Size: px
Start display at page:

Download "http://www.isaca.org/template.cfm?template=/contentmanagement/contentdisplay.cfm&contentid=..."

Transcription

1 Página 1 de 8 Search Home About ISACA Overview & History Certification Education & Conferences Standards Research Publications Chapters Membership Languages Information Systems Audit and Control Association InfoBytes Intranet Security By Lisa Lin Many organizations have already found that Intranets can help empower personnel through more timely and less costly information flow. The empowerment bolsters the company's competitive advantage, improves employee moral and assists in getting more timely information to customers and providers. Why Intranet Security? Let's first define what is Intranet. "An Intranet is an internal information system based on Internet technology, web services, TCP/IP and HTTP communication protocols and HTML publishing" (Hinrichs, 1997). The Intranet is a technology that allows an organization to define itself as a whole entity, a group, where everyone knows their roles, and everyone is working on the improvement and health of the organization. Intranet Security Policy: Security is a means to protect information no matter where it is resides or travels on the Intranet. Some of the elements that go into security are the following:! Integrity: Is the data received exactly what was sent?! Reliability: No matter when it was sent or received, can you rely upon the integrity of the data?! Availability: Can you access the data reliably whenever you need it?! Security: Can you be certain that the data is protected from unauthorized access? Security is critical within a private corporate network. According to a majority of computer security statistics, over 80 percent of all computer related fraud is committed by internal users. Insiders could have a motive to strike against a company and often have direct physical access to the computer as well as familiarity of the resource access controls. In order to protect the organization's information from threats, it must strengthen the network security policy. Planning: The first objective for an organization is to develop a network policy. The policy is a document that describes an organization's network security concerns. This document becomes the first step in building effective firewalls. Some of the issues that an organization should explore in designing a policy include overall network security planning, site security policy, approach to security policy and risk analysis. Network security planning: A network security is worth implementing if the resources and information that an organization has on its networks are worth protecting. The next step is to properly identify network security problems prior to implementing firewall solutions and define what types of Internetwork services and resources the organization will allow the users to access and which ones have to be restricted because of security risks. Making the network policy will not impair the functioning of the organization. A network security policy that prevents network users from effectively implementing their tasks can have unwanted consequences: network users may find means of bypassing the network policy, rendering it

2 Página 2 de 8 ineffective. An effective network security policy is one that all network users and network administrators can accept and are able to enforce. Site Security Policy: An organization with multiple sites with each site having its own networks and different goals and objectives may have their own network security policies. However, the network policy should encompass the goals of all the interconnected sites. This is an important point because it is possible to come up with a network security policy that safeguards the site's interests but can become harmful to others. The site security policy should take into account the protection of their resources, such as the following:! "Workstations! Host computers and servers! Interconnection devices: gateways, routers, bridges, repeater! Terminal servers! Networking and applications software! Network cables! Information in files and databases" (Siyan, pp ) Approach to Security Policy: Defining the network security policy means developing procedures and plans that safeguard the organization's network resources against loss and damage. A possible approach to developing this policy is to examine the following:! "What resources are the organization trying to protect?! Which people does the organization need to protect the resources from?! How likely are the threats?! How important is the resource?! What measures can the organization implement to protect the assets in a cost-effective and timely manner?! Periodically examine of the network security policy to see if the organization objectives and network circumstances have changed" (Siyan, pp ) The cost of protecting the organization's network against threats should be less than the cost of recovery should the organization be affected by the security threats. It's important to obtain the right type of people in the design of the network security policy. The group could include those that are involved with auditing/control, campus information systems groups, and the individuals who deal with physical security. In order to have universal support of the network security policy, the organization must have the group's cooperation and acceptance of the network security policy. Risk Analysis: Risk assessment is one of the most important critical and overlooked tasks in security. The organization needs to know what they have and what its worth is to really understand how to protect it. Risk assessment needs to be conducted before right-sizing a computing environment or moving systems to a new platform. Management needs to identify the risk and take steps to ensure the privacy of the organization's data. Some of the steps to ensure the privacy of the data are better access control, auditing, intrusion detection and encryption of the systems. Intranet Security Techniques Encryption: One technique used in protecting sensitive information such as password, user ID, and human resource files, is encryption. "Encryption is a technique of creating unintelligible information from intelligible information" (Gallegos, pg. 12). The same technique is use to convert cleartext to ciphertext. The algorithm uses a "key" to create the mathematical equation to start producing the ciphertext. This key also must be given to the program that will decipher the text. In order for encryption to work, "the passage of the key and the algorithm must be kept secret. Programs must not be hard-coded with the key, nor should the key be written down. The key and the algorithm are often encrypted or written in machine language to prevent the casual user from intercepting code messages" (Gallegos, pg. 12). If encryption is used widely within an organization, the public key system should be used. The public

