introduction - wikispaces · web viewone private ip address range is 172.16.0.0 to...

38
Instructor’s Manual Chapter 6: Firewalls Answer Key Introduction 1. a) What is a pass/deny decision? When the firewall receives a packet, it must decide whether to pass the packet or drop it. b) What type of packet does a firewall drop and log? Firewalls will drop and log a provable attack packet. c) What does the firewall do about packets that it suspects (but cannot prove) are attack packets? It will pass the packet because it’s not a provable attack packet. d) Why does the firewall log information about dropped packets? To keep a record of it for later analysis e) Distinguish between border firewalls and internal firewalls. Copyright © 2015 Pearson Education, Inc.

Upload: dinhdan

Post on 25-Mar-2018

226 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Instructor’s Manual

Chapter 6:

Firewalls

Answer Key

Introduction1. a) What is a pass/deny decision?

When the firewall receives a packet, it must decide whether to pass the packet or drop it.

b) What type of packet does a firewall drop and log? Firewalls will drop and log a provable attack packet.

c) What does the firewall do about packets that it suspects (but cannot prove) are attack packets?

It will pass the packet because it’s not a provable attack packet.d) Why does the firewall log information about dropped packets?

To keep a record of it for later analysise) Distinguish between border firewalls and internal firewalls.

Border firewalls sit at the boundary between the corporate website and the external Internet. Internal firewalls filter traffic passing between different parts of the website’s internal network.

f) Distinguish between ingress and egress filtering. In ingress filtering, the firewall examines packets entering the network from the outside, typically from the Internet. The purpose of ingress filtering is to stop attack packets from entering the firm’s internal network.

Copyright © 2015 Pearson Education, Inc.

Page 2: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

In egress filtering, by contrast, the firewall filters packets when they are leaving the network. This prevents replies to probe packets from leaving the network.

The Danger of Traffic Overload2. a) What does a firewall do if it cannot keep up with the traffic volume?

It will drop all the packets it cannot process.b) Why is this action good?

This action is good because the firewall will drop all packets not examined, not allowing unexamined attack packets into the network.

c) Why is this action bad? This action is bad because valid, non-attack packets will be dropped and effectively create a self-generated DoS attack.

d) Why can a firewall keep up with traffic in general but fail to do so during a major attack?

Firewalls are only able to filter traffic at wire speed, which is the maximum speed of the lines that connect to it.

e) As processing power increases in the future, what will this mean for firewall filtering? It means that firewalls will be able to do ever more sophisticated processing.

f) What is unified threat management (UTM)? Unified threat management (UTM) consists of a firewall handling all traditional firewall functions (e.g., SPI, ACLs, etc.) as well as additional security functions such as antivirus filtering, spam filtering, application proxy filtering, etc.

g) What does it mean that a firewall should operate at wire speed? Firewalls that operate at wire speed are able to filter traffic at the maximum speed of the network lines connected to it.

Firewall Filtering Mechanisms3. a) Is there only one firewall filtering mechanism?

No.b) What filtering mechanisms do almost all main border firewalls use?

Stateful packet inspectionc) Do SPI firewalls only do stateful packet inspection?

SPI firewalls can do more than just stateful packet inspection.

Static Packet Filtering4. a) What are the two limitations of static packet filtering? Explain why each limitation is

bad.

6–2Copyright © 2015 Pearson Education, Inc.

Page 3: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

(1) By looking at only one packet at a time, static packet inspection does not stop attacks that can only be determined by knowing the packet’s place in a stream of traffic; in other words, no context is applied to the packet. For example, static packet inspection cannot protect against a TCP half-open DoS attack because it only examines individual packets, versus determining the state of a connection and a related (or unrelated) packet.(2) By only inspecting certain fields of the Internet and Transport headers, static packet inspection cannot stop attacks that utilize other portions of the packet. For example, attacks utilizing the data field of application messages will not be examined.

b) For what two reasons do companies not use static packet filtering as the main filtering mechanism in border firewalls today?

For the two reasons mentioned in the previous question partc) In what two secondary ways do corporations sometimes use static packet filtering?

One way is that static packet filtering may be used as a secondary filtering mechanism on main border firewalls.The other way is they may also be implemented in border routers, which lie between the Internet and the firewall.

Stateful Packet Inspection (SPI)

Basic Operation5. a) What is a state?

A state is a distinct phase in a connection between two applications.b) Are most packets part of the connection-opening state or the ongoing communication state?

Most packets are part of the ongoing communication state.c) Why is the answer to Question 5b important for stateful packet inspection’s efficiency?

SPI efficiency is based upon the two categories of states – because most packets belong to ongoing communication, a different (and less expensive) set of filters can be used compared to connection opening states, which require more scrutiny, and thus are more expensive.

d) What is a connection? A connection is a persistent conversation between different programs on different computers.

e) How is a connection between two programs on different computers represented? A connection between two programs on different computers is represented by its socket (i.e., IP address: port).

6–3Copyright © 2015 Pearson Education, Inc.

Page 4: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

Packets that Do Not Attempt to Open Connections6. a) Give the simple stateful packet inspection firewall rule for packets that do not attempt

to open connections. When a packet arrives that does not attempt to open a connection, SPI firewall checks to see if it is part of a previously opened connection. If it is, then the packet is passed, usually without filtering. If it is not, the packet is dropped and logged.

b) Is SPI filtering for packets that are part of ongoing communications usually simple and inexpensive? Explain.

Yes, simply because if the packet is part of an existing connection in the connection table, the packet is passed, usually without further filtering. If it is not part of an existing connection in the connection table, it is dropped and logged.

c) UDP is connectionless. How is it possible for an SPI firewall to handle UDP connections? .

SPI firewalls can treat UDP communications as if they were stateful by treating some certain UDP messages as connection opening attempts. If subsequent messages match the connection table for the UDP packet, the incoming UDP packet will be passed.

Packets that Do Attempt to Open a Connection7. Give the two simple default SPI firewall rules for packets that attempt to open

connections. Permit all attempts to open a connection from an internal host to an external host.Deny all attempts from external hosts to open a connection with an internal host.

Access Control Lists (ACLs) for Connection-Opening Attempts8. a) For stateful packet inspection firewalls, what do ingress ACLs permit in general?

Ingress ACLs typically permit a specific type of externally originated connection to network resources.

b) What do egress ACLs disallow in general in SPI firewalls? SPI firewall egress ACLs disallow communication between internal and external hosts in specific ways. For example, an egress ACL can prevent ICMP Echo Reply messages from internal hosts from exiting the network.

c) What do well-known port numbers designate? Well-known port numbers designate specific applications running on a server.

d) Is Error: Reference source not found an ACL for ingress filtering or egress filtering? Ingress filtering

e) Why is Rule 2 in Error: Reference source not found safer than Rule 1?

6–4Copyright © 2015 Pearson Education, Inc.

Page 5: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

Rule 2 is safer than Rule 1 because Rule 2 allows a connection to only a specific SMTP mail server, while Rule 1 allows connections to all internal webservers. More limited access is safer than broader access.

f) Which rule in the ACL in Error: Reference source not found represents the default behavior of SPI firewalls for ingress connection-opening attempts?

Rule 3, denying all connections, represents the default SPI rule for ingress connection opening attempts.

9. Given the ACL in Error: Reference source not found, what would the firewall do with an incoming ICMP echo message? (This will require some thought. Think about how ICMP messages are encapsulated and what field in the IP header indicates that the packet’s data field contains an ICMP message.)

An incoming ICMP Echo message is a layer 3, connectionless message. The firewall using the ACL in Figure 6-10 would disallow the ICMP message because it does not meet Rule 1 or 2, so it would apply Rule 3 (deny).

10. Redo the ACL in Error: Reference source not found to add rules for the following conditions. After Rule 1, create a rule that permits all connections to internal DNS servers. After the original Rule 2, create rules that permit connections to all Trivial File Transfer Protocol (TFTP) servers and that permit access to FTP Server 60.33.17.1. (Hint: Only allow an FTP supervisory connection; the SPI firewall will later open data connections automatically as needed.)

If TCP destination port = 80 or 443, then allowIf TCP destination port = 53, then allowIf TCP destination port = 25 AND destination IP = 60.47.3.35, then allowIf TCP destination port = 21 AND destination IP = 60.33.17.1, then allowDisallow all connections

11. a) In ingress and egress filtering, does an SPI firewall always consider its ACL rules when a new packet arrives that attempts to open a connection?

SPI firewalls always execute the ACL.b) In ingress and egress filtering, does an SPI firewall always consider its ACL rules when a new packet arrives that does not attempt to open a connection? (The answer was not specifically in this section.)

No.12. a) Why are stateful packet inspection firewalls inexpensive?

Stateful packet inspection firewalls are inexpensive because most packets are not connection opening requests. Determining whether to drop or pass a packet requires a simple connection table lookup, which is fast and cheap.

b) In practice, are they fairly safe? Yes, in practice, they are fairly safe.

c) Are SPI firewalls limited to SPI filtering? No, they can implement other protections as well.

d) What firewall inspection mechanism do nearly all main border firewalls today use?

6–5Copyright © 2015 Pearson Education, Inc.

Page 6: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

Nearly all main border firewalls today use stateful packet inspection.

Network Address Translation (NAT)

Sniffers

NAT Operation

Perspective on NAT13. a) When NAT is used, why can sniffers not learn anything about the internal IP addresses

of internal hosts? When using NAT firewalls, the IP addresses and port addresses of hosts are translated. Attackers can only see the translated IP addresses and port numbers.

b) Why does NAT stop scanning probes? Scanning probes are based on IP addresses and port numbers. Sniffers can only read translated IP addresses and port numbers, and these become invalid when connections end. If an attacker acts quickly, it can use translated information, but it is very difficult to act quickly.

c) Why is NAT traversal necessary? So applications that require true internal IP addresses and port numbers can still work when companies use NAT.

d) Is a NAT traversal method easy to select? No, selecting them can be complex because there are many NAT traversal methods and all have limitations.

Application Proxy Firewalls and Application Content Filtering

Application Proxy Firewall Operation14. a) What distinguishes an application proxy firewall from static packet filtering firewalls

and SPI firewalls? Application proxy firewalls examine application messages while static packet filtering does not, nor do SPI firewalls.

b) Distinguish between proxy programs and application proxy firewalls.

6–6Copyright © 2015 Pearson Education, Inc.

Page 7: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

An application firewall has an application proxy program for each application it will filter.

c) If you will proxy four different applications, how many proxy programs will you need? You will need four separate proxy programs.

d) How many application proxy firewalls will you need at a minimum? One application proxy firewall can support multiple proxy application programs, so you will need at least one application proxy firewall to support the four proxy programs.

e) Can nearly all applications be proxied? Only a few applications can be proxied. Most application proxies are HTTP or SMTP.

f) Why is application proxy firewall operation processing-intensive? Application proxy firewall operation is processing-intensive because it must maintain two connections for each client/server pair.

g) Why do firms not use application proxy firewalls as main border firewalls? They are not used as border firewalls because of the high processing load required to maintain the number of connections required by an application proxy firewall. They simply would not be able to handle the traffic load.

h) What are the two main roles of application proxy server firewalls today? Protect internal clients from malicious external servers by forcing all client connections through the proxy, which examines the application content of all packets.Sit between an internal server and external clients to protect the server by examining the application layer content of all incoming client requests for dangerous behavior.

