC address
Forwards broadcast data
Transparent Ethernet
Source Routing Token Ring

Switch Device
Transfers connection from one circuit to
another
Faster than bridges
Originally made decisions based on MAC
Major functionality takes place at Data Link
Layer
Newer switches work at the Network layer
and use IP addresses

Virtual LAN (VLAN)


Logical containers used to group users,
systems, and resources
Does not restrict administration based upon
the physical location of device
Each VLAN has its own security policy
Used in switches
Can be static or dynamic

Router Device

Works at the network layer


Can connect similar or dissimilar networks
Blocks broadcast
Uses routing tables
Bases decisions on IP addresses
Can work as a packet filtering firewall wit the
use of Access Control Lists

Gateway Device
Translates different protocols or software
formats
Mail gateways allows for different mail
applications to communicate
Data gateways allow heterogeneous
clients and servers to communicate
Security gateways firewalls and perimeter
security devices

Bastion Host Device


Gateway between an internal network and
an external network; used for security
Hardened system
Disable unnecessary accounts
Disable unnecessary services
Disable unnecessary subsystems
Remove administrative tools
Up to date with patches and fixes

All systems in DMZ should be Bastion Hosts

Firewall Characteristics

Generation 1 Packet Filtering


Generation 2 Proxy
Generation 3 Stateful
Generation 4 Dynamic Packet Filtering
Generation 5 Kernel Proxies
All provide transparent protection to internal
users

Packet Filtering
Simplest and least expensive
Screens with a set of ACL
Referred to as a Layer 3 device
Access depends on network and transport
layer information
Best in low-risk environments
1st generation firewall

Circuit Level Proxy


Makes access decisions based on network
and transport layer information
Not application or protocol dependent
More protection than a packet filter
SOCKS is the most common used
Hides information about the network they
protect
2nd generation firewall

Application Layer Proxy


Access decision is based on data payload
Must understand the command structure of
payload
Provides a high level of protection
Can filter application specific commands
Logs user activity
Requires manual configuration of each client
computer
2nd generation firewall

Stateful Firewall
Makes access decisions based on IP
addresses, protocol commands, historical
comparisons, and contents of packet
Uses a state engine and state table
Monitor connection-oriented and
connectionless protocols
Expensive and complex to administer
3rd generation firewall

Dynamic Packet Filtering Firewalls


Combination of application proxies and
state inspection firewalls
Dynamically changes filtering rules based
on several different factors
May examine the contents and not just the
header of packets
Decisions based on history and admin rules
4th generation firewall

Firewall Placement
Segments internal network subnets and
sections to enforce the security policy
Acts as a choke point between trusted and
untrusted entities
Creates a DMZ
Could use screened host, dual-homed, or
screened subnet

Screened Host
Usual configuration is a router filtering for a
firewall
Reduces the amount of traffic the firewall
has to work with
Screening device is a filtering router
Screened host is the firewall

Dual Homed
Two or more interfaces
One interface for each network
Allows for one firewall to create more than
one DMZ
Forwarding and routing need to be turned
off or packets would not be inspected by
firewall software
All inbound traffic directed to the Bastion
Host, then proxied, and passed to 2 nd router

Screened Subnet
Buffer zone is created by implementing two
routers or two firewalls and this creating a
single DMZ
Provides the most protection out of the
three architectures because three devices
must be compromised before attacker can
get through to the internal network.

SLIP Dialup Protocol

Serial Line Internet Protocol


Moves IP data over serial lines
Largely replaced by PPP
SLIP does not provide
Header and data compression
Packet sequencing
Authentication features
Classless IP addressing

PPP Dial Up Protocol

Point-to-Point Protocol
Moves digital data over telecommunications lines
Full duplex protocol
Can use synchronous and asynchronous
Authentication through
PAP
CHAP
EAP

Authentication Protocols
Password Authentication Protocol (PAP)
Authenticates remote users
Credentials are sent in plain text

Challenge Handshake Authentication Protocol


(CHAP)

Authenticates remote users


Encrypts usernames and passwords
Client uses users password to encrypt the challenge
Protects against man-in-the-middle attacks

EAP Authentication
Extensible Authentication Protocol
Allows for authentication protocols to be
added to give more flexibility
Supports multiple frameworks
Developed for PPP, but now used in LAN
and wireless authentication

VPN Technologies
Tunneling involves establishing and
maintaining a logical network connection
Packets are encapsulated within IP packets
and encryption is used for security
Voluntary tunneling client manages
connection setup
Compulsory tunneling carrier provider
manages connection setup

