Technical Devices for Security Management Kathryn Hockman COSC 481.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Advertisements

Lecture 6 User Authentication (cont)
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
CSE 4482: Computer Security Management: Assessment and Forensics
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewalls and Intrusion Detection Systems
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology. BRUCE SCHNEIER,
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Security-Authentication
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Management of Information Security, 4th Edition
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
FIREWALL Mạng máy tính nâng cao-V1.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
The Security Aspect of Social Engineering Justin Steele.
Today’s Lecture Covers < Chapter 6 - IS Security
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Protection Mechanisms
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Oluwatosin Oguntola Firewalls.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics Authentication Technology
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Firewalls and proxies Unit objectives
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
7.4 Firewalls Network Security / G.Steffen1. In This Section What is a Firewall? Types of Firewall Comparison of Firewalls Types What Firewall Can-and.
Biometric Technologies
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
An Introduction to Biometrics
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Security Methods and Practice CET4884
Access control techniques
Challenge/Response Authentication
Computer Data Security & Privacy
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Security in Networking
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Firewalls Purpose of a Firewall Characteristic of a firewall
Chapter 8 Network Perimeter Security
Introduction to Network Security
COEN 351 Authentication.
Protection Mechanisms in Security Management
Presentation transcript:

Technical Devices for Security Management Kathryn Hockman COSC 481

Outline Introduction Introduction Types of Devices Types of Devices Smart CardsSmart Cards Cryptographic tokensCryptographic tokens FirewallsFirewalls Biometric DevicesBiometric Devices Summery Summery

Introduction What kinds of technical devices are there for Security Management? What kinds of technical devices are there for Security Management? Smart CardsSmart Cards Cryptographic tokensCryptographic tokens Synchronous tokens Synchronous tokens Asynchronous tokens Asynchronous tokens FirewallsFirewalls Biometric DevicesBiometric Devices

Smart Cards A Smart Card is a card with embedded integrated circuits which can process information A Smart Card is a card with embedded integrated circuits which can process information A Smart Card can receive input which is processed and then gives output A Smart Card can receive input which is processed and then gives output In comparison to a “Dumb Card”, a Smart Card is secured so that only people with the enabling code (PIN) or using an authorized reader for the card can access the data stored on it. In comparison to a “Dumb Card”, a Smart Card is secured so that only people with the enabling code (PIN) or using an authorized reader for the card can access the data stored on it.

Cryptographic Tokens A Cryptographic Token is a device that is used to authenticate a user on a computer system. A Cryptographic Token is a device that is used to authenticate a user on a computer system. Two types: Two types: Synchronous tokensSynchronous tokens Asynchronous tokensAsynchronous tokens

Synchronous tokens Synchronous Token is a Cryptographic Token that is time-based and generates a value that is used in authentication Synchronous Token is a Cryptographic Token that is time-based and generates a value that is used in authentication The token’s value is valid for a set period of time before it changes, and is based on a secret key held by both the token and the server The token’s value is valid for a set period of time before it changes, and is based on a secret key held by both the token and the server Known Problem: Known Problem: Mistiming issuesMistiming issues

Asynchronous Token An Asynchronous Token is a device that uses a challenge-response mechanism to determine whether the user is valid. An Asynchronous Token is a device that uses a challenge-response mechanism to determine whether the user is valid. The server gives users a number, the user puts number into token to get response number for authentication The server gives users a number, the user puts number into token to get response number for authentication

Firewalls A Firewall is any device that prevents a specific type of information from the outside world to the inside world A Firewall is any device that prevents a specific type of information from the outside world to the inside world Types of Firewalls: Types of Firewalls: Packet filtering firewallsPacket filtering firewalls Application-level firewallsApplication-level firewalls Stateful inspection firewallsStateful inspection firewalls Dynamic packet filtering firewallsDynamic packet filtering firewalls

