现充|junyu33

Network Security Notes

For self-study during final exams.

Cyberspace Security Overview

Basic Objectives: CIA (Confidentiality, Integrity, Availability)

Four-Layer Model: Electromagnetic devices, electronic information systems, operational data, applications

Fundamental Modules: Information, applications, networks, the Internet

Critical Information Infrastructure Protection (CIIP)

Risk Management

Asset: Anything of value to an organization, the object to be protected

Threat: Activities that may lead to information security incidents and loss of organizational information assets

Vulnerability: Weaknesses or security risks related to information assets

Vulnerabilities themselves do not pose harm to assets

Control Measures: Measures deployed based on security requirements to compensate for vulnerabilities, prevent threats, and reduce risks

Likelihood: The probability that a threat source exploits a vulnerability and causes adverse consequences

Impact: The extent of adverse consequences caused by a threat source exploiting a vulnerability

Risk: Threat source, threat method, vulnerability, adverse consequences

Risk Assessment: Methods and techniques to analyze threats and vulnerabilities, measure the degree of harm after an incident occurs, and implement corrective measures to control risks.

Characteristics: Dynamic, long-term, and continuous; the process of determining risks.

Risk Treatment Methods: Reduce, transfer, avoid, accept

Asset Identification and Assessment: The importance of assets to the smooth operation of key organizational functions; qualitative assessment (CIA + Auditability + Non-repudiation)

Relationship Between Risk Terminology:

Cyberspace Security Assurance and Operations

PDR: Protection, Detection, Response

PPDR: Adds policy in the middle

safe==(Pt>(Dt+Rt))Et=(Dt+Rt)Pt

IATF: Information Assurance Technical Framework (three cores: people, technology, operations)

Three protections and one support: (Local computing environment, regional boundaries, networks and infrastructure) <- Supporting infrastructure

Cyberspace Security Technologies

Five services, eight security mechanisms, and other security mechanisms

Cybersecurity Framework:

Digital Signature: Data appended to a data unit, transformed so that the recipient can confirm the source and integrity, preventing forgery (non-forgeable, non-repudiation, integrity)

RSA-based digital signatures (remember the flowchart)

Integrity Detection: Prevents (or detects) addition, deletion, modification, or substitution

Non-repudiation Mechanism: Prevents senders or receivers from repudiating actions or content

Authentication Technology

Concept: A claimant submits an identity of a subject and claims to be that subject, enabling the verifier to gain trust in the claimed fact.

Requirements:

Methods: What you know, what you have, personal characteristics, two (or multi)-factor authentication

Protection Levels:

Forms of replay attacks:

Replay countermeasures: Sequence numbers, timestamps, challenge-response

Security of challenge-response depends on:

Access Control Technology

Functions: CIA

Access Control List (ACL), Capability List (CL)

Discretionary Access Control (DAC): Allows the creator of an object to determine access rights for subjects

Mandatory Access Control (MAC): Controls access according to mandatory access control policies; the creator of an object has no authority to control access rights

RBAC: Uses roles to determine user access rights in the system (requires both assignment and activation to perform operations)

Relationships between users, roles, and permissions:

Firewall Technology

An advanced access control device placed between different security domains, controlling inbound and outbound network access based on relevant policies

Packet Filtering Firewall:

Five Key Firewall Performance Indicators:

WAF: Web Application Firewall

Intrusion Detection System

Intrusion: Deliberate actions attempting to access information or disrupt system and network operations illegally or without authorization, compromising CIA.

Intrusion Detection: The discovery of intrusion behaviors.

Intrusion Detection System (IDS): A combination of software and hardware that performs intrusion detection functions.

Model: Denning Model

Two Key IDS Metrics: False positive rate, false negative rate

Typical Deployment: Connected to the network in a bypass manner and deployed at critical locations (DMZ, between routers and border firewalls, network hubs, high-security subnets, etc.).

Host Intrusion Detection System:

(Network Connection Monitoring + Host File Monitoring)

Advantages:

Disadvantages:

Network Intrusion Detection System (NIDS):

Advantages:

Disadvantages:

Intrusion Prevention System (IPS)

Intrusion Prevention System (IPS): A security product that integrates intrusion detection and prevention (IPS = IDS + firewall).

GAP (Network Isolation System): A system that enables data exchange between two different security domains through protocol conversion and data ferry methods. Only explicitly permitted transmission information is allowed to pass.

GAP protocols cannot use TCP/IP (as it is bidirectional).

Functional Requirements of Network Access Control (NAC):

Main functions of NAC: Authentication and authorization, scanning and assessment, quarantine and enforcement, updating and remediation.

IPSec + SSL

IP Authentication Header (AH) mechanism: (IP header + AH header + TCP Header + data)

Encapsulating Security Payload (ESP) mechanism: (IP header + ESP header + TCP Header + data + ESP trailer + ESP auth)

Tunnel mode (e.g., AH mechanism): (New IP header + AH header + Raw IP header + TCP header + data)

Methods of establishing a VPN: