MBAnerd Logo

Home

Notes

Research

Quotes

Resume

Portfolio

My Family

Contact Me

 
   
 
Firewalls
 
 
     
     
 

small MBAnerd Logo
Firewalls: A Piece In The Internet Security Puzzle
by David L Schoen

 
     
     
     
     
  Internet security is a growing concern.  This concern has been brought to the forefront by the well-publicized case of Kevin Mitnick, an infamous hacker, and the cases of hacked web sites of CNN.com and Microsoft Corporation.  This paper will look at why Internet security is needed and the need for developing awareness about Internet security.  In addition, this paper will focus on one aspect of Internet security – firewalls.  
     
  Most consumers think about Internet security when they send their social security or credit card number over the Internet.  In reality this may be the time when their information is the best protected.  Recent releases of browsers in the United States feature 128-bit encryption.  This level of encryption along with web sites offering secured transaction sets; create a secured method of sending information over the Internet.     
     
  In an interview, Joan Wilbanks, chief executive officer of SecureWorks commented on encrypted transactions, ‘Everybody brags about being encrypted … but that doesn’t mean anything once it (card (sic) card information) gets into the database.’ (Paul, 2000, pE6).  Wilbanks went on to say, ‘… the most critical component --- the database where all that information is stored --- is what businesses need to focus on.’  Paul A. Henry, managing director of CyberGuard, agreed saying, ‘As the sector matures, people are now going to have to go back and spend money (on security).  Web site merchants also are being forced in that direction by credit card networks.’  
     
  Web sites that do not store credit card information also need to be concerned with Internet security.  Patrick Gray, special agent with FBI’s Computer crimes stated ‘A lot of companies will not report intrusions because people will have a loss of faith in the company… Nationally, the FBI is investigating about 2,000 cyber crimes and Web break-ins, up from 1,200 last year.’ (Paul, 2000, pE6).  An article in Maclean’s reports “More sophisticated attacks are often concealed from the public – or clients—by embarrassed businesses.  But they happen daily.  Computer intrusions reported to CERT” (Computer Emergency Response Team at Carnegie Mellon University) “tripled last year to nearly 10,000.  The San Francisco-based Computer Society Institute found in one recent study that 70 per cent of Fortune 500 companies surveyed experienced at least one security breach during 1999.”  (Wood, Branswell, and Scott, 2000, p38).     
     
  Frank Bernhard, technology economist for University of California at Davis states, ‘The security problem on the Internet is growing faster than anyone could have dreamed a couple of years ago.”  (DeLong, 2001).  His research found “computer hackers cost businesses nearly 6 cents for every dollar of revenue.”  Frank Bernhard went on to say ‘This year could make the Y2K scare look innocent, because it is really happening.  The Internet is not a very secure place." Michael Epstine reported on Morning Edition “A recent Pricewaterhouse study puts the cost of cybercrime and industrial espionage in the United States at about $300 million a year.”  (Edwards, 2001).   
     
  With the more traditional criminal elements moving onto the Web, (Paul, 2000, pE6) what are lawmakers doing?    NewsFactor Network reported “Congress is still bogged down on basic privacy issues and anti-spam legislation – a far cry from the growing problems presented by hackers and the economic and security damage they are causing, which ranges from theft of sensitive information to loss of credibility.” (DeLong 2001).  When looking for governments to play a role in controlling crime, how much involvement is needed? Last November, Tom Heneghan reported, “The world’s first cybercrime treaty is being hastily redrafted after Internet lobby groups assailed it as a threat to human rights that could have ‘a chilling effect on the free flows of information and ideas.’  (Heneghan, 2000).  Ken Athanasiou, director of information security for WingspanBank.com states, ‘I’d like to see more pressure on software organizations to spend time building security into their products and testing for the most common vulnerabilities.  Other than that, I’d rather they stayed clear.  My experience with government organizations is that they are very expensive and accomplish things too slowly to be of much use in the fast-paced Internet arena.’ (Sieglein, 2000, p7).  
     
