Today’s security challenges are unprecedented 911 Increase in viruses from 1 (1989) to 60,000 (2002) Today’s viruses are more powerful, sophisticated,

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Encrypting Wireless Data with VPN Techniques
U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Enabling IPv6 in Corporate Intranet Networks
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Guide to Network Defense and Countermeasures Second Edition
1 Voice over Internet Protocol (VoIP) Security Affects on the IP Network Architecture Conference ICS – Wireless Group Meeting Tempe, Arizona.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
An Investigation into E-Commerce Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 1 November 2004.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
1 Telstra in Confidence Managing Security for our Mobile Technology.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
Securing the Borderless Network March 21, 2000 Ted Barlow.
IS Network and Telecommunications Risks
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Subnetting.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Internet Protocol Security (IPSec)
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Virtual Private Network
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Course 201 – Administration, Content Inspection and SSL VPN
Embracing IP Multimedia Services for Strategic Business Advantage Rick Seeto VP & GM Enterprise Networks, Asia Pacific.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
BUSINESS B1 Information Security.
Internet Protocol Security. Introduction Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Network Security Lecture 8 IP Sec Waleed Ejaz
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
R 255 G 211 B 8 R 255 G 175 B 0 R 127 G 16 B 162 R 163 G 166 B 173 R 104 G 113 B 122 R 234 G 234 B 234 R 175 G 0 B 51 R 0 G 0 B 0 R 255 G 255 B 255 Supporting.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Deploying IPv6, Now Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
Understand Internet Security LESSON Security Fundamentals.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Corporate Networks and IPv6 Dec. 4, 2001 Panel coordinator Akihiro Inomata FUJITSU LMITED.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
IS3220 Information Technology Infrastructure Security
Securing Access to Data Using IPsec Josh Jones Cosc352.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
Chapter 7. Identifying Assets and Activities to Be Protected
IT443 – Network Security Administration Instructor: Bo Sheng
Security in Networking
VPN: Virtual Private Network
ONLINE SECURE DATA SERVICE
Topic 12: Virtual Private Networks
Introduction to Networking Security
Presentation transcript:

Today’s security challenges are unprecedented 911 Increase in viruses from 1 (1989) to 60,000 (2002) Today’s viruses are more powerful, sophisticated, and pervasive: - Code Red infected over 250,000 systems in just 9 hours - SQL Slammer infected 75,000 systems within 29 minutes

Source: McAfee Known Viruses

Incidence of Severe (Critical, Malicious, Focused) Electronic Attacks by Organization Type between January 1st 2002 and June 30th 2002 Global Electronic Attack Health 9 Other12 E-Commerce 13 Media17 Manufacturing19 Business 21 High Tech 27 Government & Non-Profit 31 Finance 47 Energy 70 Source: Riptech, Inc Attack estimates do not include worms (eg. Code Red) or Denial- of- Service attacks (eg. Smurf)) % %

The economic impact of security vulnerabilities is significant: Code Red: $2.62 Billion US Nimda : $63 Million Worldwide losses from security breaches, viruses, etc. for 1999: 1.6 US Trillion US ($ 1,600,000,000,000.00) Source: U. S. President’s Commission on Critical Infrastructure Protection

Use & Build A Worldwide Initiative to define an end-2-end integrated security & Privacy platform As mother organization Japan Korea India Europe North America Europe As cooperation Partners D4: Trust & Security SEINIT Plus all 75 projects and TFs ( Cybersecurity TF)

Policies in Focus National Security Homeland Security Economic Security More Issues En Español News Current News Video Press Briefings Proclamations Executive Orders Radio Addresses News by Date April 2003 March 2003 February 2003 January 2003 December 2002 November 2002 October 2002 September 2002 August 2002 July 2002 June 2002 May 2002 April 2002 March 2002 February 2002 January 2002 December 2001 November 2001 October 2001 September 2001 August 2001 July 2001 June 2001 May 2001 April 2001 March 2001 February 2001 January 2001 Appointments Nominations Application Photos Photo Essays Federal Facts Federal Statistics West Wing History (Click here to download entire Strategy) The National Strategy to Secure Cyberspace The National Strategy to Secure Cyberspace is part of our overall effort to protect the Nation. It is an implementing component of the National Strategy for Homeland Security and is complemented by a National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The purpose of this document is to engage and empower Americans to secure the portions of cyberspace that they own, operate, control, or with which they interact. Securing cyberspace is a difficult strategic challenge that requires coordinated and focused effort from our entire society, the federal government, state and local governments, the private sector, and the American people.National Strategy for the Physical Protection of Critical Infrastructures and Key Assets PresidentPresident | Vice President | First Lady | Mrs. Cheney | News & Policies | History & Tours | Kids | Your Government | Appointments | Contact | Text onlyVice PresidentFirst LadyMrs. CheneyNews & Policies History & ToursKidsYour GovernmentAppointmentsContactText only AccessibilityAccessibility | Search | Privacy Policy | HelpSearchPrivacy PolicyHelp Mr. John L. Osterholz DOD DOD Net-Centricto

The Internet‘s Serious Enemies They are called Security,,,, and! Viruses Hackers Privacy SW Bugs: OS,.. Governments

’’Unpredictable World ” ’’Taming the World ”

Security History (Network) None (we are all friends) – Early Internet users were researchers – Personal Computing revolution had yet to start 1988: Uh Oh! – Internet Worm, first time Internet made television... in a bad way Today – Security threats abound, but security technology is an add-on

