CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Presented by: Carl Skeene. OUTLINE Motivation Introduction Problem statement Assumption Proposed solution Results Conclusion Future work References Acknowledgements.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Computer Networks IGCSE ICT Section 4.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
PI : TV A PI MEDIA CENTER Michael Hoskins Network Security & Electronics Program, Dept. of Applied Engineering & Technology, Eastern Kentucky University.
Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran.
Stephen Riddle (EKU, Dept. of Technology, NET program) Presented by: Stephen Riddle.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Virtual Company Group 8 Presentation Date: June /04/2017
Microcontroller Based Wireless Camera Security System John Saylor Computer Electronic Networking.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 7: Using Windows Servers to Share Information.
Chapter 1 Intro to Routing & Switching.  Networks have changed how we communicate  Everyone can connect & share  How have networks changed the way…
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
SET UP A SOHO SERVER AND NETWORK: THE BASICS Tony Hancock (NET 2012 Capstone. EKU) Presented by: Tony Hancock.
Exploring the Network.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
Solutions for BDMHS  JF&C is a highly qualified company that performs a wide variety if technical services in the Chicago land area to business, government.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Section 4 – Computer Networks Setting up a small network.
Introduction to Information and Computer Science Basic Computing Concepts Including History Lecture c This material (Comp4_Unit1c) was developed by Oregon.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
NETWORK OPERATING SYSTEM INTEROPERABILITY Jason Looney EKU, Department of Technology, CEN.
Networking Components
Virtualizing the Network there is no spoon Peninsula Users Group October 25 rd, 2007.
SECURING YOUR HOME AND HOME NETWORK Ryan Lewis Eastern Kentucky University Network Security & Electronics Spring 2015 Capstone.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
By: Jordan Hightower This Case is the "box" or "chassis" that holds and encloses the many parts of your computer. Its purpose is to protect them from.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
MY NETWORK TAP Richard Elswick Easter Kentucky University.
Home Security Cameras Emmanuel Payton EKU Dept of Technology CEN/CET.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Raspberry Pi Garage Door Mark Barron NET 499 Eastern Kentucky University.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Why is my computer so slow? Find Reason and How You can Speed up Your Computer.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
TECHNOLOGY RESOURCE MANAGEMENT PORTAL Casey Spires Eastern Kentucky University.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
HOW TO GUIDE: INEXPENSIVE INTERNET PROTOCOL TELEPHONY SOLUTION Created by: Cameron Adkisson Eastern Kentucky University
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Network System Security - Task 2. Russell Johnston.
CONNECTING TO THE INTERNET
Cat Litter Box Ventilation System
Wireless Network Security
Welcome To : Group 1 VC Presentation
Computer System Basics- The Pieces & Parts
LINKSYS SUPPORT NUMBER. Linksys Support Number for upgrading firewall, Installation and Repair and Connecting Device and Fix Error Messages by Linksys.
Packet® Icon Library Current as of February 14, 2002.
Presentation transcript:

CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET

2 OUTLINE Motivation: building a resume, expanding my skills Introduction to problem and research on the topic Problem statement: needs network and there is no security. Also computer is slow and older. Assumptions: on how the network will work and how the users will use it. Solution: upgrade PC and install a secure network

3 OUTLINE (CONT.) Results: full operating secure network with net filtering or proxy server and upgrade computer. Conclusions: importance of knowing how a network operates with a untangle server and that it isn’t so simple to upgrade a computer. Future work: figure out how to enable a router instead of a switch for wireless users. references and acknowledgements

4 MOTIVATION This issue is important because most places that I will be working will need a network, security, and have computer issues.

5 MOTIVATION CONT. Doing this will progress my skills and being able to expand my resume I have never got the opportunity to manage a network this extensively before

6 INTRODUCTION Linksys WRT54G2 router is what I have to work with. It is made by Cisco and costs 40 dollars according to Newegg.com the router also has wireless capabilities the upgrades consist of 8 GBs G-skill DDR2 800 MHz RAM and a Seagate terabyte 3.5 inch hard drive I will use security in the router to protect from unwanted users.

