_IT Security and Intellectual Property Summer 2006 Bashar Al Takrouri Personal Firewalls “Case study ::ZoneAlarm Security Suite” Instructor: Prof. Dr.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
Firewall Lalitha Jammalamadaka. Agenda 1. Introduction 2.Types of firewalls 3.How a software firewall works 4.Methods to control traffic 5.Making the.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Circuit & Application Level Gateways CS-431 Dick Steflik.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 19: Configuring Windows Firewall
Introduction to Firewalls © N. Ganesan, Ph.D.. Overview.
Guide to Computer Network Security
Firewall Slides by John Rouda
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Firewalls. What are firewalls? a hardware device and/or software program which sits between the Internet and the intranet, internet, of an organization.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 6: Packet Filtering
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
CONTENTS  INTRODUCTION.  KEYWORDS  WHAT IS FIREWALL ?  WHY WE NEED FIREWALL ?  WHY NOT OTHER SECURITY MECHANISM ?  HOW FIREWALL WORKS ?  WHAT IT.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Module 10: How Middleboxes Impact Performance
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Lesson 11: Configuring and Maintaining Network Security
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Module 10: Windows Firewall and Caching Fundamentals.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
TCP/IP Protocol Suite ©Richard L. Goldman September 25, 2002.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Defining Network Infrastructure and Network Security Lesson 8.
Introduction to Firewalls
CompTIA Security+ Study Guide (SY0-401)
Firewall Techniques Matt Cupp.
Network Security Marshall Leitem 11/30/04
CompTIA Security+ Study Guide (SY0-401)
IIS.
Network Security: IP Spoofing and Firewall
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Jiang Long Spring 2002.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Presentation transcript:

_IT Security and Intellectual Property Summer 2006 Bashar Al Takrouri Personal Firewalls “Case study ::ZoneAlarm Security Suite” Instructor: Prof. Dr. Peter Rossbach

*source: “February 10th, 2006 ”

What is firewall Firewall is a piece of hardware and/or software which functions in a network environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction. The ultimate goal is: providing safe and controlled connectivity between zones of differing trust levels through the enforcement of a security policy and connectivity model. Usually, the internet (a zone with no trust) and an internal network (a zone with high trust).

Firewall techniques Usually, multiple techniques are used to enhance the security level. The main techniques are: Packet filter: test each packet entering or leaving the network. It is typically done in a router. Adv. Fairly effective and transparent to users. Dis. It is difficult to configure. It is susceptible to IP spoofing.

Firewall techniques Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. Adv. It is very effective. Dis. Can impose performance degradation. Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Proxy server: Intercepts all messages entering and leaving the network. Adv. Hides the true network addresses. [1][2][1][2]

Firewall techniques Stateful Inspection Compares certain key parts of the packet to a database of trusted information. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics, and then incoming information is compared to these characteristics. [3][3] Network Address Translation (NAT) Allows one IP address, which is shown to the outside world, to refer to many IP addresses internally; one on each client station.[4][4]

Firewalls are customizable Add or remove filters based on several conditions: IP Address Domain names Protocols – allow and block different protocols such as: IP (internet protocol) TCP (transmission control protocol) HTTP (Hyper Text Transfer Protocol) FTP (File Transfer Protocol) UDP (User Datagram Protocol) ICMP (Internet Control Message Protocol) SMTP (Simple Mail Transport Protocol) SNMP (Simple Network Management Protocol) Telnet

Firewall techniques [5]

Firewalls are customizable Ports Any server machine makes its services available to the Internet using numbered ports, one for each service that is available on the server. For example, if a server machine is running a Web (HTTP) server and an FTP server, the Web server would typically be available on port 80, and the FTP server would be available on port 21. A company might block port 21 access on all machines but one inside the company. [6] [6]

