Chapter 12: Secure Communications and Network Attacks.

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
WAN Technologies Dial-up modem connections Cheap Slow
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Remote Desktop Connection Techniques Wireless Communication Networks.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
Virtual Private Networking Karlene R. Samuels COSC513.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Virtual Private Networks
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Module 6: Configuring and Troubleshooting Routing and Remote Access
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Wide Area Network Chapter 15 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Describe different methods for connecting.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network (VPN)
Revised January 25, 2000 Diagram Icons. 2 ICON LIBRARY Diagram Icons – CoSine IPSX Unit and CoSine Software Icons CoSine Equipment CoSine IPSX.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Remote Access Lecture 2.
NETW 208 Enthusiastic Studysnaptutorial.com
Virtual Private Network (VPN)
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Networks (VPN)
Presentation transcript:

Chapter 12: Secure Communications and Network Attacks

Network and Protocol Security Mechanisms Secure communications protocols Authentication protocols

Secure Communications Protocols SKIP swIPe S-RPC SSL TLS SET

Authentication Protocols CHAP PAP EAP

Secure Voice Communications Voice over Internet Protocol (VoIP) Social engineering – In person, over the phone, , IM, social networks PBX fraud and abuse – DISA – Phreakers – Black box, red box, blue box, white box (DTMF)

Multimedia Collaboration Remote meeting Instant messaging

Manage Security security goals Understand security issues security solutions

Security Goals SMTP, POP, IMAP Open relay, closed relay, authenticated relay Nonrepudiation Restrict access Integrity Verify delivery Confidentiality

Understand Security Issues Lack of encryption Delivery vehicle for malware Lack of source verification Flooding Attachments

Security Solutions S/MIME MOSS PEM DKIM PGP

Remote Access Security Management Remote access and telecommuting Techniques Plan remote access security Dial-up protocols Centralized remote authentication services

Remote Access and Telecommuting Techniques Service specific Remote control Screen scraper/scraping Remote node operation

Plan Remote Access Security POTS/PTSN, VoIP, VPN Remote connectivity technology Transmission protection Authentication protection Remote user assistance

Dial-Up Protocols PPP SLIP

Centralized Remote Authentication Services RADIUS TACACS+ – TACACS, XTACACS

Virtual Private Network Tunneling How VPNs work Common VPN protocols – PPTP, L2F, LT2P, IPSec Virtual LAN

Virtualization Virtual software – Virtual applications – Virtual desktop Virtual networking – Software-defined network (SDN) – Network virtualization – Virtual SAN

Network Address Translation Private IP addresses (RFC 1918) – (a full Class A range) – – (16 Class B ranges) – – (256 Class C ranges) Stateful NAT Static and dynamic NAT Automatic Private IP Addressing (APIPA) Loopback address

Switching Technologies Circuit switching Packet switching Virtual circuits – PVCs – SVCs

WAN Technologies WAN connection technologies – Dedicated vs. nondedicated – ISDN: BRI vs. PRI – X.25 – Frame relay – ATM – SMDS – SDLC, HDLC, HSSI Dial-up encapsulation protocols

Miscellaneous Security Control Characteristics Transparency Verify integrity Transmission mechanisms

Security Boundaries Areas of different security requirements Classifications Physical vs. logical Should be clearly defined

Prevent or Mitigate Network Attacks DoS and DDoS Eavesdropping Impersonation/masquerading Replay attacks Modification attacks Address Resolution Protocol spoofing DNS poisoning, spoofing, and hijacking Hyperlink spoofing