Section 10: Security CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
(4.4) Internet Protocols Layered approach to Internet Software 1.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Web Server Administration TEC 236 Securing the Web Environment.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 14.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Lesson 19: Configuring Windows Firewall
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Enabling Secure Internet Access with ISA Server.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Web Server Administration Chapter 10 Securing the Web Environment.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Hands-On Microsoft Windows Server 2008
Chapter 9: Novell NetWare
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Module 3: Enabling Access to Internet Resources
Chapter 5 : Designing Windows Server-Level Security Processes
Securing the Network Perimeter with ISA 2004
Security Securing IS.
Firewalls (March 2, 2016) © Abdou Illia – Spring 2016.
Firewalls Jiang Long Spring 2002.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Firewall Installation
Computer Networks Protocols
Presentation transcript:

Section 10: Security CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE

Objectives Describe Network security modelsDescribe Network security models List the elements of secure password and user account policiesList the elements of secure password and user account policies

Objectives (Con’t) Describe how encryption worksDescribe how encryption works Describe how firewalls workDescribe how firewalls work Describe how proxy servers workDescribe how proxy servers work

Network Security Models Share-level securityShare-level security –Decentralized security –Used on peer-to-peer networks –Resources shared, password protected User-level securityUser-level security –Centrally managed security structure –Used on Client-server networks –Network Administrator manage access to network resources –NetWare, Windows NT, UNIX, Linux

Password Security Policies Do not let users use names of their Spouse, Children, birthdatesDo not let users use names of their Spouse, Children, birthdates Use passwords with Alpha and Numeric/punctuation marksUse passwords with Alpha and Numeric/punctuation marks Use MiXeD cAsE (if supported)Use MiXeD cAsE (if supported) Use multi-word passwordUse multi-word password

Password Security Policies Require unique passwordsRequire unique passwords Direct users to not share/write down their passwordsDirect users to not share/write down their passwords Require passwordsRequire passwords Force periodic password changesForce periodic password changes Set a minimum length passwordSet a minimum length password

User Account Security Default Administrative UsersDefault Administrative Users –NetWare 4.x + AdminAdmin –NetWare 3.x SupervisorSupervisor –Windows NT Server AdministratorAdministrator –UNIX / Linux RootRoot

Administrative Users Limit additional accounts with (full) administrative rightsLimit additional accounts with (full) administrative rights Assign only rights needed to perform needed tasksAssign only rights needed to perform needed tasks –Password Management –File System Backups

User Accounts Enable intruder detection/lockoutEnable intruder detection/lockout –Prevents guessing passwords Use account expiration dates for temporary workersUse account expiration dates for temporary workers Use time restrictions for loginUse time restrictions for login Set workstation restrictionsSet workstation restrictions –Allows login only from specified computers Limit concurrent loginsLimit concurrent logins

Encryption The non-random process of scrambling informationThe non-random process of scrambling information Secret-KeySecret-Key –The same key is used to encrypt/decrypt –DES, 56-bit key, widely used, fast Private-Public KeyPrivate-Public Key –Private Key kept secret, Public key published –Keys are related, but different. Digital EnvelopesDigital Envelopes –Message encrypted with secret-key (faster) –The Secret-key is encrypted using private/public key encryption

Digital Signature Electronic signature that cannot be forgedElectronic signature that cannot be forged “A computed summary of the message... Encrypted and sent with message.”“A computed summary of the message... Encrypted and sent with message.” Summary is decrypted and compared.Summary is decrypted and compared. This guarantees the message has not been alteredThis guarantees the message has not been altered

Firewalls “hardware or software that keeps a network secure by filtering packets as they pass through the system.”“hardware or software that keeps a network secure by filtering packets as they pass through the system.” Used to allow users Internet access, while protecting the company from outside attacksUsed to allow users Internet access, while protecting the company from outside attacks

Firewalls Work by filtering PacketsWork by filtering Packets Filtered by IP AddressFiltered by IP Address –Examines source and destination addresses, accepts or rejects packets based on rules Filtered by Port NumberFiltered by Port Number –HTTP, FTP, TELNET, etc. use different ports –You can allow and disallow traffic by port

Proxy Servers A proxy server sends requests for workstations in a company, using the IP address of the proxyA proxy server sends requests for workstations in a company, using the IP address of the proxy –This hides the internal IP addresses from outside users Generally employ Network Address Translation (NAT)Generally employ Network Address Translation (NAT)

Proxy Services Proxy servers available for common Internet servicesProxy servers available for common Internet services –HTTP –SMTP –Web Caching Novell BorderManagerNovell BorderManager Microsoft Proxy ServerMicrosoft Proxy Server Netscape Proxy ServerNetscape Proxy Server