Security Methods and Practice CET4884

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
Firewalls and VPN Chapter 6.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Learning Objectives Upon completion of this material, you should be able to:
Chapter 12 Network Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Security Technology. Objectives Understand the role of physical design in the implementation of a comprehensive security program Understand firewall technology.
Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology. BRUCE SCHNEIER,
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
A Brief Taxonomy of Firewalls
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Chapter 5: Firewall Planning and Design
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY COMP 425: Information Security CHAPTER 4 Security Technology: Firewalls and VPNs (chapter 6 in the textbook)
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Chapter 6: Packet Filtering
Chapter 13 – Network Security
Windows 7 Firewall.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 5 Firewall Planning and Design By Whitman, Mattord, & Austin© 2008 Course Technology.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
K. Salah1 Security Protocols in the Internet IPSec.
Technical Devices for Security Management Kathryn Hockman COSC 481.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Security fundamentals
Principles of Information Security, Fifth Edition
Principles of Information Security, Fourth Edition
Principles of Information Security, Fourth Edition
Firewall.
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
Click to edit Master subtitle style
Introduction to Networking
Firewalls.
Firewalls and VPNs Principles of Information Security, 2nd Edition
Security in Networking
Firewalls and VPNs Principles of Information Security, 2nd Edition
Firewalls.
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
* Essential Network Security Book Slides.
Firewalls Routers, Switches, Hubs VPNs
POOJA Programmer, CSE Department
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Lecture 2: Overview of TCP/IP protocol
Firewall.
Firewalls Chapter 8.
Introduction to Network Security
Implementing Firewalls
Topic 12: Virtual Private Networks
Presentation transcript:

Security Methods and Practice CET4884 Security Technology: Firewalls and VPNs Ch6 Part I Principles of Information Security, Fourth Edition

Introduction Technical controls are essential in enforcing policy for many IT functions that do not involve direct human control Technical control solutions improve an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity Principles of Information Security, Fourth Edition

Access Control Access control: method by which systems determine whether and how to admit a user into a trusted area of the organization Mandatory access controls (MACs): use data classification schemes Nondiscretionary controls: strictly-enforced version of MACs that are managed by a central authority Discretionary access controls (DACs): implemented at the discretion or option of the data user Principles of Information Security, Fourth Edition

Identification Identification: mechanism whereby an unverified entity that seeks access to a resource proposes a label by which they are known to the system Supplicant: entity that seeks a resource Identifiers can be composite identifiers, concatenating elements-department codes, random numbers, or special characters to make them unique Some organizations generate random numbers Principles of Information Security, Fourth Edition

Authentication Authentication: the process of validating a supplicant’s purported identity Authentication factors Something a supplicant knows Password: a private word or combination of characters that only the user should know Passphrase: a series of characters, typically longer than a password, from which a virtual password is derived Principles of Information Security, Fourth Edition

Authentication (cont’d.) Authentication factors (cont’d.) Something a supplicant has Smart card: contains a computer chip that can verify and validate information Synchronous tokens Asynchronous tokens Something a supplicant is Relies upon individual characteristics Strong authentication Principles of Information Security, Fourth Edition

Authorization Authorization: the matching of an authenticated entity to a list of information assets and corresponding access levels Authorization can be handled in one of three ways Authorization for each authenticated user Authorization for members of a group Authorization across multiple systems Authorization tickets Principles of Information Security, Fourth Edition

Accountability Accountability (auditability): ensures that all actions on a system—authorized or unauthorized—can be attributed to an authenticated identity Most often accomplished by means of system logs and database journals, and the auditing of these records Systems logs record specific information Logs have many uses Principles of Information Security, Fourth Edition

Firewalls Prevent specific types of information from moving between the outside world (untrusted network) and the inside world (trusted network) May be: Separate computer system Software service running on existing router or server Separate network containing supporting devices Principles of Information Security, Fourth Edition

