Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Internet Protocol Security (IP Sec)
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
SCSC 455 Computer Security Virtual Private Network (VPN)
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Firewall Configuration Strategies
Guide to Network Defense and Countermeasures Second Edition
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Virtual Private Networks and IPSec
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Internet Protocol Security (IPSec)
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Securing Insecure Networks SSL/TLS & IPSec. 4-1: Cryptographic System Copyright Pearson Prentice-Hall
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
PROS & CONS of Proxy Firewall
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Intranet, Extranet, Firewall. Intranet and Extranet.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
TCP/IP Protocols Contains Five Layers
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security fundamentals Topic 10 Securing the network perimeter.
Securing Network Communications Using IPSec Chapter Twelve.
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Understand Internet Security LESSON Security Fundamentals.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Virtual Private Networks and IPSec
CompTIA Security+ Study Guide (SY0-401)
Virtual Private Network (VPN)
Firewall Techniques Matt Cupp.
NET 536 Network Security Firewalls and VPN
Securing the Network Perimeter with ISA 2004
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
Security Protocols in the Internet
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Introduction to Network Security
Presentation transcript:

Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer By, By, Adil Siddiqui Adil Siddiqui

Firewalls What is a Firewall? General Definition : - It prevents unauthorized access into your computer. General Definition : - It prevents unauthorized access into your computer. Technical Definition : - It is the combination product that provide the function of screening routers, proxy servers, network address translation, plus stateful inspection. Technical Definition : - It is the combination product that provide the function of screening routers, proxy servers, network address translation, plus stateful inspection.

Firewalls Advantages of Firewalls : - More secure environment then can be achieved through simple packet filtering. More secure environment then can be achieved through simple packet filtering. This method prevents rogue processes from establishing unauthorized network connections. This method prevents rogue processes from establishing unauthorized network connections. It prevents someone from utilizing a port inadvertently left open or unguarded for attacking the system. It prevents someone from utilizing a port inadvertently left open or unguarded for attacking the system. Firewalls can also hide servers, examine contents, and rewrite packets. Firewalls can also hide servers, examine contents, and rewrite packets.

Firewalls Disadvantages of Firewalls : - Firewalls are expensive Firewalls are expensive Need to be replicated at every entrance to the network. Need to be replicated at every entrance to the network. Require significant scripting and configuration management to maximize their effectiveness. Require significant scripting and configuration management to maximize their effectiveness.

Virtual Private Networks What is a VPN ? VPN are a significant advantage in recent technology. They provide secure and cost effective networking. VPN are a significant advantage in recent technology. They provide secure and cost effective networking. The VPN utilize a technology known as private tunneling to provide a secure pathway over a public network. The VPN utilize a technology known as private tunneling to provide a secure pathway over a public network.

Virtual Private Networks Two Modes of VPN Transport Mode : - Uses encryption on the data part of the packet only. Transport Mode : - Uses encryption on the data part of the packet only. Tunnel Mode : - Everything gets encrypted (headers and information sections of the packet) Tunnel Mode : - Everything gets encrypted (headers and information sections of the packet)

Two Modes of VPN

Virtual Private Networks VPN can be deployed in three ways : VPN can be deployed in three ways : Host to host Host to host Site-to-Site Site-to-Site Host-to-Site Host-to-Site

Possible Configurations of VPN

Virtual Private Networks Drawbacks : - During a VPN session while all the traffic in the tunnel is considered secure, Trojans can become dangerous. During a VPN session while all the traffic in the tunnel is considered secure, Trojans can become dangerous. Key Management issues arise with increase of the tunnels. Key Management issues arise with increase of the tunnels.

Secure Socket Layer What is an SSL ? SSL was originally developed by Netscape to provide secure communications between Web clients and servers. SSL was originally developed by Netscape to provide secure communications between Web clients and servers. It has grown to take on a prominent role in secure commications for Web transactions, FTP exchanges, and secure . It has grown to take on a prominent role in secure commications for Web transactions, FTP exchanges, and secure .

Secure Socket Layer The cryptographic technique is complex. The cryptographic technique is complex. The majority of that complexity is found in the establishment procedure. The majority of that complexity is found in the establishment procedure.

SSL Handshake

Secure Socket Layer SSL provides a trusted relationship built on a temporary basis with no prior knowledge of the recipient necessary. SSL provides a trusted relationship built on a temporary basis with no prior knowledge of the recipient necessary.

Question? What are the two modes of VPN that can be deployed? Transport Mode Transport Mode Tunnel Mode Tunnel Mode