Application Content Filtering in Stateful Packet Inspection Firewalls15. a) Do stateful packet inspection firewalls automatically do application content filtering?

Explain. No, application content filtering is seen as an extra feature because stateful packet inspection firewalls don’t have to implement relay operation like application firewalls do.

b) Do they have the slow speed of relay operation? No, they do not do relay operation, so they do not suffer the slow speed of relay operation.

c) What three advantages do application proxy firewalls have in protection that SPI firewalls with content inspection not have?

Application proxy firewalls always examine application layer content, are more capable of application layer content filtering, and use relay operation with two connections per client/server pair.

6–7Copyright © 2015 Pearson Education, Inc.

Page 8: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

d) Why are SPI content filtering firewalls faster than application proxy firewalls?They do not use relay operation.

Application Proxy Firewall Protections16. a) What filtering actions were listed to protect clients from malicious webservers?

First, the proxy can inspect the URL and compare it with a table of blacklisted URLs that are known phishing sites, pornography sites, or recreational sites.Second, the proxy can inspect scripts in downloaded webpages, dropping these webpages if the scripts appear to be malicious or if policies prohibit either certain types of scripts or all scripts.Finally, the proxy can inspect the MIME type in an HTTP response message. Files with certain MIME types might be allowed or dropped by policy.

b) What filtering action was mentioned to prevent internal client misbehavior in HTTP? The filtering action that prevents internal client misbehavior in HTTP is for the HTTP proxy to examine outgoing packets from the internal client to the external webserver in order to detect client misbehavior. For example, the proxy can inspect the method in the URL header. While the HTTP GET method is generally safe, the POST method can send files out of the firm. Many firms drop any HTTP request message that uses the POST method in order to provide extrusion prevention.

c) What two filtering actions were mentioned for protecting webservers from malicious clients?

First, the proxy can inspect the method in the URL header. The POST method will allow clients to upload files to the webserver. This might be disallowed by policy to prevent clients from uploading malware, pornography, or any other type of unapproved content.Second, the HTTP proxy can filter out HTTP request messages that appear to contain SQL injection attacks.

d) What three automatic protections do application proxy firewalls provide simply because of the way in which they operate?

The three automatic protections of application proxy firewalls are internal IP address hiding, header destruction, and protocol fidelity.

Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs)

Intrusion Detection Systems (IDSs)17. a) Distinguish between firewalls and IDSs.

6–8Copyright © 2015 Pearson Education, Inc.

Page 9: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

Firewalls only stop and log provable attack packets. IDSs identify suspicious packets that may or may not be part of an attack and alert network administrators of potential threats, but do not drop suspicious packets.

b) Why are IDS alarms often a problem? IDS alarms are often a problem because they tend to generate far too many false alarms or false positives. IDSs tend to be ignored after exhausted security staff members receive too many false alarms.

c) What is a false positive? A false positive is when an IDS issues an alarm for legitimate traffic. Another term is false alarm.

d) What two types of filtering do IDSs use? The two types of filtering IDSs use are Deep Packet Inspection and Packet Stream Analysis.

e) Why is deep packet inspection important? This is important because it looks at all fields in the packet, including the IP header, the TCP or UDP header, and the application message. Many attacks cannot be stopped if a firewall only looks at application content or only at internet and transport layer headers.

f) Why is deep packet inspection processing-intensive? Deep packet inspection is processing-intensive because it looks at every field in the packet, which takes more time and processing power.

g) Why is packet stream analysis important? Packet stream analysis is important because single packets are not enough to determine certain types of attacks. For example, it takes multiple packets to determine if a network is being systematically scanned, or if a TCP half-open DOS attack is occurring.

h) Why does packet stream analysis place a heavy load on IDSs? Packet stream analysis requires the IDS to reassemble or maintain and compare many packets in order to determine if an attack is taking place; the increased packet total and reassembly places a heavy processing load on IDS.

Intrusion Prevention Systems (IPSs)18. a) Distinguish between IDSs and IPSs.

Intrusion prevention systems (IPSs) actually stop attacks rather than detecting them and sending out alarms like IDSs do.

b) Why is the attack identification confidence spectrum important in deciding whether to allow IPSs to stop specific attacks?

Because IDSs offer many false positives and alarms, the attack identification confidence spectrum allows the network security administrator to establish packet dropping policies that are based on a high degree of confidence that an attack is taking place.

6–9Copyright © 2015 Pearson Education, Inc.

Page 10: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

IPS Actions19. a) What two actions can IPSs take when they identify an attack?

The two actions taken by IPSs when identifying an attack are to simply drop the packet like a traditional firewall, and to limit suspicious traffic to a certain percentage of the total bandwidth.

b) Which can be the most effective? Dropping packets

c) Which can do the most damage? Dropping packets is the most damaging because it can lead to lost packets that are important to a firm’s operations (such as orders, payment processing, etc).

Antivirus Filtering and Unified Threat Management (UTM)20. a) How do firewalls and antivirus servers work together?

The packet will arrive at the firewall, and the firewall will decide what to do with it. To decide, the firewall will check its policy rules base. If the policy rules base says to pass a certain object to an antivirus server, the firewall will do so. Then the antivirus server will examine the object.

b) Are antivirus servers limited to looking for viruses? Explain. Antivirus servers can do more than just look for viruses. They can scan for worms, rootkits, phishing, Trojan horses, spam, malicious scripts, and other types of malware.

c) What may the antivirus server do after it performs filtering? After an antivirus server filters, it can drop the object, send it to the firewall to pass to the destination, or pass the object to the destination directly.

d) What type of firewall does both traditional firewall filtering and antivirus filtering use? Unified Threat Management (UTM) firewalls provide both traditional and antivirus filtering. However, UTMs rarely offer best of breed services and should be considered for small offices only.