What does a basic PC firewall not do? A PC firewall can't detect or remove computer viruses and worms if they're already on your computer. Basic PC firewall can't clean up your computer after a virus attack; block phishing s, spam, and pop-up ads; filter inappropriate or dangerous Web content; or shield IM users from spammers, thieves, and predators. For complete protection beyond what a basic PC firewall provides, you need an integrated Internet security suite.[7][7]

Advanced protection PC firewalls Dynamic firewalls Dynamic PC firewall automatically opens your computer's door to the Internet when needed, allows only authorized traffic through, then immediately shuts the door. Outbound and inbound protection Many basic PC firewalls only protect your PC from unauthorized inbound communications. Some PC firewalls, protect your PC from unauthorized inbound as well as outbound communications. The transmission of your private data to the hacker would be an unauthorized outbound communication. [8][8]

Advanced protection PC firewalls Remote login Application backdoors SMTP session hijacking Operating system bugs Denial of service bombs Macros Viruses Spam Redirect bombs Source routing

Case study ZoneAlarm Security Suite

Advanced protection PC firewalls Basic configuration Configuring program access permissions: Zone Labs security software can configure many of the most popular programs. Joining the DefenseNet community By joining DaefenseNet, you can help us focus our attention on the features and services that you use most often and to introduce new functionality that will provide even smarter security. The frequency of data transmission depends upon the configuration of your computer. For most users, data will be sent once per day.

Screenshot

Firewall configuration Adjusting the security levels High security setting: High security places your computer in stealth mode. Making it invisible to hackers. High security is the default configuration Internet Zone. ( file and printer sharing is disabled; but outgoing DNS, outgoing DHCP, and broadcast/multicast are allowed, so that you are able to browse the Internet. ) Medium security setting: component learning mode based on the MD5 signatures. Medium security is the default setting for the Trusted Zone. (File and printer sharing is enabled, and all ports and protocols are allowed. Icoming NetBIOS traffic is blocked. This protects your computer from possible attacks no stealth mode.) Firewall configuration

Setting general security options Block all fragmentsBlocks all incomplete (fragmented) IP data packets. Hackers sometimes create fragmented packets to bypass or disrupt network devices that read packet headers. Block trusted serversPrevents all programs on your computer from acting as servers to the Trusted Zone. Note that this setting overrides permissions granted in the Programs panel. Block Internet serversPrevents all programs on your computer from acting as servers to the Internet Zone. Note that this setting overrides permissions granted in the Programs panel. Enable ARP protectionBlocks all incoming ARP (Address Resolution Protocol) requests except broadcast requests for the address of the target computer. Also blocks all incoming ARP replies except those in response to outgoing ARP requests. Allow VPN ProtocolsAllows the use of VPN protocols (ESP, AH, GRE, SKIP) even when High security is applied. With this option disabled, these protocols are allowed only at Medium security. Allow uncommon protocols at high security Allows the use of protocols other than ESP, AH, GRE, and SKIP, at High security. Lock hosts filePrevents your computer's hosts file from being modified by hackers through sprayer or Trojan horses. Because some legitimate programs need to modify your hosts file in order to function, this option is turned off by default.

Firewall configuration You can allow communication through additional ports at High security, or block additional ports at Medium security by specifying individual port numbers or port ranges. Adding custom ports

Firewall configuration The programs list provides an overview of the programs on your computer that have tried to access the Internet or the local network. The SmartDefense Advisor and Trust Level columns indicate OSFirewall Protection for your computer and specify whether a program is allowed to perform operating system-level actions like changing TCP/IP parameters, loading or installing drivers, or changing your browser's default settings. Using the programs list

Firewall configuration Using the programs list

Firewall configuration The Components List contains a list of program components for allowed programs that have tried to access the Internet or the local network. Managing program components

Firewall configuration _enD

Firewall techniques [1][1] accessed by ( ) [2][2] accessed by ( ) [3][3] accessed by ( ) [4][4] accessed by ( ) [4][4] accessed by ( ) [5] accessed by ( ) [6] [7] rewall[7] rewall accessed by ( ) [8] rewall[8] rewall accessed by ( ) accessed by ( )