The Security Aspect of Social Engineering Justin Steele.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 9: Firewalls and Intrusion Prevention.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Kittiphan Techakittiroj (21/05/58 10:00 น. 21/05/58 10:00 น. 21/05/58 10:00 น.) Firewall Kittiphan Techakittiroj
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Security Firewall Firewall design principle. Firewall Characteristics.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewalls and Intrusion Detection Systems
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Stephen S. Yau 1CSE , Fall 2006 Firewalls.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewall Slides by John Rouda
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
FIREWALL Mạng máy tính nâng cao-V1.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 11 Firewalls.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
Firewalls, etc.. Network Security2 Outline Intro Various firewall technologies: –Static Packet Filtering (or nonstateful packet filter) –Dynamic Packet.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Chapter 20 – Firewalls The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
Bishop: Chapter 26 Network Security Based on notes by Prashanth Reddy Pasham.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
7.4 Firewalls Network Security / G.Steffen1. In This Section What is a Firewall? Types of Firewall Comparison of Firewalls Types What Firewall Can-and.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Firewall C. Edward Chow CS691 – Chapter 26.3 of Matt Bishop Linux Iptables Tutorial by Oskar Andreasson.
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Cryptography and Network Security
Computer Security Firewalls and Intrusion Prevention Systems.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Firewall.
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
* Essential Network Security Book Slides.
Chapter 26: Network Security
Firewalls Purpose of a Firewall Characteristic of a firewall
POOJA Programmer, CSE Department
دیواره ی آتش.
Firewalls.
Presentation transcript:

The Security Aspect of Social Engineering Justin Steele

Firewalls

Definitions Firewall - “a host that mediates access to a network, allowing and disallowing certain types of access on the basis of a configured security policy.” Firewall - “a host that mediates access to a network, allowing and disallowing certain types of access on the basis of a configured security policy.” DMZ – “a portion of the network separates a purely internal network from an external network.” DMZ – “a portion of the network separates a purely internal network from an external network.” Proxy – “an intermediate agent or server that acts on behalf of an endpoint without allowing a direct connection between the two endpoints.” Proxy – “an intermediate agent or server that acts on behalf of an endpoint without allowing a direct connection between the two endpoints.” Bastion Host – “a system identified as a critical strong point in the network’s security.” Bastion Host – “a system identified as a critical strong point in the network’s security.”

Design Goals All traffic between the internal and external network must go through the firewall. All traffic between the internal and external network must go through the firewall. Only authorized traffic is allowed to pass through. Only authorized traffic is allowed to pass through. The firewall itself is immune to penetration. The firewall itself is immune to penetration. Small and simple enough for rigorous analysis Small and simple enough for rigorous analysis

Control Techniques Service Control – determines the types of services allowed. Service Control – determines the types of services allowed. Direction Control – determines the direction in which services may be initiated. Direction Control – determines the direction in which services may be initiated. User Control – determines which activities are allowed based on the user. User Control – determines which activities are allowed based on the user. Behavior Control – determines how services are used. Behavior Control – determines how services are used.

Types of Firewalls Filtering Firewall – performs access control based packet header attributes, such as destination and source addresses, ports, and other various options. (Routers) Filtering Firewall – performs access control based packet header attributes, such as destination and source addresses, ports, and other various options. (Routers) Protects against IP address spoofing, source routing attacks, and tiny fragment attacks. Protects against IP address spoofing, source routing attacks, and tiny fragment attacks. Stateful Inspection Firewall – tightens security by keeping track of outbound connections. Only allows incoming traffic to high-numbered ports for packets that conform to the entries in the directory. Stateful Inspection Firewall – tightens security by keeping track of outbound connections. Only allows incoming traffic to high-numbered ports for packets that conform to the entries in the directory.

Types of Firewalls Continued Proxy Firewall – uses proxies to perform access control. This type of firewall can base control on the contents of packets and messages, as well as on attributes of the packet headers. (Application Proxy, Application-Level Gateway, Guard) Proxy Firewall – uses proxies to perform access control. This type of firewall can base control on the contents of packets and messages, as well as on attributes of the packet headers. (Application Proxy, Application-Level Gateway, Guard) Circuit-Level Gateway – Like a proxy firewall, but once connections are established it does not examine contents. Just determines what connections are allowed. Circuit-Level Gateway – Like a proxy firewall, but once connections are established it does not examine contents. Just determines what connections are allowed. Personal Firewall – application that runs on workstations to block unwanted traffic. Personal Firewall – application that runs on workstations to block unwanted traffic.

Limitations A firewall can not protect against attacks that bypass the firewall. A firewall can not protect against attacks that bypass the firewall. A firewall does not protect against internal threats. A firewall does not protect against internal threats. The firewall does not protect against virus- infected files. The firewall does not protect against virus- infected files.

Network Setups

How a Firewall Can Protect Against a SYN Flood Intermediate Hosts Intermediate Hosts The SYN Flood is handled before it reaches the firewall. The SYN Flood is handled before it reaches the firewall. Examples - Cisco Routers and Synkill Examples - Cisco Routers and Synkill TCP State and Memory Allocations TCP State and Memory Allocations Make availability of space more likely. Make availability of space more likely. Examples – SYN Cookies and adaptive time-out Examples – SYN Cookies and adaptive time-out

References Bishop, M. (2003). Computer Security, Art and Science. Boston: Addison Wesley. Bishop, M. (2003). Computer Security, Art and Science. Boston: Addison Wesley. Campus Firewall, Frequently Asked Questions. Retrieved March 30 th, 2003, from Campus Firewall, Frequently Asked Questions. Retrieved March 30 th, 2003, from Pfleeger, C., & Pfleeger, S. (2003). Security in Computing. New Jersey: Prentice Hall. Pfleeger, C., & Pfleeger, S. (2003). Security in Computing. New Jersey: Prentice Hall. Stallings, W. (2003). Network Security Essentials, Applications and Standards. New Jersey: Prentice Hall. Stallings, W. (2003). Network Security Essentials, Applications and Standards. New Jersey: Prentice Hall.