Firewall Architectures

Types of Firewalls21. a) Why are screening routers used in a firewall architecture?

6–10Copyright © 2015 Pearson Education, Inc.

Page 11: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

The screening border router stops simple high-volume attacks and ensures that responses to external scanning probes cannot reach an external attacker. It economically reduces the load on the main border firewall.

b) Why are internal firewalls desirable? These are desirable because they control traffic flowing between different parts of the firm’s internal network. In contrast to border firewalls, they can stop internally generated attacks.

c) Why is it easier to create appropriate ACL rules for server host firewalls than for border firewalls?

Most servers only have a single application or a few applications. It is easier to develop specific rules for a few applications than to develop rules for all internal hosts.

d) How does the use of border, internal, and host firewalls provide defense in depth? Their use provides defense in depth because if the main border firewall or an internal firewall has an ACL configuration error, individual hosts will still be protected.

The Demilitarized Zone (DMZ)22. a) What is a multihomed router?

It is a router that connects to three or more subnets. A tri-homed firewall has one connection to the internal network, one to the DMZ, and one to the border router (leading to the Internet).

b) What is a DMZ? The DMZ (Demilitarized Zone) is a subnet that contains all of the servers and application proxy firewalls that must be accessible to the outside world.

c) Why do companies use DMZs? All externally initiated attempts must go to hosts in the DMZ. This permits companies to focus special attention on these hosts, which are under frequent external attack. It also keeps attackers from attacking internal hosts.

d) What three types of hosts are placed in the DMZ? Public servers, application proxy firewalls, and external DNS servers

e) Why do companies put public servers in the DMZ? Placing all hosts that must be available to the outside world in a single place, where protection can be concentrated, ensures that no externally initiated connections go to internal hosts.

f) Why do companies put application proxy firewalls in the DMZ? Because they enforce a policy that all communication with the outside world must pass through the DMZ.

g) What host names does the external DNS server know?

6–11Copyright © 2015 Pearson Education, Inc.

Page 12: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

The external DNS server will only know the host name information for computers in the DMZ.

h) Why do all hosts in the DMZ have to be hardened stringently? DMZ hosts must be hardened stringently because they will be accessible to the outside world and will be frequently attacked.

Firewall Management

Defining Firewall Polices23. a) Distinguish between firewall policies and ACL rules.

Firewall policies are high-level statements that reflect corporate security policies and guide firewall implementers. ACL rules are the implementations of the firewall policies at the firewall, and are very specific.

b) Why is creating firewall policies desirable compared to just creating a list of ACL rules?

Creating firewall policies is more desirable than just creating a list of ACL rules because policies should be clearly understood in plain English, while allowing for the firewall administrator to implement ACL rules that fit the policies with maximum efficiency and lowest cost. It is always smart to state the requirement first, followed by the technical implementation; this prevents locking a network into antiquated equipment or techniques.

c) Create three firewall policies not listed in the text. Allow the database server at Company A (that supplies critical parts to the company) to connect to the corporate database for inventories.Only allow secure FTP connections.Log all large (1MB>) file transfers.Stop all inbound and outbound ICMP messages.Drop inbound connections to TCP port 445 from hosts 192.168.4.0 through 192.168.20.255.

Implementation24. a) Compare firewall hardening needs for firewall appliances, vendor-provided systems,

and firewalls built on general-purpose computers. For firewall appliances, a firm simply installs the appliance between its Internet access router and its internal network. Operation is largely automatic. Firewall appliances are hardened at the factory.Firewall vendors often sell firewall computers that have pre-hardened versions of UNIX or Windows. These limit the ability of an organization to make mistakes in hardening the operating system.

6–12Copyright © 2015 Pearson Education, Inc.

Page 13: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

Strong actions must be taken to harden the firewalls on general-purpose computers if the firm purchases the computers and installs the firewall software itself.

b) List what centralized firewall management systems do. Centralized firewall management systems use a firewall policy management server to centrally control many firewalls to ensure consistency and save time and money in firewall administration. It converts policies to ACLs and sends these ACLs to individual servers.

c) What columns does the firewall policy database described in the text contain? Be able to describe each and what options it offers.

Policy number (self explanatory): Each policy has a unique number.Source and destination: Can be host names, groups of IP addresses, subnets, etc. The firewall administrator must manually define groups.Service: Describes the service to be filtered (TCP http, UDP dns, ICMP, etc.).Action: Describes what to do (usually pass, drop, or authenticate).Track: Describes what the firewall should do after the action (log, nothing, alert, etc.).Firewalls: Designated which firewall routers should be sent ACLs based upon the policy

d) Why is vulnerability testing necessary? ACLs are complex, based upon complex firewall policies that are not easy to translate to ACLs. Vulnerability testing is required to ensure errors in ACL creation are detected and fixed.

e) Why should firewall policies govern both configuration and testing? If firewall policies govern both, then testers can create tests based on policies. If tests fail, then either the configuration or the test violated the policy. The firm must decide which is wrong.

f) What are the steps in firewall change management? First, only certain people are allowed to request changes. Even fewer people should be allowed to approve changes. The requestor must be different from the approver.Second, firewall changes should be implemented in the most restrictive manner that will pass the smallest number of additional packets.Third, the change should be documented carefully and completely.Fourth, the firewall should be vulnerability tested after each change, to make sure the change works and that all of the previous behavior is intact.Fifth, the company should audit the change process frequently, to ensure compliance with procedures.

g) Why is reading firewall logs important? To develop an understanding of the changing threat environment. It will also help to determine what traffic is unusual.

