Presentation is loading. Please wait.

Presentation is loading. Please wait.

PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA.

Similar presentations


Presentation on theme: "PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA."— Presentation transcript:

1 PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA

2 “SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”. Various antidotes that are in fact inextricable with security issues are: – Cryptography Authentication Integrity Non Repudiation Key Distribution and certification Access control by implementing Firewalls

3 In network security more and more advanced security notions are being devised day by day. THE DMZ ZONE PALLADIUM CRYPTOGRAPHY IP Sec KERBEROS AUTHENTICATION SYSTEM. 1.PALLADIUM :- Palladium is the code name for a revolutionary set of “features” for the “windows” operating system Palladium can be touted as the first technology to develop software- hardware synchronization for better data security

4 CORE PRINCIPLES OF PALLADIUM INITIATIVE Palladium is not a separate operating system. It is based in architectural enhancements to the windows kernel and to computer hardware, including the CPU, peripherals and chipsets, to create a new trusted execution subsystem. ASPECTS OF PALLADIUM Palladium comprises two key components: They are Hardware components &Software components Hardware components:- 1. SEALED STORAGE 2. TRUSTED SPACE 3. SECURE INPUT& OUTPUT 4. ATTESTATION

5 SOFTWARE COMPONENTS NEXUS TRUSTED AGENTS WORKING OF PALLADIUM:- Palladium is a new hardware and software architecture. This architecture will include a new security computing chip and design changes to a computer’s central processing unit chipsets, and peripheral devices, such as keyboards and printers. PROTECTION USING PALLADIUM:- Palladium prevents identity theft and unauthorized access to personal data on the user’s device while on the internet and on other networks.

6 CASE STUDY Restructuring data security of JNTU examination system using palladium Existing system The EDEP employs the method of public keycryptography Palladium-as a solution : Palladium is based on the concept of trusted space. A closed sphere of trust binds data or a service, to both a set of users and to a set of acceptable applications. Due to this an unauthorized user cannot access the data or software which is based on a server.

7

8 2. KERBEROS AUTHENTICATION This authentication service uses symmetric key encryption service and a key distribution center. A key is used to encrypt and decrypt short messages. Keys provide the basis for the authentication in Kerberos. In Kerberos, at the present time, the encryption key and the decryption key are identical.

9 FIREWALLS AN EXAMPLE FIREWALL- “A PROXY SERVER”: A proxy server basically acts as a shield by protecting your IP address form getting into malicious hands. OUR SYS.PROXY SERVERREMOTESYSTEM

10 A NOVEL APPROACH TO THE FIREWALLS: “DMZ”

11 IP SEC IP Sec ensures confidentiality, integrity, authenticity of data communications across a public IP network.

12 Figure (b): Network-Layer Encryption

13 DENOUMENT: The capability of security enabled components still lags behind the claims. This was quite evident from the E-attacks on BARC server & post-September11th cyber attacks on FBI sites where even sophisticated surveillance systems couldn’t come to their rescue.

14 REFERENCES: Digit magazine, Topics- 1 & 2. Microsoft Press Pass, Topics- 3 & 4. J.N.T.U website Case study.

15


Download ppt "PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA."

Similar presentations


Ads by Google