Presentation is loading. Please wait.

Presentation is loading. Please wait.

Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer.

Similar presentations


Presentation on theme: "Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer."— Presentation transcript:

1 Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer By, By, Adil Siddiqui Adil Siddiqui

2 Firewalls What is a Firewall? General Definition : - It prevents unauthorized access into your computer. General Definition : - It prevents unauthorized access into your computer. Technical Definition : - It is the combination product that provide the function of screening routers, proxy servers, network address translation, plus stateful inspection. Technical Definition : - It is the combination product that provide the function of screening routers, proxy servers, network address translation, plus stateful inspection.

3 Firewalls Advantages of Firewalls : - More secure environment then can be achieved through simple packet filtering. More secure environment then can be achieved through simple packet filtering. This method prevents rogue processes from establishing unauthorized network connections. This method prevents rogue processes from establishing unauthorized network connections. It prevents someone from utilizing a port inadvertently left open or unguarded for attacking the system. It prevents someone from utilizing a port inadvertently left open or unguarded for attacking the system. Firewalls can also hide servers, examine contents, and rewrite packets. Firewalls can also hide servers, examine contents, and rewrite packets.

4 Firewalls Disadvantages of Firewalls : - Firewalls are expensive Firewalls are expensive Need to be replicated at every entrance to the network. Need to be replicated at every entrance to the network. Require significant scripting and configuration management to maximize their effectiveness. Require significant scripting and configuration management to maximize their effectiveness.

5 Virtual Private Networks What is a VPN ? VPN are a significant advantage in recent technology. They provide secure and cost effective networking. VPN are a significant advantage in recent technology. They provide secure and cost effective networking. The VPN utilize a technology known as private tunneling to provide a secure pathway over a public network. The VPN utilize a technology known as private tunneling to provide a secure pathway over a public network.

6 Virtual Private Networks Two Modes of VPN Transport Mode : - Uses encryption on the data part of the packet only. Transport Mode : - Uses encryption on the data part of the packet only. Tunnel Mode : - Everything gets encrypted (headers and information sections of the packet) Tunnel Mode : - Everything gets encrypted (headers and information sections of the packet)

7 Two Modes of VPN

8 Virtual Private Networks VPN can be deployed in three ways : VPN can be deployed in three ways : Host to host Host to host Site-to-Site Site-to-Site Host-to-Site Host-to-Site

9 Possible Configurations of VPN

10 Virtual Private Networks Drawbacks : - During a VPN session while all the traffic in the tunnel is considered secure, Trojans can become dangerous. During a VPN session while all the traffic in the tunnel is considered secure, Trojans can become dangerous. Key Management issues arise with increase of the tunnels. Key Management issues arise with increase of the tunnels.

11 Secure Socket Layer What is an SSL ? SSL was originally developed by Netscape to provide secure communications between Web clients and servers. SSL was originally developed by Netscape to provide secure communications between Web clients and servers. It has grown to take on a prominent role in secure commications for Web transactions, FTP exchanges, and secure e-mail. It has grown to take on a prominent role in secure commications for Web transactions, FTP exchanges, and secure e-mail.

12 Secure Socket Layer The cryptographic technique is complex. The cryptographic technique is complex. The majority of that complexity is found in the establishment procedure. The majority of that complexity is found in the establishment procedure.

13 SSL Handshake

14 Secure Socket Layer SSL provides a trusted relationship built on a temporary basis with no prior knowledge of the recipient necessary. SSL provides a trusted relationship built on a temporary basis with no prior knowledge of the recipient necessary.

15 Question? What are the two modes of VPN that can be deployed? Transport Mode Transport Mode Tunnel Mode Tunnel Mode


Download ppt "Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer."

Similar presentations


Ads by Google