PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA.

Slides:



Advertisements
Similar presentations
Ljubomir Ivaniš CPU d.o.o.
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Chapter 12 Network Security.
Security at the Operating System Level (Microsoft) By Birinder Dhillon.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
outline Purpose Design Implementation Market Conclusion presentation Outline.
Towards Application Security On Untrusted OS
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Security in the industry H/W & S/W What is AMD’s ”enhanced virus protection” all about? What’s coming next? Presented by: Micha Moffie.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
April 2000Dr Milan Simic1 Network Operating Systems Windows NT.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Security Jiuqin Wang June, 2000 Security & Operating system To protect the system, we must take security measures at two levels: Physical level:
Module 9: Fundamentals of Securing Network Communication.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Three Jobs of a Computer 1. Input 2. Processing 3. Output.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
TULSIRAMJI GAIKWAD-PATIL C OLLEGE OF E NGG. & T ECH. Seminar on “Palladium Cryptography” Presented by Amit S. Wankhade Guided by HoD Prof. Department of.
BY S.S.SUDHEER VARMA (13NT1D5816)
Information Security, Theory and Practice.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Cryptography And Network Security
Chapter 17 Risks, Security and Disaster Recovery
VCE Dumps
Systems Design Chapter 6.
Install AD Certificate Services
Erica Burch Jesse Forrest
Presentation transcript:

PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA

“SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”. Various antidotes that are in fact inextricable with security issues are: – Cryptography Authentication Integrity Non Repudiation Key Distribution and certification Access control by implementing Firewalls

In network security more and more advanced security notions are being devised day by day. THE DMZ ZONE PALLADIUM CRYPTOGRAPHY IP Sec KERBEROS AUTHENTICATION SYSTEM. 1.PALLADIUM :- Palladium is the code name for a revolutionary set of “features” for the “windows” operating system Palladium can be touted as the first technology to develop software- hardware synchronization for better data security

CORE PRINCIPLES OF PALLADIUM INITIATIVE Palladium is not a separate operating system. It is based in architectural enhancements to the windows kernel and to computer hardware, including the CPU, peripherals and chipsets, to create a new trusted execution subsystem. ASPECTS OF PALLADIUM Palladium comprises two key components: They are Hardware components &Software components Hardware components:- 1. SEALED STORAGE 2. TRUSTED SPACE 3. SECURE INPUT& OUTPUT 4. ATTESTATION

SOFTWARE COMPONENTS NEXUS TRUSTED AGENTS WORKING OF PALLADIUM:- Palladium is a new hardware and software architecture. This architecture will include a new security computing chip and design changes to a computer’s central processing unit chipsets, and peripheral devices, such as keyboards and printers. PROTECTION USING PALLADIUM:- Palladium prevents identity theft and unauthorized access to personal data on the user’s device while on the internet and on other networks.

CASE STUDY Restructuring data security of JNTU examination system using palladium Existing system The EDEP employs the method of public keycryptography Palladium-as a solution : Palladium is based on the concept of trusted space. A closed sphere of trust binds data or a service, to both a set of users and to a set of acceptable applications. Due to this an unauthorized user cannot access the data or software which is based on a server.

2. KERBEROS AUTHENTICATION This authentication service uses symmetric key encryption service and a key distribution center. A key is used to encrypt and decrypt short messages. Keys provide the basis for the authentication in Kerberos. In Kerberos, at the present time, the encryption key and the decryption key are identical.

FIREWALLS AN EXAMPLE FIREWALL- “A PROXY SERVER”: A proxy server basically acts as a shield by protecting your IP address form getting into malicious hands. OUR SYS.PROXY SERVERREMOTESYSTEM

A NOVEL APPROACH TO THE FIREWALLS: “DMZ”

IP SEC IP Sec ensures confidentiality, integrity, authenticity of data communications across a public IP network.

Figure (b): Network-Layer Encryption

DENOUMENT: The capability of security enabled components still lags behind the claims. This was quite evident from the E-attacks on BARC server & post-September11th cyber attacks on FBI sites where even sophisticated surveillance systems couldn’t come to their rescue.

REFERENCES: Digit magazine, Topics- 1 & 2. Microsoft Press Pass, Topics- 3 & 4. J.N.T.U website Case study.