INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
© 2008 McAfee, Inc. “Endpoint” Security Defining the endpoints and how to protect them.
Firewall Configuration Strategies
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Network Diagram with International Standard
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Module 11: Designing Security for Network Perimeters.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
NetTech Solutions Protecting the Computer Lesson 10.
Computer Security By Duncan Hall.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
E-Commerce & Bank Security By: Mark Reed COSC 480.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Spreadsheet review. Primary key (also called key field): A field which is different for every record in the table Composite key When two fields together.
Chapter 7. Identifying Assets and Activities to Be Protected
CompTIA Security+ Study Guide (SY0-401)
Chapter 5 Electronic Commerce | Security Threats - Solution
Top 5 Open Source Firewall Software for Linux User
Chapter 6 Application Hardening
CONNECTING TO THE INTERNET
1.
Chapter 5 Electronic Commerce | Security Threats - Solution
CompTIA Security+ Study Guide (SY0-401)
Information Security Session October 24, 2005
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Firewalls Routers, Switches, Hubs VPNs
IS4680 Security Auditing for Compliance
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila

Definition Intranet is a private network inside a company or organization, that is not accessible to the public. Companies use Intranets to manage projects, provide employee information, distribute and share data and information.

Objectives Protecting the Intranet from within the organization. Protecting the Intranet from the outside world (Internet).

Architecture

Protection from within Physical security –Secure room –No unauthorized access

Domain Controller Concept –MS, Linux Grants access to resources Protected by –Domain Security Policy( Administrator only) –All Devices (USB, Parallel port) Disabled

Web Server Holds the organizations web site Protected by –Protected by folder rights (Web master only)

File Server Work Related files are stored on this server Access from outside is achieved through VPN (Virtual Private Network) Three levels of protection –Personal access –Group access –Public access

Mail Server Holds users in encrypted form Users have access only to their folders Protected by the mail filter in the DMZ –Filters Spam –Filters Viruses and worms –Prevents attempts to and from unwanted sites

Data Base Server Holds database software and Database files Every database has several levels of security access. Administrator access rights- Can install database software and maintain the database server. Programmer access rights- Limited to their programming needs. Data entry access rights- read and write access to the database tables. User access rights- read only access

Monitoring server Gives detailed report –User activity at the workstations –Administrative activity at the server –Does some intelligent updates antivirus software and security patches on all the servers and workstations.

Workstations Secure Password No Administrative privileges Disable file and printer sharing. Instead connect to printer and file server Disable unnecessary services.

Protection against the outside Firewall DMZ (Demilitarized zone) NAT Connection (Network Address Translation)