Intra-Company Data Traversal Protecting Customer Data from Parent Company.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Security at the Network Layer: IPSec
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Security for Data Transfers Protecting Customer Data.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Virtual Private Networking Karlene R. Samuels COSC513.
Columbus Convention Center - October 1, 2008 Meeting Room E171 James Matheke Greg Perkins.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Network Security Sorina Persa Group 3250 Group 3250.
Virtual Private Network
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Secure connections.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
IPSec in a Multi-OS Environment. What is IPSec? IPSec stands for Internet Protocol Security It is at a most basic level a way of adding security to your.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Networks Warren Toomey. Available WAN Links.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
IP Security. P R E S E N T E D B Y ::: Semester : 8 ::: Year : 2009 Naeem Riaz Maria Shakeel Aqsa Nizam.
18 July 2004Bill Nickless / IPSec1 IPSec Internet Protocol Security And You.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Confidential New OnCell Features VPN & GuaranLink.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
IP Security
CSCI 465 Data Communications and Networks Lecture 26
IPSec Detailed Description and VPN
Virtual Private Networks
Version B.00 H7076S Module 3 Slides
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
technical-service/ technical-service/
The introduction and the essential elements of E- Commerce.
Belkin Router Customer Service Belkin Router Customer Service.
Belkin Router Customer Service Belkin Router Customer Service.
EarthLink Customer Service by webmailhelps
Cisco Router Support at toll free
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Virtual Private Networks
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
B. R. Chandavarkar CSE Dept., NITK Surathkal
Presentation transcript:

Intra-Company Data Traversal Protecting Customer Data from Parent Company

Intra-Company Data Traversal Auditor : “Can Allstate Corp. capture outbound traffic from Allstate Bank?” Jason : “Yes”… “I mean no!”… “Ah damn!”

Intra-Company Data Traversal The Business Need Allstate Bank (AB) wants to protect its customer data from Allstate Corp. (ALL)

Intra-Company Data Traversal The Problem  How do we protect non-public customer data that is being electronically transmitted from Allstate Bank through Allstate Corp’s corporate LAN?

Intra-Company Data Traversal Problem Specifics Regulatory 1. Regulations dictate that there can only be limited access to sensitive customer information. 2. US Consumer & Privacy laws must be followed in all cases.

Intra-Company Data Traversal Problem Specifics Data For that information that can be sent: 1. Data cannot be in Plaintext as it traverses Allstate corporate network. 2. Payload of packet cannot be encrypted by router when it reaches the Allstate corporate network perimeter.

Intra-Company Data Traversal Solution : IPSec tunnel between 2 new Cisco routers

Intra-Company Data Traversal Auditor : “Can Allstate Corp. capture outbound traffic from Allstate Bank?” Jason : “Yes”… “But only in 1 place … instead of 5”