Application-level Firewalls An Application-level Firewall consists of dedicated computers kept separate from the first filtering router, used in conjunction with a separate or internal filtering router. An Application-level Firewall consists of dedicated computers kept separate from the first filtering router, used in conjunction with a separate or internal filtering router. It is also known as a proxy serverIt is also known as a proxy server

Stateful Inspection Firewalls Stateful Inspection Firewalls keeps track of each network connection established between internal and external system using a "state table“ Stateful Inspection Firewalls keeps track of each network connection established between internal and external system using a "state table“ Known Problem: Known Problem: Because of addition processing requirements of Stateful Inspection Firewalls, it makes DoS (Denial of Service) attacks easierBecause of addition processing requirements of Stateful Inspection Firewalls, it makes DoS (Denial of Service) attacks easier

Dynamic Packet Filtering Firewalls Dynamic Packet Filtering Firewalls allow only a particular packet with a specific source, destination, and port address to pass through the firewall Dynamic Packet Filtering Firewalls allow only a particular packet with a specific source, destination, and port address to pass through the firewall

Other Devices that involve Hybrid Firewall Systems Screened-host firewall system Screened-host firewall system Dual-homed host firewalls Dual-homed host firewalls Screened-subnet firewalls (with DMZ) Screened-subnet firewalls (with DMZ)

Screened-host Firewall System Screened-host Firewall System is a mix of a packet filtering router with a dedicated firewall like a proxy server Screened-host Firewall System is a mix of a packet filtering router with a dedicated firewall like a proxy server Can Include: Can Include: bastion hostbastion host A bastion host is a computer on a network that provides a single entrance and exit point to the Internet from the internal network and vice versa A bastion host is a computer on a network that provides a single entrance and exit point to the Internet from the internal network and vice versa sacrificial hostsacrificial host A computer server placed outside an organization's Internet Firewall to provide a service that might otherwise compromise the local net's security A computer server placed outside an organization's Internet Firewall to provide a service that might otherwise compromise the local net's security

Dual-homed Host Firewalls A Dual-homed Host Firewall uses two or more network interfaces. One connection is an internal network and the second connection is to the Internet. A Dual-homed Host Firewall uses two or more network interfaces. One connection is an internal network and the second connection is to the Internet. It works as a simple firewall provided there is no direct IP traffic between the Internet and the internal network. It works as a simple firewall provided there is no direct IP traffic between the Internet and the internal network.

Screened-subnet Firewalls (with DMZ) Screened-subnet Firewalls is made up of one or more screened internal bastion hosts behind a packet filtering firewall Screened-subnet Firewalls is made up of one or more screened internal bastion hosts behind a packet filtering firewall

Biometric Devices Certain Security Devices can use Biometrics to aide in Authentication Certain Security Devices can use Biometrics to aide in Authentication Biometrics are comprised of: Biometrics are comprised of: Something you areSomething you are Something you ProduceSomething you Produce

Biometrics Something you are: fingerprints fingerprints palm scan palm scan hand geometry hand geometry hand topography hand topography ID cards (face representation) ID cards (face representation) facial recognition facial recognition retina scan retina scan iris scan iris scan

Biometrics Something you produce: Something you produce: signature recognition signature recognition voice recognition voice recognition keystroke pattern recognition keystroke pattern recognition

Biometrics Problems with Biometrics: Problems with Biometrics: False Accept RateFalse Accept Rate Accepting Someone who should not have been Accepting Someone who should not have been False Reject RateFalse Reject Rate Rejecting someone who should not have been Rejecting someone who should not have been Crossover Rate Crossover Rate Place where the number of False Accepts and False Rejects is equalPlace where the number of False Accepts and False Rejects is equal

Summery Introduction Introduction Types of Devices Types of Devices Smart CardsSmart Cards Cryptographic tokensCryptographic tokens FirewallsFirewalls Hybrid Firewall SystemsHybrid Firewall Systems Biometric DevicesBiometric Devices