Class 6 Agenda Midterm Review Midterm Review –Questions –Toyota Case Computer Security Basics Computer Security Basics –Identification & Authentication.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Guide to Network Defense and Countermeasures Second Edition
Chapter 12 Network Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Telecommunication and Networks
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
Virtual Private Network
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
Course 201 – Administration, Content Inspection and SSL VPN
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Virtual Company Group 8 Presentation Date: June /04/2017
MD703 Class 9 Agenda Computer Security SSL encryption and Internet security Network Security Chapter 3 Review Chapter 8 Review.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
Web Server Administration Chapter 10 Securing the Web Environment.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Secure Socket Layer (SSL)
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Module 11: Remote Access Fundamentals
Security Infrastructure Overview - VPN Suresh Ramasamy.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
ClearTunnel Close the SSL Hole! Copyright ©2008 Collective Software, LLC.
Agenda Midterm Notes Taco Bell Case Chapter 5 Computer Security.
Integrating and Troubleshooting Citrix Access Gateway.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Module 10: Providing Secure Access to Remote Offices.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
The Tech that supports the Net Net Tech for CBIS.
Class 7 Agenda Computer Center Tour Computer Center Tour Text: Strategy & Technology (cont) Text: Strategy & Technology (cont) Collaboration Tools Basics.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
CS4241: Webware Class 25: A Few Short Topics Web Security 1 Copyright , Michael J. Ciaraldi.
SCALABILITY AND SECURITY Presentation. 01 Scalability.
Virtual Private Network (VPN)
Virtual Private Networks
Welcome To : Group 1 VC Presentation
6.6 Firewalls Packet Filter (=filtering router)
IS4550 Security Policies and Implementation
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Security Protocols in the Internet
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Cengage Learning: Computer Networking from LANs to WANs
Read this to find out how the internet works!
Presentation transcript:

Class 6 Agenda Midterm Review Midterm Review –Questions –Toyota Case Computer Security Basics Computer Security Basics –Identification & Authentication –SSL encryption and Internet security –Network Security Text Chapter : Strategy & Technology Text Chapter : Strategy & Technology

Computer Security Basics Access Control Access Control –Identification –Authentication –Permissions/Access Issues Issues Role-based access Role-based access “Row-level” access “Row-level” access Mechanisms Mechanisms Directories Directories Groups, attributes Groups, attributes Logs Logs

Encryption “Encrypt” vs “encode” “Encrypt” vs “encode” Asymmetric keys Asymmetric keys Public / private keys Public / private keys Digital Certificates Digital Certificates SSL / HTTPS SSL / HTTPS Secured Transactions Secured Transactions

PKI Process PKI Process PKI Service PKI Client Send Public key Return encoded symmetric key Send login req using sym key Conduct work Time’s up! Send new sym key info

Network Security Basics Single sign-on Single sign-on –Trusted machine model –Tokens Firewalls Firewalls –Routers as firewalls –True firewalls “Castles and Roads” “Castles and Roads” Virtual Private Network Virtual Private Network DMZ DMZ –2-router model

Single Sign-on Security Server Application Server User/Client : Login to SS 2: Get token 3: login to AS (pass token) 4: AS chk’s token 5: SS ok’s token

Router / Firewall Firewall Router Accept List / Exclude list From: To: Type: Telnet From: To: Type: Telnet

Routed Network Design Router I-net router Client LAN Router Campus Backbone

DMZ Model Internet router (to/from DMZ only) Internal ServicesExternal Services DMZ Intranet router (to/from DMZ only)

VPN / Remote Access Goals Goals –Privacy –IP address domains VPN Mechanism VPN Mechanism –Proxy server –“Tunneling” VPN Problems VPN Problems –Encryption performance

VPN Router Enabling local traffic Server Campus Backbone Server Local IP session Encrypted remote session Server VPN Server Internet

Text: Strategy & Technology “IT doesn’t matter!” Comments? “IT doesn’t matter!” Comments? What makes sustainable advantage? What makes sustainable advantage? What technical aspects (ref class 1) effect sustainable advantage? What technical aspects (ref class 1) effect sustainable advantage? How important is the “portal” factor? How important is the “portal” factor?

Wednesday Computer Center Tour Computer Center Tour –Meet at 197 Foster 6:30 Tech Brief: Collaboration Basics Tech Brief: Collaboration Basics Text Chapter: Peer Production Text Chapter: Peer Production Project Planning time Project Planning time –(Outline due to me by COB Friday)