Question

How does "encryption in-flight" using IPSec, SSL, or TLS impact the visibility of Network Intrusion Detection/Prevention?...

How does "encryption in-flight" using IPSec, SSL, or TLS impact the visibility of Network Intrusion Detection/Prevention? Why don't firewalls have the same visibility issue? Why don't Host based Intrusion Detection/Prevention Systems have the same visibility issue? Why don't Proxy Servers have the same visibility issue?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1.How does "encryption in-flight” using
IPSecimpact the visibility of Network Intrusion
Detection/Prevention?

IPsec is a security technology that works with IP. It has
two basic modes. In the first mode, it provides
cryptographic authentication of packets. That way you
can truly trust who they came from. That's not
interesting for a VPN.

However, IPsec’s second mode actually provides an
encrypted tunnel. This is a very commonly used
mechanism for implementing a VPN solution

IPsec, also known as the Internet Protocol Security or
IP Security protocol, defines the architecture for
security services for IP network traffic. IPsec describes
the framework for providing security at the IP layer, as
well as the suite of protocols designed to provide that
security, through authentication and encryption of IP
network packets. Also included in [IPsec are protocols
that define the cryptographic algorithms used to
encrypt, decrypt and authenticate packets, as well as
the protocols needed for secure key exchange and key
management.

2.Why don't firewalls have the same visibility issue?
Originally firewalls provided basic network packet
filtering and routing based on hosts, ports and
protocols. They enforced the boundary between a
network and the rest of the world, and patrolled the
boundaries within that network.

These firewalls were effective at limiting the exposure
of services to iust the computers and networks that
needed access to them, reducing the attack surface
available to hackers and malware on the outside.

Of course attackers don’t stand still so attacks evolved
to exploit the services that firewalls left exposed:
attacking vulnerabilities in applications and servers, or
using social engineering to gain a foothold inside a
network through email or compromised websites.
Firewall technology evolved too, moving up the OS!
stack to Layer 7 where it could identify and control
traffic based on the originating user or application, and
where deep inspection technologies could look for
threats inside the content of application traffic.

3.Why don't Host based Intrusion Detection/Prevention
Systems have the same visibility issue?

Host-based intrusion prevention systems (HIPS) are
software solutions that protect against unauthorized
access and malicious attacks. They are installed directly
on endpoint systems (the host) such as desktops,
laptops, and servers and help prevent malware and
hackers from wreaking havoc on an organization’s IT
infrastructure.

A HIPS is part personal firewall, part intrusion
detection system, and part antivirus/malware. By
integrating many different solutions together in a
single package, a HIPS solution provides more
protection than any of these solutions would on its
own.

On the other hand, a host-based intrusion detection
system (HIDS) alone would only alert you to a
malicious event, while a HIPS can actively take
measures to stop an attack. And unlike a standalone
antivirus solution, which simply detects infected files
based on signatures, a HIPS solution can actively take
measures to secure a system in the face of danger,
such as blocking malicious packets, closing ports, or disabling USB access to minimize damage. HIPS
solutions provide an extra layer of protection in a
multi-layer security system and can be used in
conjunction with network-based intrusion prevention
and detection systems.
Network-based intrusion prevention systems (NIPS)
protect against malicious attacks by analyzing and
filtering suspicious network traffic if necessary. They
are often appliance-based solutions (although open-
source software solutions also exist) that sit inline near
the edge of a network.


4.Why don't Proxy Servers have the same visibility issue?
When proxy servers go down, the calls seem to come
all at once. “Is there a problem with the proxy server?"
"| can't get to my Web site.” "I keep getting this
message saying the computer can't find the server.”
Admittedly, many browsers and proxy servers don't
explain to users what went wrong with their request.
However, you can categorize nearly every proxy server
problem into one of four categories:

The browser or client is misconfigured.

The URL or Web site is down.

Connectivity or network problems exist.

An actual proxy server problem exists.
When | troubleshoot a proxy server call, | always try to
set up my process of elimination according to these
four bullets.
Local Client and Browser Configuration
A misconfigured browser is a common error that proxy
server administrators face. In many environments,
users can modify their browser settings without
restriction, which often leads to users changing
important proxy server settings.
To ensure appropriate proxy server configuration for
every user's browser, you can use system policies to prevent users from altering settings. Windows NT 4.0
first introduced system policies, which mainly covered
desktop and environment settings. Policies that affect
Microsoft Internet Explorer (IE) first appeared in IE 3.0,
but Microsoft later greatly enhanced these policies in
the Internet Explorer Administration Kit.

Add a comment
Know the answer?
Add Answer to:
How does "encryption in-flight" using IPSec, SSL, or TLS impact the visibility of Network Intrusion Detection/Prevention?...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • How do intrusion detection systems differ from intrusion prevention systems? Give an example from either a...

    How do intrusion detection systems differ from intrusion prevention systems? Give an example from either a network or a host point of view

  • Network Security The need for intrusion detection systems (IDS) and intrusion prevention systems (IPS) and how...

    Network Security The need for intrusion detection systems (IDS) and intrusion prevention systems (IPS) and how they can effectively be used in a network operations setting?

  • 1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80...

    1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...

  • The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of...

    The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of several banks that are a part of the SWIFT network. The case is an example of the importance of information system controls. Explain some of the security risks associated with information systems as well as some security and control measures that can be implemented to protect against these security risks. Hackers Attack the SWIFT Global Banking Network SWIFT, which stands for Society for Worldwide...

  • 1. Data management, device management and network management of IoT is crucial to data integrity and...

    1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....

  • Read the Janes' Electronics, Inc. case at the end of the exam and answer the following...

    Read the Janes' Electronics, Inc. case at the end of the exam and answer the following questions. Assume that you are preparing to bid on the audit and are working on your client acceptance issues. Develop a checklist of five areas or issues that you would want to research before you accepted this firm as an audit client. For each area or issue, explain why you would want to research it and give an example of where you might go...

  • What happened on United flight 3411?What service expectations do customers have of airlines such ...

    What happened on United flight 3411?What service expectations do customers have of airlines such as United and How did these expectations develop over time? Thank You! In early April 2017, United Airlines (United), one of the largest airlines in the world, found itself yet again in the middle of a service disaster this time for forcibly dragging a passenger off an overbooked flight. The incident was to become a wake-up call for United, forcing it to ask itself what to...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Question: What does Hobbes suggest is the reason we have government at all? How does Locke’s...

    Question: What does Hobbes suggest is the reason we have government at all? How does Locke’s view of the need for government differ? Using these sources: From Thomas Hobbes, Leviathan book 1, chapter 13 So that in the nature of man, we find three principal causes of quarrel. First, competition; secondly, diffidence; thirdly, glory. The first maketh men invade for gain; the second, for safety; and the third, for reputation. The first use violence, to make themselves masters of other...

  • Using the book, write another paragraph or two: write 170 words: Q: Compare the assumptions of...

    Using the book, write another paragraph or two: write 170 words: Q: Compare the assumptions of physician-centered and collaborative communication. How is the caregiver’s role different in each model? How is the patient’s role different? Answer: Physical-centered communication involves the specialists taking control of the conversation. They decide on the topics of discussion and when to end the process. The patient responds to the issues raised by the caregiver and acts accordingly. On the other hand, Collaborative communication involves a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT