Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

Firewalls Uyanga Tserengombo
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
HIPAA Security Standards What’s happening in your office?
Security Firewall Firewall design principle. Firewall Characteristics.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Chapter 11 Firewalls.
Firewall Configuration Strategies
Security+ Guide to Network Security Fundamentals
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Chapter 12 Network Security.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewall Slides by John Rouda
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
Internet and Intranet Fundamentals Class 8 Session A.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
What is a Firewall?.
Firewall.
Network Security Marshall Leitem 11/30/04
Firewalls.
Network Security: IP Spoofing and Firewall
Firewalls Routers, Switches, Hubs VPNs
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Security.
Introduction to Network Security
FIREWALL.
Operating System Concepts
Presentation transcript:

Security Presented by : Qing Ma

Introduction Security overview security threats password security, encryption and network security as specific

Security overview Why do we need security? Security is basic requirement because global computing is inherently insecure. Also Information security computer security protects the information you stored in the computer

Security overview What are you trying to protect? You should analyze your system to know what you protecting and why you are protecting it. What value it has, and who has responsibility for your data and other assets.

Security threats A security threat can be as simple as interfering with your network normal operation or actively cracking you security and changing or taking control of network resources.

Security threats The major types of threats are: denial OS service(DoS)attack buffer overflow Trojan horses intruders and physical security intercepted transmissions social engineering lack of user support

Password security and encryption What is encryption? Transform original information into altered information of random text intruder can not read password in the file, even if file security is breached original password not preserved in the memory, when login just do the compare

Password security and encryption Shadow password file:store encrypted password data in file, which has the most restrictive protection. Cryptographic keys: private key--use both to encrypt and to decrypt information public key system--use two keys with private one encrypt a message, with public one decrypt by the recipient

Password security and encryption Shell and file access telnet--use the standard user list for the OS, no encryption or authentication ftp--has basic authentication and access privilege protection SSh(secure shell)--a protocol that lets you log in and execute commands on another machine over network

Password security and encryption Secure socket layer(SSL)--developed by Netscape that sits above the TCP/IP layer but below the higher protocols(http,ftp,ldap) provide standard way for authentication secure files options SCP--part of SSH, provide authentication and encryption ftp over SSH--render insecure utility more protected SSL ftp--prevent packet sniffing

Network security Why network security network security is becoming more and more important as people spend more time connected. What makes it worse is that information can be leaked from the inside of your network to the internet.

Network security Protocols protocol allow user to think at the high level of a communication. The software and hardware create a protocol stack, which is layered architecture for communication. Two protocol stack: OSI(open system interconnection) and TCP/IP(transmission control protocol and internet protocol

Network security Network ISO/OSI model application layer presentation layer session layer transport layer network layer data link layer physical layer

Network security Trusted/untrusted system communication between trusted and untrusted networks must have rules associated with it. A trusted system is inside a security perimeter. Information outside the trusted network treated as single sensitivity level.

Network security A gateway controls traffic from inside and outside. The function of gateway is label and filter data. Firewall a firewall is a system designed to prevent unauthorized access to or from a private network.

firewall How does it work? It is used to prevent unauthorized internet users form accessing private networks connected to the internet and intranet. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that don’t meet the specified security criteria.

firewall Fig1 firewall/proxy server

firewall How does a proxy server work? Run at the application level of network protocol stack for each different type of services control internal users access the Internet and Internet users access the inside the world return response to request from inside the firewall

firewall Defensive strategies firewall is perimeter defense system with “choke point” monitor and block access at choke points separate department and implement encryption throughout your organization firewall do not protect against leaks

firewall Fig2 firewall provide perimeter defenses with choke points, like medieval castles

firewall Classifying firewalls screening router(packet filters) proxy server gateway circuit-level gateway application-level gateway stateful inspection techniques

firewall Fig 3 a screening router

firewall Fig4 a proxy server

firewall Firewall policies block all traffic, then allow specific services on case-by-case basis network traffic and from outside networks such as the Internet must pass through the firewall. The traffic must be filtered to allow only authorized packets to pass

firewall Never use a firewall for genera-purpose file storage or to run programs, except for those required by the firewall do not allow any passwords or internal addresses to cross the firewall accept the fact that you might need to completely restore public systems from backup in the event of an attack