6–13Copyright © 2015 Pearson Education, Inc.

Page 14: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

h) What is the most time-consuming part of firewall management? The most time-consuming part of firewall management is reading firewall logs.

Reading Firewall Logs25. a) What packets are usually logged in log files?

Dropped packets from firewalls are usually logged in log files.b) What are the fields in the log file shown in Error: Reference source not found?

ID number for the packet dropping event.Time: The time the packet arrived at the firewall.Rule: The rule that caused the packet to be dropped.Source and destination IP addresses found in the dropped packet.Service: The service requested in the dropped packet.

c) In the examples given, by what field was the log file sorted? In Figure 6-25, the log file is sorted by ID number.The log file is sorted by the time field at which the packet arrived at the firewall.

d) From the log file, what could we infer about the Echo probe attack? The log file shows that a majority of the Echo probes are coming from the same IP (14.17.3.139), targeting successive client IP addresses. It appears the attacker is trying to map the internal network based on receiving Echo Request reply messages.

e) Did this attack seem to be serious? Explain. The attack does not seem to be serious. This appears to be an attacker trying to map a network for IP addresses and host OS. The more serious attacks could be coming after the mapping.

f) From the log file, what could we infer about the FTP attack? It appears that the primary target of the FTP attack is the .56 server. The source IP addresses are never the same, but it does include the 14.17.3.139 host that is trying to map the network. It is possible that the attacker is trying to access the FTP server using several zombie machines.

g) Did this attack seem to be serious? Explain. This attack is more serious than the Echo mapping attack because it is targeting a specific host with multiple different computers. The attacker knows there is a server at that IP address and is trying to gain access via multiple captured hosts.

h) Why was the dropping of a single packet because of lack of firewall capacity a cause for concern?

Dropping any packets in such a short capture because of lack of capacity indicates that there is insufficient firewall capacity that must be addressed immediately.

i) What cannot be determined if log files cover too short a period of time?

6–14Copyright © 2015 Pearson Education, Inc.

Page 15: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

If the log files cover too short a period of time, you lose the ability to examine attacks that take place over a considerable period of time.

j) Why is it difficult for a log file to cover a long period of time? It is difficult for a log file to cover a long period of time because long log files require a great deal of disk capacity.

k) What is the advantage of logging all packets passing through a firewall? A firm can see packets from an attacker that were not dropped by the firewall because it could not identify them as provable attack packets.

l) Why is logging all packets problematic? Logging all packets makes for very large log files, which means the period of logging is shorter for the same amount of log storage capacity than if only provable attack packets are logged.

Difficult Problems for Firewall Filtering

The Death of the Perimeter26. a) How can attackers avoid the border firewall?

Attackers can avoid the border firewall by becoming an internal attacker, attacking internal hosts not protected by the border firewall, or entering or attacking though a wireless access point.

b) How has the perimeter extended outside the site? It has extended outside the site by remote employees giving access.Consultants, outsources, customers, suppliers, and other subsidiaries must be given access.Essentially, all of these tend to use VPNs to make external parties “internal” to your site.

c) How can firms react to this decline in the effectiveness of border firewall filtering? Firms will have to increasingly rely upon hardening internal hosts against attacks as the effectiveness of the border firewall declines.

Attack Signatures versus Anomaly Detection27. a) Distinguish between signature detection and anomaly detection.

Signature detection relies upon a unique pattern in the network traffic to identify the threat (like an attack fingerprint). Anomaly detection looks at traffic patterns for deviations from set norms in order to identify possible attacks.

b) What is a zero-day attack? A zero-day attack is one that is made before attack signatures for the threat are defined for firewalls and antivirus programs to use.

6–15Copyright © 2015 Pearson Education, Inc.

Page 16: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

c) Why are zero-day attacks impossible to stop with attack signatures? Zero-day attacks do not yet have attack signatures, therefore firewalls and antivirus programs will not be able to detect the attack.

d) What is the promise of anomaly detection? The promise of anomaly detection is that they could stop attacks without known attack signatures, such as zero-day attacks.

e) Why is anomaly detection becoming critical for firewalls? Given the speed with which vulnerability exploits, worms, and viruses are beginning to spread, depending solely on attack signatures is not reliable, so anomaly detection is essential in firewalls today.

Conclusion

Synopsis

Thought Questions1. Modify the ACL in Error: Reference source not found to permit externally initiated

connections to an SNMP network management server, 60.47.3.103, and to allow both regular and SSL/TLS connections to the internal webserver 60.47.3.137 but not to other webservers.

1. If TCP destination port = 80 or TCP destination port = 443, then Allow Connection

2. If TCP destination port = 80 or 443 AND destination IP = 60.47.3.137, then Allow ConnectionThis actually is not needed because Rule 1 allows all connections.

3. If UDP destination port = 161 AND destination IP = 60.47.3.103, then Allow Connection

4. TCP destination port = 25 AND destination IP = 60.47.3.35, then Allow Connection

5. Disallow ALL connections2. The ACL in Error: Reference source not found is in effect. A packet containing a TCP

SYN segment reaches a stateful packet inspection firewall from the outside. What actions will the SPI firewall take?

This is a connection-opening attempt, so the firewall goes through the ACL.It will then go through each rule in order.If the firewall gets to the last rule, it will disallow the connection.

6–16Copyright © 2015 Pearson Education, Inc.

Page 17: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

3. The ACL in Error: Reference source not found is in effect. A packet containing a TCP ACK segment reaches a stateful packet inspection firewall from the outside. What actions will the SPI firewall take? Explain.

A TCP ACK is not a connection-opening request, so the SPI firewall will check the connection table to see if the TCP ACK matches an already open connection. If the connection is valid, the segment is passed. If the connection is not in the connection table, the segment is dropped and logged.

