NUREG/CR-7117 "Secure Network Design"
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Network Security Knowledge Area
Network Security Knowledge Area Prof. Christian Rossow CISPA Helmholtz Center for Information Security Prof. Sanjay Jha University of New South Wales © Crown Copyright, The National Cyber Security Centre 2021. This information is licensed under the Open Government Licence v3.0. To view this licence, visit http://www.nationalarchives.gov.uk/doc/open- government-licence/. When you use this information under the Open Government Licence, you should include the following attribution: CyBOK Network Security Knowledge Area Version 2.0 © Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open- government-licence/. The CyBOK project would like to understand how the CyBOK is being used and its uptake. The project would like organisations using, or intending to use, CyBOK for the purposes of education, training, course development, professional development etc. to contact it at [email protected] to let the project know how they are using CyBOK. Security Goals What does it mean to be secure? • Most common security goals: “CIA triad” – Confidentiality: untrusted parties cannot infer sensitive information – Integrity: untrusted parties cannot alter information – Availability: service is accessible by designated users all the time • Additional security goals – Authenticity: recipient can verify that sender is origin of message – Non-Repudiation: anyone can verify that sender is origin of message – Sender/Recipient Anonymity: communication cannot be traced back to -
Network Access Control: Disruptive Technology? Craig Fisher Regis University
Regis University ePublications at Regis University All Regis University Theses Fall 2007 Network Access Control: Disruptive Technology? Craig Fisher Regis University Follow this and additional works at: https://epublications.regis.edu/theses Part of the Computer Sciences Commons Recommended Citation Fisher, Craig, "Network Access Control: Disruptive Technology?" (2007). All Regis University Theses. 94. https://epublications.regis.edu/theses/94 This Thesis - Open Access is brought to you for free and open access by ePublications at Regis University. It has been accepted for inclusion in All Regis University Theses by an authorized administrator of ePublications at Regis University. For more information, please contact [email protected]. Regis University College for Professional Studies Graduate Programs Final Project/Thesis Disclaimer Use of the materials available in the Regis University Thesis Collection (“Collection”) is limited and restricted to those users who agree to comply with the following terms of use. Regis University reserves the right to deny access to the Collection to any person who violates these terms of use or who seeks to or does alter, avoid or supersede the functional conditions, restrictions and limitations of the Collection. The site may be used only for lawful purposes. The user is solely responsible for knowing and adhering to any and all applicable laws, rules, and regulations relating or pertaining to use of the Collection. All content in this Collection is owned by and subject to the exclusive control of Regis University and the authors of the materials. It is available only for research purposes and may not be used in violation of copyright laws or for unlawful purposes. -
Comparative Study of Network Access Control Technologies Hasham Ud-Din Qazi
Final Thesis Comparative Study of Network Access Control Technologies By Hasham Ud-Din Qazi LITH-IDA-EX--07/028--SE 2007-05-11 Linköpings universitet Department of Computer and Information Science Final Thesis Comparative Study of Network Access Control Technologies By Hasham Ud-Din Qazi LITH-IDA-EX--07/028--SE 2007-05-11 Supervisor: Prof. Dr. Christoph Schuba Examinator: Prof. Dr. Christoph Schuba Datum Avdelning, institution Date Division, department Institutionen för datavetenskap Department of Computer and Information Science 2007-05-11 Linköpings universitet Språk Rapporttyp ISBN Language Report category Svenska/Swedish Licentiatavhandling ISRN LITH-IDA-EX--07/028--SE X Engelska/English X Examensarbete C-uppsats Serietitel och serienummer ISSN D-uppsats Title of series, numbering Övrig rapport URL för elektronisk version http://www.ep.liu.se/ Titel Title Comparative Study of Network Access Control Technologies Författare Author Hasham Ud-Din Qazi Sammanfattning Abstract This thesis presents a comparative study of four Network Access Control (NAC) technologies; Trusted Network Connect by the Trusted Computing group, Juniper Networks, Inc.’s Unified Access Control, Microsoft Corp.’s Network Access Protection and Cisco Systems Inc.’s Network Admission Control. NAC is a vision, which utilizes existing solutions and new technologies to provide assurance that any device connecting to a network policy domain is authenticated and is subject to the network’s policy enforcement. Non-compliant devices are isolated until they have been brought back to a complaint status. We compare the NAC technologies in terms of architectural and functional features they provide. There is a race of NAC solutions in the marketplace, each claiming their own definition and terminology, making it difficult for customers to adopt such a solution, resulting in much uncertainty. -
Network Access Control Through Host and Application Analysis
ABSTRACT OCONNOR, TERRENCE JOHN. Network Access Control through Host and Application Analysis. (Under the direction of William Enck). Despite increasing complexity to networks and applications, the state of practice in network access control has remained largely static for decades. Existing network security solutions provide limited protection against modern and elaborate network compromises where attackers move laterally through the network, because they lack intra-network mediation and distributed information flow control. The omnipresence of Internet-of-Things (IoT) devices with encrypted and propriety protocols obscures network transparency, making it difficult to identify and classify application behaviors. The always- on nature of IoT with perpetual cloud connections complicates policy enforcement because of the heterogeneity of security and privacy designs for offline content caching and device state management. Leveraging host and application behavior analysis provides sufficient context for network access control to address the increasing complexity of networks, opaqueness in applications behaviors, and perpetual cloud connections. In this dissertation, we demonstrate how specialized and sophisticated network access control schemes address the aforementioned challenges by considering host and application context. We implement two security orchestrator application frameworks to address complex attacks, and provide behavior transparency for smart-home IoT devices. First, we present PivotWall which uses a novel combination of information-flow tracking and Software Defined Networking (SDN) to detect a wide range of attacks used by advanced adversaries, including those that abuse both application- and network-layer protocols. It further enables a variety of attack responses including traffic steering, as well as advanced mechanisms for forensic analysis. Through PivotWall, we extend information flow tracking out from a host and through the entire network. -
Network Protocols Handbook.Pdf
Second Edition Network Protocols TCP/IP Ethernet ATM Handbook Frame Relay WAN LAN MAN WLAN SS7/C7 VOIP Security VPN SAN VLAN IEEE IETF ISO Javvin Technologies,ITU-T Inc. ANSI Cisco IBM Apple Microsoft Novell Network Protocols Handbook Network Protocols Handbook 2nd Edition. Copyright © 2004 - 2005 Javvin Technologies Inc. All rights reserved. 13485 Old Oak Road Saratoga CA 95070 USA 408-872-3881 [email protected] All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means electronically or mechanically. Warning and Disclaimer This book is designed to provied information about the current network communication protocols. Best effort has been made to make this book as complete and ac- curate as possible, but no warranty or fitness is implied. The infomation is provided on an “as is” basis. The author, publisher and distributor shall not have liability nor respon- sibility to anyone or group with respect to any loss arising from the information contained in this book and associated materials. I Table of Contents Table of Contents Network Communication Architecture and Protocols••••••••••••••••••••••••••••••1 OSI Network Architecture 7 Layers Model••••••••••••••••••••••••••••••••••••••••2 TCP/IP Four Layers Archiitecture Model••••••••••••••••••••••••••••••••••••••••••5 Other Network Architecture Models: IBM SNA••••••••••••••••••••••••••••••••••7 Network Protocols: Definition and Overview••••••••••••••••••••••••••••••••••••••9 Protocols Guide•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••11