Understand Internet Security LESSON 1.3 98-367 Security Fundamentals.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Module 5: Configuring Access for Remote Clients and Networks.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.
Guide to Network Defense and Countermeasures Second Edition
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Chapter 20: Network Security Business Data Communications, 4e.
Remote Networking Architectures
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Web Server Administration Chapter 10 Securing the Web Environment.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
Team 6 Decrypting Encryption Jeffrey Vordick, Charles Sheefel, and Shyam Rasaily.
Chapter 14 Network Encryption
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
IPSecurity.
Virtual Private Networks
Virtual Private Networks
UNIT.4 IP Security.
Virtual Private Networks (VPN)
Security Protocols in the Internet
IS 4506 Server Configuration (HTTP Server)
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Unit 8 Network Security.
Virtual Private Networks (VPN)
Presentation transcript:

Understand Internet Security LESSON Security Fundamentals

LESSON 1.3 Lesson Overview We will discuss the importance of Web Security. In this lesson, you will learn:  Web browser settings  Secure zones  Secure websites

Security Fundamentals LESSON 1.3 Anticipatory Set  Searching the Internet, find at least 5 different websites that are secure sites. How do you determine which are secure and which aren’t?

Security Fundamentals LESSON 1.3 Security Zones  Internet Zone o This zone contains websites that are not on your computer or on your local intranet, or that are not already assigned to another zone. The default security level is medium.

Security Fundamentals LESSON 1.3  Local Intranet Zone o By default, the Local Intranet zone contains all network connections that were established by using a universal naming convention (UNC) path, and websites that bypass the proxy server or have names that do not include periods (for example, as long as they are not assigned to either the Restricted Sites or Trusted Sites zone. o The default security level for the Local Intranet zone is set to Medium (Internet Explorer ® 4) or Medium-low (Internet Explorer 5 and 6).

Security Fundamentals LESSON 1.3  Trusted Sites Zone o This zone contains websites that you trust as safe (such as websites that are on your organization's intranet or that come from established companies in whom you have confidence). o When you add a website to the Trusted Sites zone, you believe that files you download or that you run from the website will not damage your computer or data. o By default, there are no websites that are assigned to the Trusted Sites zone, and the security level is set to Low.

Security Fundamentals LESSON 1.3  Restricted Sites Zone o This zone contains websites that you do not trust. When you add a website to the Restricted Sites zone, you believe that files that you download or run from the website may damage your computer or your data. By default, there are no websites that are assigned to the Restricted Sites zone, and the security level is set to High. The Restricted Sites zone contains websites that are not on your computer or on your local intranet, or that are not already assigned to another zone. The default security level is Medium.

Security Fundamentals LESSON 1.3 Assignment Identify types of Windows ® secure point-to-point communications  SSH – Secure Shell (SSH) Sometimes known as Secure Socket Shell, is a Unix-based command interface and protocol for getting secure access to a remote computer. It is widely used by network administrators to control Web and other kinds of servers remotely.  IPSec – Short for Internet Protocol Security A security mechanism under development by the IETF (Internet Engineering Task Force) designed to ensure secure packet exchanges at the IP (Internet protocol) layer. IPSec is based on two levels of security: AH (authentication header), which authenticates the sender and assures the recipient that the information has not been altered during transmission, and ESP (encapsulating security protocol), which provides data encryption in addition to authentication and integrity assurance.

Security Fundamentals LESSON 1.3  SSL/TLS – Secure Sockets Layer A protocol developed by Netscape Communications Corporation for ensuring security and privacy in Internet communications. SSL supports authentication of client, server, or both, as well as encryption during a communications session. While the primary purpose of SSL is to enable secure electronic financial transactions on the World Wide Web, it is designed to work with other Internet services as well. This technology, which uses public key encryption, is incorporated into the Netscape Navigator Web browser and Netscape’s commerce servers.

Security Fundamentals LESSON 1.3 Additional topics to think about …  Secure communications  security  E-commerce security  Virtual private network  Browser cookies How do these topics relate to one another?