Introduction to Network Security

Slides:



Advertisements
Similar presentations
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Advertisements

Module 5: Configuring Access for Remote Clients and Networks.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewalls and Intrusion Detection Systems
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Security Awareness: Applying Practical Security in Your World
Firewalls CS591 Topics in Internet Security November Steve Miskovitz, Steve Peckham, Kan Hayashi.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 13 – Network Security
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Defining Network Infrastructure and Network Security Lesson 8.
S ECURITY APPLIANCES Module 2 Unit 2. S ECURE NETWORK TOPOLOGIES A topology is a description of how a computer network is physically or logically organized.
IP Security
Security fundamentals
IPSec Detailed Description and VPN
CompTIA Security+ Study Guide (SY0-401)
IPSecurity.
Virtual Private Networks
Microsoft Windows NT 4.0 Authentication Protocols
Firewall.
Securing the Network Perimeter with ISA 2004
Click to edit Master subtitle style
IPSec VPN Chapter 13 of Malik.
Understand Networking Services
Introduction to Networking
Firewalls.
Firewalls and VPNs Principles of Information Security, 2nd Edition
CompTIA Security+ Study Guide (SY0-401)
6.6 Firewalls Packet Filter (=filtering router)
* Essential Network Security Book Slides.
Access Control Lists CCNA 2 v3 – Module 11
Firewalls Routers, Switches, Hubs VPNs
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Chapter 8 Network Perimeter Security
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Firewall.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Session 20 INST 346 Technologies, Infrastructure and Architecture
Topic 12: Virtual Private Networks
Presentation transcript:

Introduction to Network Security FOR Bim - CSCL

What is Network Security Is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network Security Overview

Principal Method of Protecting Network Methods that are used in cryptography can be effectively used in network security. Encryption-decryption can be used to maintain data confidentiality Hashing and message digest can to used to maintain integrity Digital Signature can be used for authenciation There are certain methods like intrusion prevention system and hardware firewall to prevent Denial-of-Service attack which maintain network security.

Encryption at Network

Network Organization Firewall and Proxies are major hardware that separated internal network from external.

DMZ Zone Literal Meaning: Demilitarized Zone, an area between nation states in which military operation is not permitted In computer networks: DMZ is a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet The DMZ functions as a small, isolated network positioned between the Internet and the private network Any service that is being provided to users on the Internet should be placed in the DMZ. The most common of these services are: Web, Mail, DNS, FTP, and VoIP.

Architecture of DMZ Two Common Architecture: Single Firewall and Dual firewall

Single Firewall A single firewall with at least 3 network interfaces can be used to create a network architecture containing a DMZ. The external network is formed from the ISP to the firewall on the first network interface, the internal network is formed from the second network interface, and the DMZ is formed from the third network interface. The firewall becomes a single point of failure for the network and must be able to handle all of the traffic going to the DMZ as well as the internal network.

Dual Firewall The most secure approach, is to use two firewalls to create a DMZ. The first firewall (also called the "front-end" or "perimeter" firewall) must be configured to allow traffic destined to the DMZ only. The second firewall (also called "back-end" or "internal" firewall) only allows traffic from the DMZ to the internal network. This setup is considered to be more secure since two devices would need to be compromised. There is even more protection if the two firewalls are provided by two different vendors, because it makes it less likely that both devices suffer from the same security vulnerabilities.

Firewall A firewall is a host that mediates access to a network, allowing and disallowing certain types of access on the basis of a configured security policy. This firewall accepts or rejects messages on the basis of external information, such as destination addresses or ports, rather than on the basis of the contents of the message. It may also analyzes the packets that enter. Firewalls can then base actions on this analysis, leading to traffic shaping (in which percentages of bandwidth are reserved for specific types of traffic), intrusion response, and other controls.

Proxies Different Type of firewall that previous Is an intermediate agent or server that acts on behalf of an endpoint without allowing a direct connection between the two endpoints. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity.

Types of Firewall Firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows. By methods it works it can be divided into four types Packet-Filtering Firewalls Stateful inspection firewall Application level gateway Circuit level gateway

Packet-Filtering Firewalls (1) Packet-filtering firewalls validate packets based on Protocol Source and/or destination IP addresses Source and/or destination port numbers Time range, type of service (ToS) Various other parameters within the IP header. Packet filtering is generally accomplished using Access Control Lists (ACL) on routers or switches and are normally very fast As traffic enters or exits an interface, ACLs are used to match selected criteria and either permit or deny individual packets.

Packet-Filtering Firewalls (2) The primary advantage of packet-filtering firewalls is that they are located in just about every device on the network Routers, switches, wireless access points, Virtual Private Network (VPN) concentrators, and so on may all have the capability of being a packet-filtering firewall Routers from the very smallest home office to the largest service- provider devices inherently have the capability to control the flow of packets through the use of ACLs.

Packet-Filtering Firewalls (3)

Stateful Inspection Firewall AKA dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall. Stateful inspection has largely replaced an older technology, static packet filtering. In static packet filtering, only the headers of packets are checked -- which means that an attacker can inject the harmful data inside the rest of the packet making system vulrenable. Stateful inspection, on the other hand, analyzes packets down to the application layer. Stateful inspection monitors communications packets over a period of time and examines both incoming and outgoing packets. Outgoing packets that request specific types of incoming packets are tracked and only those incoming packets constituting a proper response are allowed through the firewall.

Application level firewall An application-level gateway, also called an application proxy, acts as a relay of application- level traffic. The user contacts the gateway using a TCP/IP application, such as Telnet or FTP, and the gateway asks the user for the name of the remote host to be accessed. When the user responds and provides a valid user ID and authentication information, the gateway contacts the application.

Application Level Firewall

Circuit-level Firewall Circuit level gateways work at the session layer of the OSI model. They monitor TCP handshaking between packets to determine whether a requested session is legitimate. Information passed to a remote computer through a circuit-level gateway appears to have originated from the gateway.

Different Firewall in OSI layer

IPSec (1) Internet Protocol SECurity Protocol suite for secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session Includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session Can be used in protecting data flows between a pair of hosts (host- to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host).

IPSec(2) Uses cryptographic security services to protect communications over IP networks Supports network-level peer authentication, data origin authentication, data integrity, data confidentiality and replay protection. IPsec has two modes. Transport mode encapsulates the IP packet data area (which is the upper layer packet) in an IPsec envelope, and then uses IP to send the IPsec-wrapped packet. The IP header is not protected. Tunnel mode encapsulates an entire IP packet in an IPsec envelope and then forwards it using IP. Transport mode is used when both endpoints support IPsec. Tunnel mode is used when either or both endpoints do not support IPsec but two intermediate hosts do.

Virtual Private Network VPN extends a private network across a public network or internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. VPN constructed by using public network — usually the Internet — to connect to a private network, such as a company's internal network. Use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

Trusted system Left for you…