Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Types of Electronic Infection
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
SECURITY IN E-COMMERCE Sheetal Chhabra. Introduction Contents Threats Threats to information security Acts of Human Error or failure Espionage/Trespass.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Network Security Celia Li Computer Science and Engineering York University.
Electronic Commerce Semester 1 Term 1 Lecture 14.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Information and Network Security
E-Commerce Security.
NET 311 Information Security
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space in two ways No direct communication between the system to be integrated Parties outside the firewall are not trusted

Firewalls and Tunneling How to get through a firewall and why? –Tunneling Tricking the firewall into believing that traffic, which otherwise should be blocked, is actually allowed  Protocols which would be blocked are hidden under protocols that are accepted by the firewall Why  not having a direct communication channel is compounded by a necessary lack of trust on all traffic generated outside the firewall

SECURITY Earlier security was concerned only with physical protection (e.g locks,guards and barriers). Now in computer era security is done by using password etc.

Why networks need security ? Through Internet we are able to connect any where in the world, and organizations are highly dependent on networks for their daily business communication, information retrieval and data processing. So, WE NEED NETWORK SECURITY.

Aspect of Security Data Integrity Data Integrity Data Availability Data Availability Data Confidentiality Data Confidentiality Privacy Privacy

Data Interity Integrity refers to protection from change: Is the data that arrives at receiver exactly the same as the data that was sent ?

Data Availability Availability refers to protection against disruption of service: Does data remain accessible for legitimate uses ?

Data Confidentiality Confidentiality refers to protection against unauthorized data access: Is data protected against unauthorized access ?

Privacy Privacy refers to the ability of a sender to remain anonymous: Is the sender’s identity revealed ?

Types of Security Threats In general, network security threats can be classified into two categories: 1.Disruption, destruction and disaster 2.Unauthorized access

Encryption And Confidentiality To ensure that the content of a message remains confidential despite wiretapping, must be “Encrypted”.

Method for encryption The encrypt function takes two arguments: A key, k, and a message to be encrypted, M. The function an encrypted version of the message, E. E=encrypt (K, M) E=encrypt (K, M) the decrypt function reverses the mapping to produce the original message: the decrypt function reverses the mapping to produce the original message: M=decrypt (K, E) M=decrypt (K, E)

Digital Signatures To sign a message, the sender encrypts the message using a key known only to the sender.

Internet Firewall Concept This is also a encryption technology, this technology helps protect an organization’s computer and networks from unwanted ‘Internet traffic’.

INTERNET ORGANISATION NET FIREWALL INTERNET FIREWALL:

WHAT IS E-COMMERCE? E-COMMERCE CONSISTS OF TWO WORDS E & COMMERCE E-COMMERCE CONSISTS OF TWO WORDS E & COMMERCE DEFINATION: DEFINATION: “ BUYING, SELLING AND MARKETING OF PRODUCTS OR SERVICES OVER ANY ELECTRONIC DEVICE LIKE COMPUTER”

HOW E-COMMERCE WORKS?

SECURITY

FOR TRANSMITTING ABOVE TYPE OF DATA WE REQUIRE: THE MESSAGE SHOULD BE ACCESSED ONLY BY THE INTENDED RECEIVE THE MESSAGE SHOULD BE ACCESSED ONLY BY THE INTENDED RECEIVE OTHER, WHO CAN INTERCEPT IT ON THE NETWORK, SHOULD NOT BE ABLE SO INTERPRET THE MESSAGE OTHER, WHO CAN INTERCEPT IT ON THE NETWORK, SHOULD NOT BE ABLE SO INTERPRET THE MESSAGE THE MESSAGES SHOULD NOT BE MODIFIED DURING TRANSMISSION, EITHER INTENTIONALLY OR UNINTENTIONALLY. THE MESSAGES SHOULD NOT BE MODIFIED DURING TRANSMISSION, EITHER INTENTIONALLY OR UNINTENTIONALLY.

HOW WE CAN ENCRYPT THE DATA OR INFORMATION PUBLIC KEY ENCRYPTION WITH RECEIVER’S PUBLIC KEY PUBLIC KEY ENCRYPTION WITH RECEIVER’S PUBLIC KEY PUBLIC KEY ENCRYPTION WITH SENDER’S PRIVATE KEY PUBLIC KEY ENCRYPTION WITH SENDER’S PRIVATE KEY CONFIDENTIAL AND AUTHENTIC MESSAGES USING PUBLIC KEY SYSTEM CONFIDENTIAL AND AUTHENTIC MESSAGES USING PUBLIC KEY SYSTEM