Presentation is loading. Please wait.

Presentation is loading. Please wait.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.

Similar presentations


Presentation on theme: "McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs."— Presentation transcript:

1 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs

2 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 List and distinguish between the four conditions of security. Understand how privacy can be achieved through encryption/ decryption. Understand the digital signature concept and how it can be used to provide authentication, integrity, and nonrepudiation. Understanding firewalls and their use in isolating an organization from intruders. After reading this chapter, the reader should be able to: O BJECTIVES

3 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 O BJECTIVES (continued) Understand the different access control methods. Be familiar with VPN technology and how it provides privacy.

4 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 INTRODUCTIONINTRODUCTION 14.1

5 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 14-1 Aspects of security

6 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PRIVACYPRIVACY 14.2

7 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 14-2 Secret-key encryption

8 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 In secret-key encryption, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. Note:

9 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Business Focus: DES One common method of secret-key encryption is the data encryption standard (DES). DES was designed by IBM and adopted by the U.S. government as the standard encryption method for nonmilitary and nonclassified use. The algorithm manipulates a 64-bit plaintext with a 56-bit key. The text is put through 19 different and very complex procedures to create a 64- bit ciphertext.

10 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 14-3 Public-key encryption

11 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Technical Focus: RSA One popular public-key encryption technique is called RSA. The technique uses number theory and the fact that it is easy to create two large numbers and multiply them, but difficult to find the original numbers when the product is given. The public key is made of two large numbers (n and e). The private key is made of two numbers (n and d). The encryption algorithm is C  P e mod n The receiver uses the same procedure but with the private key numbers as shown: C  P d mod n

12 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 DIGITALSIGNATUREDIGITALSIGNATURE 14.3

13 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 14-4 Signing the whole document

14 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Digital signature cannot be achieved using secret-key encryption. Note:

15 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Digital signature does not provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied. Note:

16 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 14-5 Signing the digest

17 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 14-6 Sender site

18 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 14-7 Receiver site

19 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 SECURITY IN THE INTERNETSECURITY INTERNET 14.4

20 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Technical Focus: Pretty Good Privacy (PGP) Pretty Good Privacy (PGP), invented by Phil Zimmermann, is an example of a security scheme designed to provide all four aspects of security (privacy, integrity, authentication, and nonrepudiation) in the sending of email. PGP uses digital signature to provide integrity, authentication, and non- repudiation. It uses a combination of secret-key and public- key encryption to provide privacy. Specifically, it uses one hash function, one secret key, and two private-public key pairs.

21 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Technical Focus: AH and ESP IPSec uses two protocols: authentication header (AH) and encapsulating security payload (ESP) to achieve security. The authentication header (AH) protocol is designed to provide integrity. The method involves a digital signature using a hashing function. The message digest created by applying the hashing function is included in a header (AH header), and inserted between the IP header and transport-layer data and header. The AH protocol does not provide privacy, only integrity and message authentication (digital signature). IPSec defines another protocol that provides privacy as well as a combination of integrity and message authentication. This protocol is called encapsulating security payload (ESP).

22 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 FIREWALLSFIREWALLS 14.5

23 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 14-8 Firewall

24 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 A proxy firewall filters at the application layer. Note:

25 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 VIRTUALPRIVATENETWORKSVIRTUALPRIVATENETWORKS 14.6

26 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 14-9 Private network

27 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 14-10 Hybrid network

28 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 14-11 Virtual private network

29 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 ACCESSCONTROLACCESSCONTROL 14.4

30 McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 14-12 Access control methods


Download ppt "McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs."

Similar presentations


Ads by Google