  Part of any defense system is knowing the aggressor and their method of operation. Defending a web site is no different.  Attacks on web sites are not similar in nature.  They vary as to agenda, damage, and type of attacker.  In an article in InternetWeek, Tim Wilson makes a differentiation between hackers and crackers, “… hackers set forth rules and codes to separate themselves from ‘crackers,’ the criminals who steal, destroy or damage the data they access.  True hackers…only explore the sites they penetrate, never leaving behind anything more than a signature to let others know they were there.”  (Wilson, 2000, p88).  The web site for Network Ice Corporation, a developer of Internet firewalls, profiles four basic types of attackers: the script kiddie, the web vandal, the serious hacker, and the internal intruder.  (Network Ice Corp.)  
     
  Script Kiddies are mostly males under the age of 18 who are not afraid of being prosecuted due to their age.  In addition, the may be accessing web sites from international locations particularly Russia.  Script Kiddies are usually inexperienced hackers looking to create problems by deleting files or adding scripted code that was created by more experienced hackers.  A slightly more experienced hacker is the Web Vandal.  Their agenda is to vandalize web sites.  A well-known example of a Web Vandal attack is in 1998, ABC’s web site was hacked and Nazi propaganda posted.  (Network Ice Corp.).  
     
  The serious hacker does not want their access to the web site discovered.  They discretely move about the site searching for vulnerabilities.  This may be done while posing as a customer or a user of the system.  Each hacker has their own style but generally follows the same pattern: gather information, scan the network, and then break into the network. (Network Ice Corp.).  
     
 
When the serious hacker gathers information, they are looking for social information about the site such as system administrator and employees.  The hacker then notes scripts, applets and any other items they might perceive as vulnerable.  Once the hacker has completed gathering information, the hacker will begin scanning the network by pinging to locate active devices and open ports.  The hacker then focuses on finding specific vulnerabilities such as the version of FTP (File Transfer Protocol) software being used.  Using the information acquired, the hacker attacks the network.  Unlike their counterparts, serious hackers do not want to be discovered.  They want time to download information about your company, its finances, and its clients.  The serous hackers’ agenda may include extortion or industrial espionage. (Network Ice Corp.).
 
     
  The internal intruder may be an employee or contractor working for the company.  Because they were doing legitimate work on the network they are more difficult to detect and stop. (Network Ice Corp.).  Bruce Schneier, chief technology officer for Counterpane Internet Security, said a survey they conducted “found that 71 percent of respondents detected unauthorized access by insiders, such as employees and contractors.”  (Schwartz, 2000, p3)   Kevin Mitnik often used social engineering to gain access to sites, “What I’ve always said, you could have the best firewalls, the best encryption, the best authentication devices, even using biometric authentication devices, all it takes is one person to be duped that has access to information or could weaken the network infrastructure and all that money is wasted.  Security’s as strong as the weakest link in the chain, and usually the human element is the one that’s overlooked the most.”  (Edwards, 2001).   
     
  Anita Rosen, author of The E-Commerce Question And Answer Book, feels there is a low probability your site will be hacked “Since there is a tremendous amount of information on the Internet, there is a low probability that a hacker is targeting you or your company.  Hackers tend to go after big name companies and organizations.  They are usually looking for recognition from other hackers.  Organizations that are high-level targets are the military and financial institutions.”  (Rosen, 2000, p24.).  Gary Shipley at Planet IT disagrees, “Last year, we were performing a routine security assessment for a small organization.  This organization has fewer than 100 servers and does nothing involving credit cards or national security…We found signs of intruders on not just one but many machines … It quickly became obvious that the network had been severely compromised, but the intruders were in for the long haul.”  (Shipley, 2001,p2).   
     
  Gene Spafford points out four reasons individuals and organizations do not properly secure their computer and networks.  The first reason is failing to understand information security.  Criminals will go to any length to find out information.  This may include dumpster diving and social engineering.  Secondly, management has not bought-in to the security program and made it part of corporate policy.  Thirdly, users want additional features added to the system so they load their own software.  Finally, users are only worried about attacks from outside.”  (Sieglein, 2000, p2).    
     