4. Create an egress ACL for an SPI firewall if policy only forbids connections to external FTP servers.

1. If TCP destination port = 21 or 22, then disallow2. Allow all connections

5. Contrast what sniffers can learn if a company being attacked uses NAT or an application proxy server.

When a company uses NAT, a sniffer will only be able to see the translated IP address and port number of an internal host.With an application proxy server, the IP address of every packet going out is that of the application proxy server, so attackers can only learn the IP address of the application proxy server.

6. Most IP addresses are public, in the sense that they can appear on the public Internet. However, a few IP addresses have been designated as private IP addresses. One private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Error: Reference source not found, internal hosts have private IP addresses except for those in the DMZ, which use public IP addresses. Explain this discrepancy if you can.

Private IP addresses in general are hidden from the Internet. This makes the use of private IP addresses ideal for internal hosts.However, hosts within the DMZ must be accessible from the Internet. Therefore, they must use IP addresses in the firm’s public IP address range.

7. a) Describe Policy 5 in the firewall policy database shown in Error: Reference source not found4.

Drop all ICMP messages coming from internal hosts and going outside of the network. This keeps ICMP Echo Request messages from leaving the network and helps protect against network mapping by attackers. This policy applies to the border firewall.

b) Repeat for Policy 6.Authenticate all internal SMTP requests to the Mail Server. Log all failed attempts. This policy is implemented at the Central firewall.

c) Repeat for Policy 7.Authenticate all TCP HTTP requests from Marketing hosts to the Plans server. Alert the firewall management system if the authentication fails. This policy is implemented on the Marketing firewall.

6–17Copyright © 2015 Pearson Education, Inc.

Page 18: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

d) Repeat for Policy 8.Drop and log all TCP HTTP requests from any source. This policy applies to the Marketing firewall.Note that Policy 7 already allows in hosts in the Marketing group. So Policy 8 applies to all other hosts.

e) Repeat for Policy 9.Drop and log any service request not covered in any of the preceding firewall policies.

8. Sort the log file in Error: Reference source not found by source IP address. What do you conclude from the analysis? This is not a trivial question.

The following can be concluded from the log file by sorting by IP address:IP address 14.17.3.139 was involved in six Echo Probe and two FTP attacks. This is most likely an attacker or a zombie being controlled by an attacker.IP address 128.171.17.3 was involved in three Forbidden Webserver requests. This is either an automated attack or possibly a misconfigured host trying to connect with an incorrect destination.IP addresses 14.8.23.96, 128.171.17.34, and 1.32.6.18 all conducted FTP attacks on the same server that the bad guy (14.x.x.139) attacked. The initial attacker may not be attacking through bots.Two different IP addresses attacked the 60.32.29.102 host. This could be a bad sign and you need to look at what connections are or have been made to the 60.32.29.102 host to determine if an attack was successful or is ongoing. This seems to be a sophisticated attack using bots.IP address 1.124.82.6 attempted to ping the 60.x.x.68 host. Not enough information to tell if this is good or bad.

9. A firm has the following firewall policy: Employee access to Internet servers should be unrestricted and external clients should only be able to access the firm’s public webserver, http://www.pukanui.com. The firm also has a finance server that should only be accessible to people in the finance department. The server and the finance departments are all on the internal subnet 10.5.4.3. The firm has a single large site. How would you implement this policy? Create both a firewall architecture and ACLs for the border firewall for both internal and external connection-opening attempts.

6–18Copyright © 2015 Pearson Education, Inc.

Page 19: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

Description of architecture to meet policy requirements:o The public webserver (pukanui.com) would be placed in the DMZ

to allow external access while protecting other internal assets.o The Finance Clients and Server will be placed on the 10.5.4.3

subnet. The internal firewall will only allow connections to the Finance server from hosts on its own subnet. All other connections will be disallowed including other company clients, and definitely all external connections.

o All clients (including Finance) will be NATed behind the main border firewall to hide internal LAN structure from external exploitation via sniffers.

Border Router Ingress ACLo If TCP destination port = 80 or 443, and IP = (IP for pukanui.com),

then allow connectiono Disallow all connections

Border Router Egress ACLo If IP = (IP for finance server), then disallowo Allow all connections

10. A stateful packet inspection border firewall contains a rule that permits external connections to an internal public webserver, http://www.pukanui.com. However, the firewall does not permit access to this server. Come up with at least two hypotheses for the cause of the problem. Describe how you would test each hypothesis.

ACLs implement IP addresses via host names. It is possible that the incorrect IP address is included in the ACL rule for http://www.pukanui.com. To test, do a

6–19Copyright © 2015 Pearson Education, Inc.

Page 20: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

DNS lookup on http://www.pukanui.com and compare with the related ACL entry.It is possible that the ACL has an error and has the wrong port numbers (80 for standard http, and 443 for SSL/TLS) in the rule for webservers. Examine the ACL entry to determine the ports identified in the rule.It is possible that a prior rule in the ACL disallows the connection.

Hands-on Projects

NOTE: Screenshots for individual students will vary.

PROJECT 1

One of the most well-known packet sniffers is called Wireshark® (formerly Ethereal®). It is a powerful tool that can capture, filter, and analyze network traffic. It can promiscuously capture traffic on both wired and wireless networks. It is used by security and networking professionals to troubleshoot networking problems.

