Agenda Midterm Notes Taco Bell Case Chapter 5 Computer Security.

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Heroix Longitude - multiplatform, automated application performance monitoring and management software.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Chapter 17 Controls and Security Measures
Guide to Network Defense and Countermeasures Second Edition
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
IS Network and Telecommunications Risks
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Electronic Commerce Yong Choi School of Business CSU, Bakersfield.
Network Security Overview Tales from the trenches.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Telecommunication and Networks
PKI-Enabled Applications That work! Linda Pruss Office of Campus Information Security
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 PORTUGAL COMMUNITY SUPPORT FRAMEWORK.
Public Key Infrastructure Ammar Hasayen ….
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Virtual Company Group 8 Presentation Date: June /04/2017
MD703 Class 9 Agenda Computer Security SSL encryption and Internet security Network Security Chapter 3 Review Chapter 8 Review.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Secure Socket Layer (SSL)
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Security Infrastructure Overview - VPN Suresh Ramasamy.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Class 6 Agenda Midterm Review Midterm Review –Questions –Toyota Case Computer Security Basics Computer Security Basics –Identification & Authentication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Building Security into Your System Bill Major Gregory Ponto.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
ClearTunnel Close the SSL Hole! Copyright ©2008 Collective Software, LLC.
5 th ed: Chapter 17 4 th ed: Chapter 21
The Tech that supports the Net Net Tech for CBIS.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
CS4241: Webware Class 25: A Few Short Topics Web Security 1 Copyright , Michael J. Ciaraldi.
SCALABILITY AND SECURITY Presentation. 01 Scalability.
Chapter 40 Internet Security.
Welcome To : Group 1 VC Presentation
Goals Introduce the Windows Server 2003 family of operating systems
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Install AD Certificate Services
Presentation transcript:

Agenda Midterm Notes Taco Bell Case Chapter 5 Computer Security

Taco Bell Case - Questions Why is this an example of proper scoping of functions? Would you have used “evolution” or “revolution” to update the infrastructure? What maintains control given the decentralized decision process?

Chapter 5 Highlights Infrastructure effects the ability to differentiate Metcalfs’s Law Over focus on “realtime” Complex systems increase process failure probability: redundancy? Net Services as “utility”

Computer Security Basics Identification/Authentication/Access Audit Directory Services: LDAP

Network Security Basics Single sign-on Trusted machines Firewalls TCP/IP Secure Ports/sockets

Single Sign-on Security Server Application Server User/Client : Login to SS 2: Get token 3: login to AS (pass token) 4: AS chk token 5: SS ok’s token

Router Firewall Firewall Router Accept List / Exclude list From: To: Type: Telnet From: To: Type: Telnet

Routed Network Design Router I-net router Client LAN Router Campus Backbone

Encryption Asymmetric keys Public / private keys Digital Certificates SSL / HTTPS Secured Transactions

PKI Process PKI Service PKI Client Send Public key Return encoded symmetric key Send login req using sym key Conduct work Time’s up! Send new sym key info

VPN / Remote Access Goals VPN Mechanism VPN Problems Proxy Server