SECURITY ISSUES IN NETWORKS WITH INTERNET ACCESS PRESENTED BY Sri Vallabh Aida Janciragic Sashidhar Reddy.

Slides:



Advertisements
Similar presentations
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Advertisements

1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Security+ Guide to Network Security Fundamentals
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
System and Network Security Practices COEN 351 E-Commerce Security.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Web server security Dr Jim Briggs WEBP security1.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Chapter 19 Security.
NETWORK SECURITY.
Web services security I
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Chapter 21 Distributed System Security Copyright © 2008.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
ACM 511 Introduction to Computer Networks. Computer Networks.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Web Security Introduction (Some of the slides were adapted from Oppliger’s online slides at
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
E-Commerce & Bank Security By: Mark Reed COSC 480.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
1 Example security systems n Kerberos n Secure shell.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Chapter 40 Internet Security.
Chapter 5 Electronic Commerce | Security Threats - Solution
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Working at a Small-to-Medium Business or ISP – Chapter 8
Securing the Network Perimeter with ISA 2004
Chapter 5 Electronic Commerce | Security Threats - Solution
Security.
Introduction to Network Security
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

SECURITY ISSUES IN NETWORKS WITH INTERNET ACCESS PRESENTED BY Sri Vallabh Aida Janciragic Sashidhar Reddy

Topics of Discussion Principles for secure networking Internet Vulnerabilities Security building blocks

Internet Security Why do we need to study security in the internet? Here are some reasons … –Computer networks have lots of vulnerabilities and threats –A hacker can log into my machine remotely and destroy the information –A malicious program can wipe out data on hundreds of computers causing huge losses

Principles for Secure Networking Questions to consider –What are we trying to protect? –What operations are authorized? –What is security parameter?

Principles continued… Know the configuration of the network hardware and software Know the vulnerabilities of the configuration Know the threats and consider it in relation to the vulnerabilities to asses the risk Authenticate and authorize the accessto network resources

Principles Continued.. Maintain audit logs Have a plan to detect and respond to security incidents Ensure individual accountability

The Networks of TwoHands Corporation TwoHands corporation develops, produces, and markets specialized gloves used in waste disposal and other safety related applications The corporation has a Headquarters,a Research Lab,several factories and warehouses in different parts of the country

Continued… Let us discuss the five stages of development in TwoHands Networks and consider in each stage the problems associated with the network and the possible remedies

Stage1:Private Networks Only Security Problems 1. Any user can access network traffic 2. Diskette drives on the client workstations 3. PCs with modem connections 4. Insufficient training to authorized users

Continued… Possible Countermeasures 1.Introduction of an authentication system for each user 2.Installation of virus detection software and configuration monitors 3.Installation of temper resistant hardware 4.Security awareness training for authorized users

Stage 2:Private Networks plus Read-only Web Server Security Problems 1.All the problems in stage 1 2.Denial of service attack 3.Unauthorized change to data on web server 4.Web address spoofing

Continued… Possible Countermeasures 1.Use a reliable web server package 2.Keep abreast of the advisories provided by CERT(Computer Emergency Response Team), FIRST(Forum of Incident Response Teams) 3.Proper maintenance of web server

Stage 3:Private Nets Plus Forms-Based WWW Server Security Problems 1.Compromise of order information 2.Spoofing of order information 3.Loss of control over the web site 4.Customer information stored on ISP host.

Continued… Possible Countermeasures 1.Using a secure web server like HTTP 2.Double checking the CGI scripts 3.Customer authentication

Stage 4:Internet Service through Firewall with Forms-Based WWW Server Security Problems 1.Attacks on internal systems via misconfigured firewalls 2.Importing of malicious software or exporting of sensitive information via properly configured firewall 3.Compromise of identity of correspondents 4.Back doors into internal networks

Continued… Possible Countermeasures 1.Proper firewall configuration 2.Vigilant management of firewall and the website 3. Provide proper awareness of security to the internal users

Stage 5:Virtual Private Networks Security Problems 1.Contamination of internal database via actions of cooperating companies 2.Service delays/denial for intranet traffic due to Internet/ISP problems 3.Compromise or delay of intranet traffic due to crypto mismanagement 4.Compromise of internal traffic patterns

Continued… Possible Countermeasures 1.Using proper encryption methodology 2.Avoid same company as ISP all the sites

Network Security Policy and Services For any level of network security to be established and maintained we need to understand: what assets we need to protect against what threats to what degree identify the elements of security policies appropriate for networks construct a security policy to meet the needs of network decide on means for enforcing the policy

Network security services confidentiality (protection against eavesdropping) integrity (protection against data modification) authentication (assurance that the source of the data is accurately identified to the recipient) non-repudiation (inability of the sender to disavow data the recipient receives)

Vulnerabilities Network Sniffing War Dialing Protocol Data-link-layer security Network-layer security Transport-layer security IP origin forgery

Above the application layer System access control and authorization data structures Malicious Software Hidden Application Features

Types of Encryption Algorithms  Symmetric DES ( Digital Encryption Standard)  Asymmetric ( Public Key Cryptography) RSA (Rivest Shamir Adleman)

DES

RSA

Authentication  Cryptographic Hash Functions  MAC (Message Authentication Code)  Digital Signatures

Security in TCP/IP Protocol Stack  Application Layer Encryption  Session Encryption  IP Layer Encryption

Relative Location of Security in TCP/IP Protocol Stack

SSL Protocol Operation

IP Security Scenario

The Kerberos Architecture Kerberos Client Ticket Granting Service Server (1) request/receive TGS ticket (2) request/receive server ticket (3) request service

Intrusion Detection  Network Based Network Security Monitor, Network IDS, Net Ranger, Tripwire etc…  Host Based Probes of host ports, password guessing etc…

Taxonomy of Malicious Programs

Security Management Tools  SATAN (Security Analysis Tool for Auditing Networks)  ISS (Internet Security Scanner)  Tiger  Crack  Snoop

Firewall Firewall : a method used to prevent unauthorized access to a private network Internet Trust

Types of Firewalls

SOCKS Target of communication sends information back through SOCKS daemon, which routes it to the user desktop. Protected Network Internet Firewall SOCKS daemon on firewall parses request, checks access control rules, and makes connection (proxy); copy data back in through firewall. Socksified user app asks SOCKS daemon for circuit