In this project, you will install Wireshark, capture packets, and look at the contents of a packet. When placed correctly, a network administrator can use Wireshark to see all the traffic coming into and out of a network. Network administrators can, among other things, see which hostnames are being requested and who is requesting them. Surfing the Web is not anonymous.1. Download Wireshark from http://www.wireshark.org/download.html.2. Click Download Windows Installer. (Download the latest stable release.)3. Click Save.4. Save the file in your download folder.5. If the program doesn’t automatically open, browse to your download folder.6. Double-click Wireshark-setup-1.8.5.exe. (The software version numbers will be slightly

different as newer versions are released.)7. Click Next, I Agree, Next, Next, Next, and Install.8. Click Next to install WinPCap.9. Click Next, I Agree, Install, and Finish. 10. Click Next, and Finish.11. Double-click the Wireshark icon on your desktop. (You can also access it through your Start

menu.)12. Click Interface List. (This will display a list of all available network interfaces on your

computer. You will want to want to note the description and IP address of the interface with the most traffic. You will need to select this interface in the following steps.)

13. Note the interface with the most traffic. (You will select this interface in the following steps.) If there are duplicate names for the Network Interface Card (NIC), you can use the last 3 or 4 values of the MAC address to identify the appropriate NIC.

14. Close the Capture Interfaces window.15. Click Capture, and Options.

6–20Copyright © 2015 Pearson Education, Inc.

Page 21: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

16. Select your Network Interface Card (NIC) if it is not already selected.17. Take a screenshot. 18. Close ALL other programs you currently have open except your word processing program

(MS Word, LibreOffice Writer®, etc.).19. Click Start.20. Let it run for 10 seconds.21. While you are waiting open a Web browser and go to www.google.com.22. Return to your Wireshark window.23. In the file menu click Capture and Stop (or use the keyboard shortcut—Ctrl+E).24. Scroll up until you see a green and blue area. (These are the packets you captured when you

requested Google’s main page.)25. Take a screenshot.26. Scroll down until you see a line that has GET / HTTP/1.1. (You may have to try more than

one until you get to the packet that shows “www.google.com” in the bottom pane.)27. Select that row.28. In the bottom pane, you will see a bunch of numbers to the left. (It’s the packets contents in

hexadecimal.) Just to the right you will see the content of the packet in a column.29. Select the text: www.google.com.30. Take a screenshot.

PROJECT 2

In this project, you will create two simple firewall rules in Windows Advanced Firewall. This may be the first time you have made a modification to the firewall on your computer. The first rule will block all ICMP traffic. This will effectively prevent you from using the ping command to send ICMP packets to other computers. You will use a command prompt to verify the rule was effective.

The second rule will block all outgoing Port 80 traffic. Port 80 is traditionally associated with Web traffic (HTTP). Once you create and enable the rule all outgoing Port 80 traffic will be blocked. You will use a Web browser to verify the rule was effective. However, secure Web traffic (HTTPS) running over Port 443 will still be accessible.

Both of the rules in this project will apply to outgoing traffic only. It is important to remember to disable the rules at the end of the project so your ICMP and Port 80 traffic will not be blocked.1. Click Start.2. In the search box, type cmd3. Press Enter.4. Type ping www.google.com 5. Press Enter. (This will ping www.Google.com.)6. Type time 7. Press Enter twice.

6–21Copyright © 2015 Pearson Education, Inc.

Page 22: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

8. Take a screenshot.9. Click Start, Control Panel, System and Security, and Windows Firewall.10. Click Advanced settings.11. Click Outbound Rules.12. Click New Rule (right-hand pane).13. Click Custom, Next, and Next.14. Change the dropdown box to ICMPv4.15. Click Next, Next, Next, and Next.16. Name the rule YourName_Block_ICMP. (Replace YourName with your first and last names. In this case, it was RandyBoyle_Block_ICMP.)17. Click Finish. 18. Return to your command prompt.19. Type ping www.google.com 20. Press Enter. (This will ping www.google.com. You should get a “General failure” error.)21. Type time 22. Press Enter twice. 23. Take a screenshot.24. Open a Web browser.25. Browse to www.Google.com. (This will verify that you do have Internet access.)26. Return to the Windows Advanced Firewall window.27. Click Outbound Rules.28. Click New Rule (right-hand pane).29. Click Port, and Next.30. Type “80” into the text box for Specific remote ports. (This will effectively block all outgoing Web traffic from your computer. You will disable/delete this rule later.)31. Click Next, Next, and Next.32. Name the rule YourName_Block_Port_80. (Replace YourName with your first and last names. In this case, the rule was named RandyBoyle_Block_Port_80.)33. Click Finish.34. Return to your Web browser.35. Browse to any non-secure (not HTTPS) website of your choosing. You can browse to any website as long as it does not make an HTTPS connection (Port 443). The rule you made only blocks Port 80 Web traffic.36. Take a screenshot of the blocked website. (In this case, it was www.Microsoft.com.)37. Return to the Windows Advanced Firewall window.38. Select both of the rules you created.39. Right-click the selected rules.40. Click Disable Rule. (If you don’t disable the rules, your ICMP and Web traffic will still be blocked.)41. Take a screenshot of your disabled rules.

Project Thought Questions1. Why does your computer send so many packets? Why not send just one big packet?

6–22Copyright © 2015 Pearson Education, Inc.

Page 23: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

It sends many smaller packets for a variety of reasons. Some of the packets are sent/received as part of the TCP/IP connection. Other packets are HTML content, pictures, or fragments of larger files. Some networks fragment packets that would produce even more packets.

2. What do SYN, ACK, FIN, and GET mean?These are all packets used in the TCP/IP connection.SYN: synchronizeACK: acknowledgementFIN: finish, or endGET: get, or page request

3. Why do some packets have sequence numbers?Packets need sequence numbers because each packet can be routed separately. Sequence numbers allow your computer to reassemble packets in the correct order.

4. Why does your computer send packets to the webserver that you requested data from?Many of these packets are ACK packets that acknowledge the receipt of data from the Web server.