Security is not Deployed Internet is “edge” centric –Hard to add security in the middle –Firewalls attempt to add security “quasi” edge Security is Hard –It is a “negative deliverable”  You don’t know when you have it, only when you have lost it!  Users don’t ask for it, so the market doesn’t demand it

Moat / Main Gate Outer Perimeter Controlling Castle Access Keep (Last Building in Castle to Fall) Inner Perimeter Stronghold, Higher Walls produce containment area Between Inner / Outer Perimeters Internet Security Analogy

Keep Internet Mission Critical Systems Internal Firewall Internal Network Outer Perimeter Inner Perimeter Stronghold Jewels Crown

Internet Attacks Denial of ServiceEavesdropping (secrecy) Modification (Integrity) Fabrication (Authentication) Brute Force, Hidden,... Wiretapping, Trojan Horse Man-in-the M., Viruses,...Masquerading,...

Some Internet Security Protocols Application - + PGP, S/MIME Transport - Primarily Web + SSL/TLS + Secure Shell (SSH) Network + IPsec –MIPv6 Routing Security Infrastructure + DNSsec - PKI + SNMPv3 security You are here Political Economic Application Presentation Session Transport Network Link Physical

Internet Security and Privacy with IPv6 -Analogy IPsec-o-IPv6 Folks, Just Surfing with Random Address for Privacy Steel Pipe

Large-Scale End-to-End Security The Internet IPsec Terminal IPsec terminal RR Global AddressPrivate Address IPv4-NAT IPv6 Global Address RR NAT Low interoperability between different vendors Site-to-Site Secure Communication End-to-End Secure Communications R Secure Transmission Low security on the LAN End-to-end secure communication Office A Office B Business Partner Easy to partner with new customer Easy to setup IP-VPN between end-to-end terminals with IPv6 Secure Transmission

IPsec Protects all upper-layer protocols. Requires no modifications to applications. –But smart applications can take advantage of it. Useful for host-to-host, host to gateway, and gateway-to-gateway. –Latter two used to build VPNs.

Doesn’t IPsec work with IPv4? Yes, but… It isn’t standard with v4. Few implementations support host-to-host mode. –Even fewer applications can take advantage of it.

No NATs NATs break IPsec, especially in host- to-host (P2P) mode. With no NATs needed, fewer obstacles to use of IPsec. Note carefully: NATs provide no more security than an application-level firewall.

Can you do 3 things in ONE GO? e2e Security Mobility e2e Communication It‘s Acrobatic! The Road Warrior is a Clown!

Fire wall Network The Internet RR Application Gateway DHCP Server PC NAT LAN Private AddressGlobal Address Link-Local Site-LocalGlobal PRIVACY: Addressing Model IPv6 IPv4-NAT

Several choices for configuring the interface ID of an address: –manual configuration (of interface ID or whole addr) –DHCPv6 (configures whole address) –automatic derivation from 48-bit IEEE 802 address or 64-bit IEEE EUI-64 address –pseudo-random generation (for client privacy) the latter two choices enable “serverless” or “stateless” autoconfiguration, when combined with high-order part of the address learned via Router Advertisements Link-Local Site-LocalGlobal Configuring Interface IDs

IPv6 includes non-global addresses, similar to IPv4 private addresses (“net 10”, etc.) a topological region within which such non-global addresses are used is called a zone zones come in different sizes, called scopes (e.g., link-local, site-local,…) unlike in IPv4, a non-global address zone is also part of the global addressable region (the “global zone”) => an interface may have both global and non-global addresses Link-Local Site-LocalGlobal Non-Global Addresses

Address Zones and Scopes The Global Internet Site R R Link Link Each oval is a different zone; different colors indicate different scopes

Recycling IP Addresses Limited Noticeable Fog Generalised use of NAPT, RSIP? IPv6 Deployment Address Transparency IPsec FOG Issues Exhaustion NAT-over-NAT BrokenPermanet Thick Fog NATs between even ISPs Successful Restored e-2-e e-2-e works Clears! Intranet, Proxies & Firewalls may remain Scenario 1 Scenario 2 Complete Failure

Authentication Challenges There is username/password And then there is everything else –SecurID –Smart Card –ATM Card –Biometrics  The “password” you cannot change...  There are also “safety” hazards...

Recommendations of ISOC/IAB/IETF INET 2002 June 19 - while export controls have loosened, Cisco and others are still forced to distinguish between US and non-US versions of code, around crypto. It was suggested that USG simply drop all export restrictions on crypto code using the new Advanced Encryption Standard - we still don't know how to deploy a global Public Key Infrastructure, making global IPSEC privacy/authentication difficult (research funding) - ditto secure/scalable/quickly-converging global and local routing - ditto on intrusion detection as a service provider service (detecting and mitigating attacks of various kinds) Richard Clarke

Recommendations of ISOC/IAB/IETF INET 2002 June 19 - ditto secure/scalable/quickly-converging global and local routing - ditto on intrusion detection as a service provider service (detecting and mitigating attacks of various kinds) Richard Clarke

Societal Challenges Shift from ISP to.. Personal ISP Bring Trust to Internet – Banking – Government ( evoting ) – E-commerce Security-aware Society Security Divide! (Security Haves and Have-Nots ) Security for EveryOne & Everything

Conclusions IPv6 mandates and enables an important improvement in security. Much of the improvement comes from standard, usable, IPsec. The very large address space may provide for other, innovative security mechanisms.