PPTP Tunneling Protocol


Encapsulating protocol used more for endto-end VPNs instead of gateway VPNs
Data link layer protocol that provides single
point-to-point connection
Works only with TCP/IP
Works at the Internet layer

L2TP Tunneling Protocol


Works at the data link layer
Can provide VPNs over WAN links using
frame relay, X.25, or ATM
Cannot encrypt data
Uses IPSec for security
Developed by CISCO to combine L2F and
PPTP

IPSec Tunneling Protocol


Provides network layer protection
Used for gateway-to-gateway VPNs
Provides authentication, integrity, and
confidentiality
Only works over IP and is becoming the de
facto standard

Domain Name Services


Works within a hierarchical naming structure
Host name to IP address mapping
DNS server that holds resource records for
a zone is the authority for that zone
Uses forward-lookup tables and reverselookup tables
Uses iterative and non-iterative procedures

Network Address Translation


Invented due to the shortage of IP
addresses
Allows companies to use private addresses
Can use static mapping on 1-1 relationship
Can use dynamic mapping
Port address translation (PAT)
One address is used for all hosts
Older term was hiding NAT

Can be implemented with software (ICS)

Fiber Distributed Data Interface


(FDDI)

Token passing is the media method


Two rings for fault tolerance
Operates up to 100 Mbps
CDDI is possible with shorted distances

Synchronous Optical Network


(SONET)

Physical layer standard used by telephony


Dual ringed and self-healing
Used to connect T1 and T3 channels
Carries nearly any higher level protocol
Supports 52 Mbps
Built in support for maintenance
SONET 3 is coming with 155.5 Mbps

Dedicated Lines
Physical communication lines connecting
two locations
Usually more expensive than other options
Leased from larger service providers
T1 1.544 Mbps
T3 44.736 Mbps

Public Switched Telephone Network


(PSTN)
Also known as POTS
Interconnected systems operated by
different companies
All digital except for the last mile
Analog converted to digital at Central Office

Integrated Services Digital Network


(ISDN)
Moves the last mile from analog to digital
Data rates of 64 Kbps
Circuit-switched instead of packet-switched
Uses bearer channels to move data and a
single separate channel (D) to setup
Used by most companies as backup
BRI 2 64-kbps B channels and 1 D
PRI 23 64-kbps B channels and 1 D

Digital Subscriber Line (DSL)

Digital solution for the last mile


Very high frequency
Must be a POP within 2.5 miles
Farther from a POP, lower the bandwidth
Always On technology
32 Mbps for upstream traffic
32 Kbps for downstream traffic

Cable Modems

Service provided by local cable company


Security issues of neighborhood sniffing
Cable modem converts RF to digital
Could overload cable companies
Most offer speeds up to 2 Mbps but is
shared with neighborhood

X.25
First WAN packet-switching technology
Considered a fat protocol because of error
detection and correction overhead
Has been replaced by frame relay
Virtual circuits are used
Customers share and pay for the same
network

Frame Relay
Fastest WAN packet-switching protocol
Path set up for two locations to
communicate
Path is permanently configured (PVC)
Could be dynamically built (SVC)
Customers are offered a dedicated rate of
flow (CIR)
Inexpensive with rates from 56K to T1

Asynchronous Transfer Mode (ATM)

Provides the highest bandwidth


Uses 53-byte fixed cells
Intelligence is hardware based
Technology used for Internets backbone
Equipment is expensive
Available in Constant Bit Rate (CBR),
Variable Bit Rate (VBR), Available Bit Rate
(ABR) or Unspecified Bit Rate (UBR)

Multiplexing (MUX)
Receives data from different sources and
places on one communication line
Combines two or more channels onto one
transmission medium
Two types
FDM (used by broadband)
TDM (used by T1 and T3)

Voice over IP (VoIP)


Moving voice data in packets
Allows combining of voice and data
Long distance calls can be done cheaply
Uses packet switching instead of
telephones circuit switching
Can experience jittering and latency

Private Branch Exchange (PBX)


Telephone switch that resides on the
customers property
A T1 or T3 connects the switch to the
providers central office
Used for switching calls between internal
lines and the PSTN
New versions are called Centrex where
switching occurs at Central Office

PBX Considerations
Not usually included in security assessment
Compromising and reconfiguring the
telephone switch by hackers
Attackers obtaining free long distance
Disclosure of sensitive information
Phreakers (telephone hackers)

You might also like