Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Firewalls and Intrusion Detection Systems
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Web server security Dr Jim Briggs WEBP security1.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS.
Lab #2 CT1406 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
1 Guide to Network Defense and Countermeasures Chapter 2.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Computer & Network Security
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
1 Network Security 2 nd Lec. BSIT 4C - Finals. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
CONTENTS  INTRODUCTION.  KEYWORDS  WHAT IS FIREWALL ?  WHY WE NEED FIREWALL ?  WHY NOT OTHER SECURITY MECHANISM ?  HOW FIREWALL WORKS ?  WHAT IT.
Security in Computer System 491 CS-G(172) By Manesh T
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Denial of Service (DoS) Attacks: A Nightmare for eCommerce Jearanai Muangsuwan Strayer University.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Network Security Part III: Security Appliances Firewalls.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Network Security 1. Overview What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures Firewalls & Intrusion.
1/23/2016 Network Security By S K Satapathy clicktechsolution.com.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Networks Fall Network Security Networks Fall A Brief History of the World.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
E-Commerce & Bank Security By: Mark Reed COSC 480.
1 Network Security TTC MOBILE Overview What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures.
Network Security 1. Overview What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures Firewalls & Intrusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Lab #2 NET332 By Asma AlOsaimi.
Network Security Networks Fall 2002.
Network Security Justin Weisz Networks Fall 2002.
Network Security Analysis Name : Waleed Al-Rumaih ID :
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Security in Networking
ISMS Information Security Management System
Figure 1-7: Eavesdropping on a Dialog
Prepared By : Binay Tiwari
Justin Weisz Network Security Justin Weisz Networks Fall 2002.
Network Security Networks Fall 2002.
Security.
Justin Weisz Network Security Justin Weisz Networks Fall 2002.
Justin Weisz Network Security Justin Weisz Networks Fall 2002.
Justin Weisz Network Security Justin Weisz Networks Fall 2002.
Operating System Concepts
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1

Overview What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures – Firewalls & Intrusion Detection Systems – Denial of Service Attacks – TCP Attacks 2

DEFINITION Security is concerned with the confidentiality, integrity and availability of data regardless of the form the data. Security means protecting from unauthorized access, use, disclosure, disruption, modification, or destruction.

Why do we need security? Protect vital information while still allowing access to those who need it – Trade secrets, medical records, etc. Provide authentication and access control for resources – Ex: AFS Guarantee availability of resources – Ex: 5 9’s (99.999% reliability) 4

Who is vulnerable? Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK 5

Common security attacks and their countermeasures Finding a way into the network – Firewalls Exploiting software bugs, buffer overflows – Intrusion Detection Systems Denial of Service – Ingress filtering, IDS TCP hijacking – IPSec 6

Firewalls Basic problem – many network applications and protocols have security problems that are fixed over time – Difficult for users to keep up with changes and keep host secure – Solution Administrators limit access to end hosts by using a firewall Firewall is kept up-to-date by administrators 7

Firewalls 8 Intranet DMZ Internet Firewall Web server, server, web proxy, etc

Intrusion Detection Used to monitor for “suspicious activity” on a network – Can protect against known software exploits, like buffer overflows Open Source IDS: Snort, 9

Denial of Service Purpose: Make a network service unusable, usually by overloading the server or network Many different kinds of DoS attacks – SYN flooding – SMURF – Distributed attacks – Mini Case Study: Code-Red 10

Denial of Service 11

Denial of Service 12

TCP Attacks Say hello to Alice, Bob and Mr. Big Ears 13

TCP Attacks Alice and Bob have an established TCP connection 14

TCP Attacks Mr. Big Ears lies on the path between Alice and Bob on the network – He can intercept all of their packets 15

TCP Attacks First, Mr. Big Ears must drop all of Alice’s packets since they must not be delivered to Bob (why?) 16 Packets The Void

TCP Attacks Then, Mr. Big Ears sends his malicious packet with the next ISN (sniffed from the network) 17 ISN, SRC=Alice

TCP Attacks Why are these types of TCP attacks so dangerous? 18 Web server Malicious user Trusting web client

Conclusions The Internet works only because we implicitly trust one another It is very easy to exploit this trust The same holds true for software It is important to stay on top of the latest CERT security advisories to know how to patch any security holes 19

20