25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Problem/exposure Remedy<br />

How to ensure that the message <strong>and</strong> signature<br />

originated from the desired partner?<br />

How to ensure that h<strong>and</strong>shakes are exchanged<br />

with the right partners (man-in-the-middle attack)?<br />

How to prevent improper use of services by<br />

otherwise properly authenticated users?<br />

In general, keep your network tight toward the outside, but also keep a watchful<br />

eye on the inside because most attacks are mounted from inside a corporate<br />

network.<br />

22.1.3 Implementations of security solutions<br />

The following protocols <strong>and</strong> systems are commonly used to provide various<br />

degrees of security services in a computer network. They are discussed at length<br />

throughout the rest of this chapter.<br />

► <strong>IP</strong> filtering<br />

► Network Address Translation (NAT)<br />

► <strong>IP</strong> Security Architecture (<strong>IP</strong>Sec)<br />

► SOCKS<br />

► Secure Shell (SSH)<br />

► Secure Sockets Layer (SSL)<br />

► Application proxies<br />

► Firewalls<br />

► Kerberos <strong>and</strong> other authentication systems (AAA servers)<br />

► Secure Electronic Transactions (SET)<br />

774 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong><br />

Use two-way h<strong>and</strong>shakes involving encrypted<br />

r<strong>and</strong>om numbers (mutual authentication).<br />

Use digital certificates (binding of public keys to<br />

permanent identities).<br />

Use a multilayer access control model.<br />

How to protect against viruses? Restrict access to outside resources; run anti-virus<br />

software on every server <strong>and</strong> workstation that has<br />

contact to outside data, <strong>and</strong> update that software<br />

frequently.<br />

How to protect against unwanted or malicious<br />

messages (denial of service attacks)?<br />

Restrict access to internal network using filters,<br />

firewalls, proxies, packet authentication, conceal<br />

internal address <strong>and</strong> name structure, <strong>and</strong> so on.<br />

How to minimize the number of attack points? Close all unnecessary services. Use encryption<br />

<strong>and</strong> encapsulation to run many services over a<br />

smaller number of ports.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!