 
How can an individual or organization protect their information and networks against intruders?  Anup K. Ghosh, author of E-commerce Security states “Firewalls are the first line of defense against malicious users, placed between the computer network to be protected and the network that is considered to be a security threat.”  (Ghosh, 1998, p210).  Christopher Westland, author of Global Electronic Commerce points out not all companies understand this staple of Internet security.  “Despite widespread public concern about Internet security, firewalls are implemented in only about half of U.S. firms, and an even lower percentage internationally.  Industry’s relatively low level of firewall implementation reflects the fact that the greatest barrier a firm has to external hackers is the hacker’s limited knowledge of the architecture and operations of the firm’s systems.  (Westland, 1999, p278).  
 
     
  “A firewall is a system or a group of systems that enforces an access control policy between two networks.”  (Curtin and Ranum, 2000, p4).  In a white paper, Steven M. Bellovin states,  ” …they rely on the assumption that everyone on one side of the entry point – the firewall – is to be trusted, and that anyone on the other side is, at least potentially, an enemy.”  (Bellovin, 1999).  Chuck Semeria at 3Com points out “… a firewall system cannot offer any protection once an attacker has gotten through or around the firewall.”  (Semeria,1996,p1).   
 
 
  “ Firewalls offer a convenient point where Internet security can be monitored and alarms generated.”  (Semeria, 1996, p1).  “Firewalls are also important since they can provide a single ‘choke point’ where security and audit can be imposed.” (Curtin and Ranum, 2000, p4).  Dave Jarrell, technical director for the Federal Computer Incident Response Capability (FedCIRC) points out firewalls can be used in several locations within an intranet for added levels of security “…more organizations realize that firewalls can be used internally, to control access to different layers of an enterprise network, where security requirements may vary” (Robinson, 1999).    
     
  The two basic types of firewalls being used today are packet filtering routers and proxy servers. (Palmer and Nash)  The packet filtering router is a network layer firewall.  The decision the router makes is based upon IP packets source, destination and port.  Because a packet filtering router works at a lower level, they “…are faster, but easier to fool into doing the wrong thing.” (Curtin and Ranum, 2000, p10).  Below are examples of firewalls.  Figures 1 and 2 are examples of network work layer firewalls.  Figure 3 is an example of a application layer firewall.”  (Curtin and Ranum, 2000, p10).  A discussion on the operation of these firewalls is beyond the scope of this paper.  “Certain services (e.g., SMTP, HTTP, or NTP) are usually safe to control via packet filters while others (e.g., DNS, FTP) may require the more complex feature available only in proxies.  (Carnegie Mellon Software Engineering Institute, 1999, p1).  The proxy server is an application layer firewall.  “Since the proxy applications are software components running on the firewall, it is a good place to do lots of logging and access control.” (Curtin and Ranum, 2000, p12).     
     
 
 
     
 
 
     
 
 
     
  In his book, Global Electronic Commerce, Christopher Westland states:  
 
Remember that firewalls are not the panacea to providing network host security.  Rather, a combination of application-level security, secure protocols, Internet-safe clients, and secured operating system software can provide the optimal solution.  This requires an active maintenance plan on the part of the system administration that includes monitoring security newsgroups, patching software released vendors, auditing system logs, and perhaps even employing real-time intrusion-detection software.  (Westland, 1999, p218).     
 
  Matt Curtin and Marcus Ranum agree.  They write, “Firewalls can’t protect against attacks that don’t go through the firewall.”  (Curtin and Ranum, 2000, p5).  They go on to state “It’s silly to build a 6-foot thick steel door when you live in a wooden house, but there are a lot of organizations out there buying expensive firewalls and neglecting the numerous other back doors into their network.” (Curtin and Ranum, 2000, p6).     
     
