Network Security Part III: Security Appliances Firewalls.

Slides:



Advertisements
Similar presentations
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Advertisements

Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Cyber Security for Smart Grids Prof. Biplab Sikdar Department of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute Troy NY.
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
1 Firewalls Types of Firewalls  Screening router firewalls  Computer-based firewalls  Firewall appliances  Host firewalls (firewalls on clients and.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Web Server Administration Chapter 10 Securing the Web Environment.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Windows 7 Firewall.
1 Network Security 2 nd Lec. BSIT 4C - Finals. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness.
Internet and Intranet Fundamentals Class 9 Session A.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Packet Filtering COMP 423. Packets packets datagram To understand how firewalls work, you must first understand packets. Packets are discrete blocks of.
Firewall Security.
Workpackage 3 New security algorithm design ICS-FORTH Ipswich 19 th December 2007.
Network Security 1. Overview What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures Firewalls & Intrusion.
Network Security Major Problems Network Security Major Problems Why Firewall? Why Firewall? Problems with Firewalls Problems with Firewalls What is.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
1/23/2016 Network Security By S K Satapathy clicktechsolution.com.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Networks Fall Network Security Networks Fall A Brief History of the World.
Web Security Firewalls, Buffer overflows and proxy servers.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
1 Network Security TTC MOBILE Overview What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Network Security 1. Overview What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures Firewalls & Intrusion.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Lab #2 NET332 By Asma AlOsaimi.
CSCE 548 Student Presentation By Manasa Suthram
Network Security Networks Fall 2002.
Network Security Justin Weisz Networks Fall 2002.
The Linux Operating System
Firewalls.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Security in Networking
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Routers, Switches, Hubs VPNs
Justin Weisz Network Security Justin Weisz Networks Fall 2002.
Network Security Networks Fall 2002.
Firewalls Chapter 8.
Justin Weisz Network Security Justin Weisz Networks Fall 2002.
Justin Weisz Network Security Justin Weisz Networks Fall 2002.
Justin Weisz Network Security Justin Weisz Networks Fall 2002.
Presentation transcript:

Network Security Part III: Security Appliances Firewalls

SECURITY INNOVATION © Common Security Attacks and Their Countermeasures Finding a way into the network –Firewalls Exploiting software bugs, buffer overflows –Intrusion Detection Systems Denial of Service –Ingress filtering, IDS TCP hijacking –IPSec Packet sniffing –Encryption (SSH, SSL, HTTPS) Social problems –Education

SECURITY INNOVATION ©2003 3Firewalls Basic problem – many network applications and protocols have security problems that are fixed over time –Difficult for users to keep up with changes and keep host secure –Solution Administrators limit access to end hosts by using a firewall Firewall is kept up-to-date by administrators

SECURITY INNOVATION ©2003 4Firewalls A firewall is like a castle with a drawbridge –Only one point of access into the network –This can be good or bad Can be hardware or software –Ex. Some routers come with firewall functionality –ipfw, ipchains, pf on Unix systems, Windows XP and Mac OS X have built in firewalls

SECURITY INNOVATION ©2003 5FirewallsIntranet DMZ Internet FirewallFirewall Web server, server, web proxy, etc

SECURITY INNOVATION ©2003 6Firewalls Used to filter packets based on a combination of features –These are called packet filtering firewalls There are other types too, but they will not be discussed –Ex. Drop packets with destination port of 23 (Telnet) –Can use any combination of IP/UDP/TCP header information –man ipfw on unix47 for much more detail But why don’t we just turn Telnet off?

SECURITY INNOVATION ©2003 7Firewalls Here is what a computer with a default Windows XP install looks like: –135/tcp open loc-srv –139/tcp open netbios-ssn –445/tcp open microsoft-ds –1025/tcp open NFS-or-IIS –3389/tcp open ms-term-serv –5000/tcp open UPnP Might need some of these services, or might not be able to control all the machines on the network

SECURITY INNOVATION ©2003 8Firewalls What does a firewall rule look like? –Depends on the firewall used Example: ipfw –/sbin/ipfw add deny tcp from cracker.evil.org to wolf.tambov.su telnet Other examples: WinXP & Mac OS X have built in and third party firewalls –Different graphical user interfaces –Varying amounts of complexity and power