Firewalls Processing Modes Five processing modes by which firewalls can be categorized: Packet filtering Application gateways Circuit gateways MAC layer firewalls Hybrids Principles of Information Security, Fourth Edition

Firewalls Processing Modes (cont’d.) Packet filtering firewalls examine header information of data packets Most often based on combination of: Internet Protocol (IP) source and destination address Direction (inbound or outbound) Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) source and destination port requests Simple firewall models enforce rules designed to prohibit packets with certain addresses or partial addresses Principles of Information Security, Fourth Edition

Firewalls Processing Modes (cont’d.) Three subsets of packet filtering firewalls: Static filtering: requires that filtering rules governing how the firewall decides which packets are allowed and which are denied are developed and installed Dynamic filtering: allows firewall to react to emergent event and update or create rules to deal with event Stateful inspection: firewalls that keep track of each network connection between internal and external systems using a state table Principles of Information Security, Fourth Edition

Figure 6-2 IP Packet Structure Principles of Information Security, Fourth Edition

Figure 6-3 TCP Packet Structure Figure 6-4 UDP Datagram Structure Principles of Information Security, Fourth Edition

Table 6-1 Sample Firewall Rule and Format Principles of Information Security, Fourth Edition

Firewalls Processing Modes (cont’d.) Application gateways Frequently installed on a dedicated computer; also known as a proxy server Since proxy server is often placed in unsecured area of the network (e.g., DMZ), it is exposed to higher levels of risk from less trusted networks Additional filtering routers can be implemented behind the proxy server, further protecting internal systems Principles of Information Security, Fourth Edition

Firewalls Processing Modes (cont’d.) Circuit gateway firewall Operates at transport layer Like filtering firewalls, do not usually look at data traffic flowing between two networks, but prevent direct connections between one network and another Accomplished by creating tunnels connecting specific processes or systems on each side of the firewall, and allow only authorized traffic in the tunnels Principles of Information Security, Fourth Edition

Firewalls Processing Modes (cont’d.) MAC layer firewalls Designed to operate at the media access control layer of OSI network model Able to consider specific host computer’s identity in its filtering decisions MAC addresses of specific host computers are linked to access control list (ACL) entries that identify specific types of packets that can be sent to each host; all other traffic is blocked Principles of Information Security, Fourth Edition

Figure 6-6 Firewall Types and the OSI Model Principles of Information Security, Fourth Edition

Firewalls Processing Modes (cont’d.) Hybrid firewalls Combine elements of other types of firewalls; i.e., elements of packet filtering and proxy services, or of packet filtering and circuit gateways Alternately, may consist of two separate firewall devices; each a separate firewall system, but connected to work in tandem Principles of Information Security, Fourth Edition

Firewalls Categorized by Generation First generation: static packet filtering firewalls Second generation: application-level firewalls or proxy servers Third generation: stateful inspection firewalls Fourth generation: dynamic packet filtering firewalls; allow only packets with particular source, destination, and port addresses to enter Fifth generation: kernel proxies; specialized form working under kernel of Windows NT Principles of Information Security, Fourth Edition

Table 6-2 State Table Entries Principles of Information Security, Fourth Edition

Firewalls Categorized by Structure Most firewalls are appliances: stand-alone, self-contained systems Commercial-grade firewall system Small office/home office (SOHO) firewall appliances Residential-grade firewall software Principles of Information Security, Fourth Edition

Figure 6-7 SOHO Firewall Devices Principles of Information Security, Fourth Edition

Software vs. Hardware: the SOHO Firewall Debate Which firewall type should the residential user implement? Where would you rather defend against a hacker? With the software option, hacker is inside your computer With the hardware device, even if hacker manages to crash firewall system, computer and information are still safely behind the now disabled connection Principles of Information Security, Fourth Edition

Email, phone, skype, or face to face Questions? Email, phone, skype, or face to face Principals of Information Security, Fourth Edition