 
An article, Firewalls Becoming Ineffective, Experts Say, which was in the December 22, 2000 edition of Planet IT offers numerous summary points.  The article quotes Mark Bouchard, program director for global network strategies group at Meta Group as saying “Firewalls are certainly part of any good security scenario, but are not a complete solution without the addition of other technologies.”  (Schwartz, 2000).  The article states that Bouchard’s “strategy would start with firewalls as the primary defense mechanism, adding network intrusion detection on more critical junctions in the network and host-based intrusion detection on critical application servers and database servers. (Schwartz, 2000).  Dennis Vogel, product manager for PIX Firewall at Cisco agrees “If your firewall were your only security product, you might end up with something that is crunchy on the outside but soft and chewy in the middle.  You might have a nice perimeter of defense, but once someone were to penetrate that, they have a free reign on the inside of the network.” (Schwartz, 2000).  What about the internal intruder?  Barry Cioe, product manager with Symantec Corp, recommends firewalls be deployed at the external entry point and within the corporate intranet on sensitive servers.  He states, ”That goes a long way toward protecting your sensitive servers as well as restricting the nature and type of access you internal users have, even inside your own network.” (Schwartz, 2000).  Ted Doty, product manager at Internet Security Systems, Inc. states “Firewall technology is now considered a critical part of any agency’s security posture …doing business with out a firewall is no longer an option.  Firewalls are the first line of defense for any security scheme … and they are inexpensive enough that ‘there’s no longer any reason for people not to have one.’”  (Robinson, 1999). 
 
     
     
 
Bibliography
 
  Bellovin, Steven M., Distributed Firewalls login:, 11-1999.  
     
  Curtin, Matt.,  Ranum, Marcus, Internet Firewalls: Frequently Asked Questions, Computer Based Learning Unit, University of Leeds, 2000, p12.   
     
  DeLong, Daniel F., Hackers said to cost U.S. billions, NewsFactor Network, 02-08-2001.  
     
  Edwards, Bob., Profile: Social engineering as an effective tool., Morning Edition (NPR), 02-23-2001.  
     
  Ghosh, Anup K., E-commerce Security, New York, John Wiley, 1998, p210.  
     
  Heneghan, Tom., Protests Force Rewrite Of Cybercrime Pact, Plant IT, 11-13-2000.  
     
  Palmer, Gary., Nash, Alex., FreeBSD Handbook.  
     
  Paul, Peralte C., Staff, Hackers show new criminal twist ALANTA TECH., The Atlanta Constitution, 12-27-2000, ppE6.  
     
  Robinson, Brian., Firewalls: The first line of defense.  FCW on Security, 03-29-1999.  
     
  Rosen, Anita., The E-Commerce Question And Answer Book, New York, AMACOM, 2000, p24.  
     
  Schwartz, Karen D., Firewalls Becoming Ineffective, Experts Say., Planet IT, 12-22-2000, p3.  
     
  Semeria, Chuck., Internet Firewalls and Security 3Com Corporation, 1996, p1.  
     
  Shipley, Greg., Defensive Tools, The High Price of Vulnerability, Planet IT, 02-20-2001, p2.  
     
  Sieglein, William., Defensive Tools, Washington E-Security Conference Paints Gloomy Picture, Planet IT, 12-19-2000, p7.  
     
  Unknown., Design the firewall system, Carnegie Mellon Software Engineering Institute,1999, p1.  
     
   http://www.cert.org/security-improvement/practices/p053.html  
     
  Unknown., Network Ice Corp.  http://advice.networkice.com/products/firewalls.html  
     
  Westland, Christopher J., Global Electronic Commerce, Cambridge, Mass, MIT Press, 1999, p278.  
     
  Wilson, Tim., BACK TALK: Hackers’ Best Days Are Far Behind Them., InternetWeek, 04-17-2000, p88.  
     
  Wood, Chris., Branswell, Brenda., in Montreal and Scott, Robert., in Toronto, Tech: Fighting Net Crime: Canada’s police are only starting to catch up with hackers and other criminals who target online computer users., Maclean’s, 06-12-2000, p38.     
     
     
     
     
     
 

© Copyright 2005 David L Schoen

MBAnerd Logo