1 Pertemuan 10 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >

Slides:



Advertisements
Similar presentations
Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Advertisements

FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
FIREWALLS – Chapter 20 network-based threats access to outside world Functionality, Design Security – trusted system.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Security Firewall Firewall design principle. Firewall Characteristics.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Securing the Borderless Network March 21, 2000 Ted Barlow.
Active Directory: Final Solution to Enterprise System Integration
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Firewall Planning and Design Chapter 1. Learning Objectives Understand the misconceptions about firewalls Realize that a firewall is dependent on an effective.
IS Network and Telecommunications Risks
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
Explore the use of multiple gateways for intrusion detection defense Sunil Bhave & Sonali Patankar CS526 Fall 2002.
Security Awareness: Applying Practical Security in Your World
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Internet Security Seminar Class CS591 Presentation Topic: VPN.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewall Slides by John Rouda
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Web Server Administration Chapter 10 Securing the Web Environment.
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Chapter 9: Novell NetWare
8: Network Management1 Firewalls. 8: Network Management2 Firewalls Two firewall types: m packet filter m application gateways To prevent denial of service.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Today’s Lecture Covers < Chapter 6 - IS Security
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Firewalls Julie Petrusa S.A.M. Matiur Rahman Carlo Mormina.
Module 11: Designing Security for Network Perimeters.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
A Network Security -Firewall Bruce Turin.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Top 5 Open Source Firewall Software for Linux User
Working at a Small-to-Medium Business or ISP – Chapter 8
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls.
Security in Networking
* Essential Network Security Book Slides.
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
Presentation transcript:

1 Pertemuan 10 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >

2 Learning Objectives Understand how viruses operate and how to protect systems from them.

3 Virus Protection Virus Categories –File infectors –System or boot-record infectors –Macro viruses –Worms

4 Virus Protection Backup and Recovery –Organizations need to have clear procedures for backup and recovery. Onsite Offsite Timed –Organization must enforce these procedures. –Take advantage of new technologies Compression Optical storage –Clear recovery procedures

5 Firewalls Necessary for Enterprise and service providers, Small offices, and consumers having access to Internet. Design Goals of a Firewall: –Control the traffic from inside to outside and vice versa. –Establish local security policies. –Avoid penetration through simplicity. Clear set of rules Easily maintained Assigned responsibilities

6 Firewalls Firewalls can be Classified in: –Packet Filtering Router –Circuit-Level Gateways –Application-Level Gateways Proxy Servers

7 Firewalls Packet Filtering Router Applies a set of rules to all incoming packets Filtering rules are based on the fields of the packet.

8 Firewalls Circuit-Level Gateway Establishes connections between users on the outside and users on the inside. No direct end-to-end links, TCP redirection. Does not provides network-layer services.

9 Firewalls Multilevel Firewalls –Based on fact that intruder can be repelled by multiple layers of defense or at least slowed down.

10 Firewalls Application-Level Gateway Establishes connections at the application level. Stricter security than packet filtering. Proxy servers are functionally similar. Proxy servers also act as cache servers to enhance performance.

11 Security Audit Security audits feature –Top-Down interviews –Identification of deviation from existing policies. –Analysis using proven security practices methodology (SPM). Many companies outsource audits. –Based on costs –Based on skills

12 Security Levels Security of the Organization –Select the right solution –Intrusion detection Security of the Client –Protection at the browser –Protection through virtual private network Security of the Third Party –Distributed Denial Of Service Attacks (DDOS) –Filtering outbound traffic

13 Security Levels - Clients Connections to the Internet are not anonymous. –Privacy issues Transactions may leave residual information. –Caching –Cookies –Log

14 Security Levels - Clients Countermeasures in Netscape & Internet explorer

15 Directory Services Definition –A network service that identifies all resources on a network and makes them accessible to users and applications. Standards –X.500 is an ISO and ITU standard that defines how global directories should be structured. X.500 directories are hierarchical –LDAP was conceived of as a way to simplify access to a directory service that was modeled according to the X.500 standards. LDAP has emerged as the solution needed to make global directory services a reality.

16 Directory Services Current products –Number based on Lightweight Directory Access Protocol (LDAP) –CP: Injoin Directory Server v3.XInjoin Directory Server v3.X –NETSCAPE: iPlanet Directory Server 4.11iPlanet Directory Server 4.11 –NOVELL: NDS eDirectory Version 8.XNDS eDirectory Version 8.X –ORACLE: Oracle Internet Directory 2.XOracle Internet Directory 2.X –Microsoft Active Directory Service

17 Directory Services Single Sign-On –A user needs only one user ID and password, which eliminates the security headaches and vulnerabilities associated with multiple IDs/passwords. –Frees security administrators from the mundane task of assigning passwords –Single Sign-On should work across all platforms, databases, and applications and includes out-of-the- box support for third-party technologies such as Authentication, PKI, and smart cards.