7 INTRODUCTION Linksys Cisco 5-port workgroup switch Untangle is a firewall by definition but it has the capability of a proxy server plus a lot more. Untangle applications include anti-spam, content filtering, antivirus, anti-phishing, anti-spyware, intrusion prevention, firewall, Open VPN, router, and web cache software. Untangle is also an open source software.

8 PROBLEM STATEMENT The problem I am trying to solve is a household has internet connection but has no way to connect all the devices in their house. They have only one modem outlet.

PROBLEM STATEMENT CONT. Also the father doesn't want his son or daughter to visit certain sites on the web. As well as being secure from outside web attacks. Lastly the father has a good computer that is four years old and wants to upgrade instead of buying a new one. 9

PROBLEM STATEMENT CONT. The computer needs more speed but doesn't need a new processor and also needs more storage space because they are constantly having to delete items from there hard drive to make room. Sub-problem: they have a switch and router but don’t know how to use it. 10

11 ASSUMPTIONS Network Has to support a family of three. Untangle needs to block restricted web sites. The father needs to be taught how to upgrade a computer and manage Untangle. The router needs to be secure

12 PROPOSED SOLUTION 1. Upgrade PC with RAM and an additional hard drive to fix the speed and storage issues. 2. Create a network for the household through router 3. Secure the router by using the router IP address ( ) 4. Install an Untangle box for more security and use the web filter application to block certain websites

PROPOSED SOLUTION 13

RESULTS IMAGES 14

RESULTS IMAGES 15

RESULTS IMAGES 16

RESULTS IMAGES 17

RESULTS IMAGES 18

RESULTS IMAGES 19

RESULTS IMAGES 20

RESULTS IMAGES 21

RESULTS IMAGES 22

RESULTS IMAGES 23

RESULTS IMAGES 24

COMPUTER UPGRADE RESULT VIDEO #2 25

COMPUTER UPGRADE RESULT VIDEO #2 26

UNTANGLE NETWORK RESULT VIDEO 27

RESULTS IMAGES 28

29 RESULTS 1. The family has a secure network and each family member is connected to the internet. 2. The son and daughter cannot access categorized sites and YouTube.com as well as not being able to download music and video files illegally 3. The fathers computer is faster than when it came out of the box and has plenty of storage.

30 CONCLUSIONS I first thought that this would be a little challenging for me. Then I found out how wrong I was. It was extremely challenging when it came to unexpected errors or obstacles. I learned a lot about Untangle and how well it works with the security aspect of a network.

31 FUTURE WORK I could plan to expand this project by figuring out how to use a router instead of a switch before untangle, so that wireless access can be secure as well. I could also raid the second hard drive instead of just using it as extra storage.

REFERENCES Ciscorouterswitch. (2011, March 25). [Web log message]. Retrieved from router html Steers, K. (2007, February 27). How to upgrade your pc's ram. Retrieved from Upgrading Your PC: What Do I Get? (Cover story). (2005). PC Magazine, 24(4), eHow Contributing Presenter. (2008). How to install a second hard drive [Web]. Retrieved from Fleishman, G. (2009). Securing the home network. Macworld, 26(7), Polenin, M. (2011, June 04). How to use untangle as a proxy. Retrieved from 32

ACKNOWLEDGEMENTS I want Acknowledge Professor Chandra and Professor Kilgore for all the help and guidance that they have given me in my college career I got the XPS 420 image on slide 13 from this site: revealed/ I got the “JOBS” picture from this site: separation-2/ I would also like to acknowledge Stephen Riddle for holding the camera as I did my videos and being a great team member Also Ryne Purcel was a great team member as well when I needed some information that I didn’t have. 33

QUESTIONS Thank you for your time Does anyone have any questions? Contact Information: Zachary Craig Phone: (859)