5. What do the different colors in the Wireshark packet capture listing mean?Different color codes help the end user quickly identify specific types of packets. Color coding helps reduce the time it takes to sift through packets.

6. Why would your computer get packets that are addressed to another machine?Your NIC can pick up all packets sent to it if it is in promiscuous mode.

7. How many packets does your computer send/receive in a single mouse click when you visit a website?

You can get 1000 or more packets with a single mouse click, depending on the website. There is a lot of variability in the number of packets sent/received.

8. Could you organize or filter the traffic to make it easier to understand?Yes, filters make understanding the types and quantities of traffic going over your network much easier.

9. How could blocking all ICMP traffic protect you?Blocking ICMP traffic could protect you because it could keep attackers from probing and mapping your internal network using ping scans.

10. Could you still access some websites with your Port 80 rule enabled? Why?Yes, you may have still been able to reach a website with Port 80 blocked because it may have connected on another port (e.g., Port 443).

11. Why would you want to allow incoming (not outgoing) Port 443, but block incoming Port 80?

Allowing incoming Port 443 would allow secure connections, but block unsecure connections (Port 80). This would ensure that all Web traffic was secured.

12. Could malware rename itself in order to get through a firewall? Why would this work?

6–23Copyright © 2015 Pearson Education, Inc.

Page 24: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

**This is a great question to spur student involvement**Yes, malware can rename itself. However, this does not mean it will necessarily make it though the firewall. It depends on the type of firewall, and the specific functionality of that firewall.For example, if a firewall is set up to block Port 20 (FTP), a user (or malware) could always tunnel the FTP session through a different port. Also, suppose an application-layer firewall is configured to block all Microsoft databases. A malware writer, or the malware itself, could change the database file extension to get through the firewall.Finally, the firewall could have antivirus filtering capabilities (UTM), or work with another AV appliance. In this case, it's unlikely that the malware could make it through since the AV appliance would be looking for a specific signature.

Case Discussion Questions1. Why is cyber espionage so attractive?

Cyber espionage is attractive because it can be a low cost alternative. Cyber espionage can reduce expensive research and development investments. It can also bring competing products to market much quicker than having to develop them from scratch. The penalties for getting caught might even be less if the cyber espionage is performed from another country. Some countries are not willing to extradite their citizens, especially if they benefit the nation state.

2. Why is cyber espionage difficult to prevent?Cyber espionage is difficult to prevent because many countries and corporations have not invested in the technical infrastructure necessary to centrally prevent cyber-attacks before they enter their countries. Nations are devoting resources to attacking other nations’ corporations, but doing little to proactively protect their own. There are other technical reasons that cyber espionage is difficult to prevent. These include, but are not limited to, using distributed bot nets, masking their source IP addresses, collaborating with corporate insiders, new forms of target-specific malware, etc.

3. Why would nation states sponsor cyber espionage?From a strategic point of view, cyber espionage can be viewed as an effective means of gaining a technological, economic, or military advantage over another nation state. Cyber espionage can be an effective low cost means of increasing a nation’s military capabilities (e.g., via shortcutting new weapons development projects) or technological/economic development (e.g., via shortcutting new product development).

4. Why is state-sponsored espionage more concerning than traditional corporate espionage?State-sponsored espionage is more concerning than traditional corporate espionage because of the amount of resources states can devote to these criminal enterprises. State-sponsored espionage is more likely to be condoned and encouraged by a nation’s legal system. It’s unlikely a person engaging in state-sponsored espionage would be prosecuted for his or her crimes.

6–24Copyright © 2015 Pearson Education, Inc.

Page 25: Introduction - Wikispaces · Web viewOne private IP address range is 172.16.0.0 to 172.31.255.255. Private IP addresses can only appear within a firm. In Figure 6-20, internal hosts

Chapter 6: FirewallsCorporate Computer Security, 4th EditionRandall J. Boyle and Raymond R. Panko

5. How could a nation protect its own corporations from cyber espionage by foreign governments?

Nations can protect their own corporations from cyber espionage from foreign governments by more actively monitoring, identifying, and stopping attacks from entering their countries. Nations need to invest more resources in the defense of the information assets held by their corporations (i.e., intellectual property, consumer data, new product development efforts, etc.).

6. Why are the industries mentioned in the NCIX report targets of foreign espionage?The industries mentioned in the NCIX report are specifically targeted by foreign entities because of their military and economic impact. Information technology, military technologies, aerospace, marine, UAVs, energy, and pharmaceuticals are all top targets.

7. How could outsourcing IT security functions reduce costs?Corporations may be able to delegate part of their IT security function to external security firms in the same way they would outsource their payroll function. Operating and maintaining a secure, compliant, and available IT infrastructure are not necessarily core competencies, and can represent significant opportunity costs for organizations of any size.

8. How might outsourcing IT Security functions improve security?Outsourcing IT security functions may likely improve security because the managed service provider will likely have a more skilled and knowledgeable staff than a typical corporation. For example, few people make their own clothes, cars, computers, or food. Instead, they outsource these functions to people and companies that specialize in those areas. The same is true for companies that outsource their IT security function.

9. If you were in an industry listed as a primary target for cyber espionage, what additional steps would you take to improve the security of your company?

Industries listed as primary targets of cyber espionage by foreign entities would do well to make sure all mission-critical data are cryptographically secured. They would also be well served by having much stronger security policies and procedures than other corporations. They should also consider having a MSSP provide them with a robust intrusion detection system, email filtering, border management, active malware scanning, data loss prevention systems, and annual security audits.

Perspective Questions1. What material was most surprising for you in this chapter?

Student answers will vary.2. What material was most difficult for you in this chapter?

Student answers will vary.

6–25Copyright © 2015 Pearson Education, Inc.