CPT 123 Internet Skills Class Notes Internet Security Session A.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Chapter 11 Firewalls.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
System and Network Security Practices COEN 351 E-Commerce Security.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Department Of Computer Engineering
Securing a Wireless Network
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
CPT 499 Internet Skills for Educators. Internet Security Why security Server software security problems Server software security solutions Security Policies.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
October 15, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint SOEN321-Information-Systems Security Revision.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Operating Systems Proj.. Background A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Computer Security By Duncan Hall.
Securing A Wireless Home Network. Simple home wired LAN.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Cryptography and Network Security
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Network Security Analysis Name : Waleed Al-Rumaih ID :
Computer Data Security & Privacy
Wireless Network Security
Firewalls.
Security of a Local Area Network
Tool Server Workstation Router Universal
Network Security: IP Spoofing and Firewall
6. Application Software Security
Presentation transcript:

CPT 123 Internet Skills Class Notes Internet Security Session A

Internet Security Why security Server software security problems Server software security solutions Security Policies

Internet Security Anyone connected to the Net should be concerned about data security and the safety of their system Internet has surpassed two million reachable hosts Number of users unknown

Internet Security Most Internauts are well-behaved Yet there does exist ill-behaved and malicious users within the large Internaut population Individual user that runs Internet clients seldom has anything to be concerned about

Internet Security The office network; business networks; and government networks, on the other hand, have much to be concerned about when it comes to legacy data on their systems Their systems could come under an INTERNAUT ATTACK There is hope

Internet Security In the nut shell, security is the process of keeping anyone from doing things you don’t want them to do to with, on, or from computers or peripheral devices Determine what resources need to be protected

Internet Security Now computers running software with sensitive legacy data is a resource to protect Software with configuration files may contain sensitive information must be protected

Internet Security A hacker, cracker, or attacker who compromises or impersonates a host will have access to all of its resources: files, hard drives, etc.. Internaut attackers may be more interested in the laundry further ongoing connections to other more targets.

Internet Security Defining what needs protecting in general dictates the host-specific measures needed Machines running sensitive files may need extra levels of passwords, file encryption, a password policy, etc..

Internet Security If the target is network connection, the network administrator may ask for certain privileges to access the network When these privileges are activated, extra logging activities may take place on the system Sometimes if you want to protect all resources Internaut attackers must be stopped at the front door

Internet Security Not all attacks come from the outside Must define who the system must be protected from Different levels of attacks require different levels of security

Internet Security Security against a teenager with a modem may not be good enough for an intelligent, malicious, dedicated group of individuals For the teenager an enhanced password system may do the job For the others wiretapping, cryptanalysis, or monitoring the electronic emissions of computers and wires may be needed

Internet Security The security defenses are proportional to the value of the resources and assets to be protected Yet the cost of security on the system is also a factor Some systems may require extra routers or computers to build a firewall gateway

Internet Security There is also the cost of training or hiring individuals to administer the security, develop security software, or to buy security software Too much or too little can hurt a system Keeping hackers, crackers, or attackers off your system depends on how assets are valued

Internet Security An Internaut attacker that enters the system will be able to send nasty notes or data from the system, using a legal user ID or may use the system to enter other systems pretending to be one of the systems users

Internet Security Due to the dynamic nature of the environment server software is often developed rapidly and has not passed rigorous security testing and may have serious vulnerabilities Yet, there are tools and protocols to protect the system from being compromised

Internet Security Yes, the largest threat exists when you decide to serve information on the Internet When an information server is placed on the Internet, it should reside in a system designed and dedicated solely for such a purpose Only information to be distributed should reside on that system

Internet Security Make the assumption that information on the system will be available to the Internet public Therefore, the server system should be disconnected from the rest of a systems network to provide minimum security exposure

Internet Security Not always practical therefore a firewall or a firewall gateway may be necessary A firewall gateway is to serve the line of trust at certain key points It trust only a few other machines and only for certain functions

Internet Security A firewall is a perimeter defense Firewalls do not provide any protection once an Internaut attacker has passed them A firewall is one or more components of a network that permits only authorized inbound and outbound traffic

Internet Security Firewalls have a higher security profile than any other component on the network A firewall usually sits between the Internet and the local network It provides extensive tools to enforce a security policy and is meant to screen client and server request