3 Página 3 de 8 key system requires that the sender create the ciphertext on the basis of the receiver's public key. The receiver will deciper the information using their private key. This system will eliminate the passing of the key, which can threaten its secrecy. (Gallegos, pp ). Authentication: Authentication means establishing proof of identity between two or more entities. This statement raises some obvious questions: The identity of whom or what requires proving? To whom or what is the evidence made known? How is authentication accomplished, and for what purpose? There are three categories of authentication used when computing and communicating on the Intranet: User-to- Host, Host-to-Host and User-to-User. User-to-Host Authentication: User-to-host authentication schemes identify users to computer systems. The purpose of this type of authentication is to provide users with services for which they are authorized and to deny access to services for which they are not. There are a variety of user-to-host authentication schemes. The following are three example authentication schemes: static passwords, one-time passwords and trusted third parties. Static passwords scheme is when a user chooses or is assigned an account name and an associated password. In this scheme, after the user enters the password, the host then confirms that the password entered by the user is correct. One-time passwords scheme uses passwords that are used only one time to establish authentication, and are therefore not subject to snooping and replay attacks. The three popular one-time password mechanisms are Bellcors's S/KEY, handheld authenticators and smart cards. Bellcor's S/KEY provides secure password-based authenticators over unsecure networks. S/KEY achieves this by utilizing a user's secret password to algorithmically produce a sequence of passwords, each of which may be used exactly one time. As with standard Unix passwords, no ontime S/KEY passwords are stored in cleartext on the server system. Secret passwords always remain a secret to their owners, and unlike standard Unix passwords, are never transmitted over the network except through personal carelessness. Handheld authenticators, also known as handheld password generators or tokens, are small hardware devices that generate one-time passwords. There are primarily four overall types of handheld authenticators, which are asynchronous, PIN/Asynchronous, synchronous and PIN/synchronous. Asynchronous is a challenge-response scheme, whereby the host issues a challenge string that the user keys into the authenticator. The response appears on the authenticator's display, which the user then enters to the host. PIN/Asynchronous is the same as asynchronous, but with an added requirement that the user first keys in a personal identification number (PIN). The PIN acts as a password to the authenticator, not to the host. Unlike asynchronous, in synchronous the authenticator produces a password as a function of its internal clock at the time the user demands it. This authenticator does not involve the host challenges. PIN/synchronous is identical to synchronous, but first requires the user to enter a PIN. All the schemes mentioned above require that both the authenticator and the host know a common algorithm for computing the one-time passwords. The algorithm is either industry standard or proprietary, depending on the vendor's implementation. Smart cards are similar in purpose to handheld authenticators, but are more intelligent devices: they contain a CPU, miniature operating system, clock, some program ROM, scratchpad RAM for cryptographic calculations and nonvolatile RAM or EEPROM (electrically erasable programmable read-only memory) for key storage. One aspect of their operation is analogous to handheld authenticators in that they calculate one-time passwords in response to a host challenge. Smart cards communicate directly with the challenging entity through a smart card reader. After the PIN is entered, the reader processes the challenge, enabling authentication to occur without further human involvement. This automatic function coupled with onboard key storage makes the use of lengthy keys possible with no added inconvenience to the user. In trusted third party technique, the host does not have to rely solely on credentials supplied by the user or a device in his possession. Nor does the user have to entrust the host with secret information

4 Página 4 de 8 such as a password. Instead, both parties reply on a third entity, called a Key Distribution Center (KDC), to vouch for each other's identity. The KDC alone bears the burden of trust: all participants trust it and not each other. A KDC does not distinguish between users and hosts, or more correctly, server programs on hosts. It treats both as principals, distinct entities that share a secret (a cryptographic key) with the KDC. Host-to-Host Authentication: Host-to-host authentication is concerned with the identity of computer systems on the network. The concept is important for several reasons. For example:! "A firewall guarding the entrance to a corporate network in San Francisco receives packets that appear to originate from a sister network in New York. Should it accept the packets?! A diskless workstation downloads its operating system kernel from a boot server. Should it trust that the kernel it receives really came from the intended server?! A host in Philadelphia receives a "network-unreachable" message from a router allegedly located in London. Should the host trust the message?! A file server receives a mount request from what appears to be an authorized client. Should it honor the request and export its file system to the client?! Two hosts, circle and square, have a common user base. If a user has authenticated to circle, and now wants to log in to square from circle, should square ask her to authenticate again?" (Hughes, pg. 87) There are several ways to achieve host-to-host authentication, such as no authentication, disclosing passwords and digital signatures and encryption. Authentication based on host names can be classified as no authentication. Host names exist mainly for human convenience; in fact, a system on the Internet need not even have a name assigned by an authority. Use of name-based authentication also presumes that DNS (Domain Naming System) is secure. A host is easily convinced that an address used by an attacker's machine maps to the name of a different machine. Some host-to-host protocols authentication information (passwords) in cleartexts within the protocol messages. Such a technique is marginally better than no authentication, in that a would-be attacker must at least unearth the passwords by eaves dropping protocol messages. Digital signature is an unforgeable electronic signature that authenticates a message sender and simultaneously guarantees the integrity of the message. Authenticated messages can almost unequivocally identify their senders and if the algorithms used are cryptographically strong and if keys are not compromised. Such techniques can be used by communicating hosts as well as by communicating users. Private-key or public-day encryption also can be employed when host-to-host confidentiality is required. User-to-User Authentication: User-to-user authentication establishes proof of one user's identity to another. One technique is digital signatures, which was discussed in the previous section. Another technique is the Kerberos version 5 KDC (Key Distribution Center). The Kerberos uses the trusted third-party authentication scheme. Participating users, client programs and server programs, all termed principals, authenticate to one another through the aid of a KDC. Developing of Intranet Security Types of Firewalls: Packet Filtering Gateways: Packet filtering firewalls use routers with packet filtering rules to grant or deny access based on source address, destination address and port. They offer minimum security but at a very low cost and can be an appropriate choice for a low risk environment. They are fast, flexible and transparent. Filtering rules are not often easily maintained on a router, but there are tools available to simplify the tasks of creating and maintaining the rules. Filtering gateways do have inherent risks including:! The source and destination addresses and ports contained in the IP packet header are the only information that is available to the router in making decision whether or not to permit traffic access to an internal network.! They do not protect against IP or DNS address spoofing! An attacker will have a direct access to any host on the internal network once access has been

5 Página 5 de 8 granted by the firewall.! Strong user authentication is not supported with some packet filtering gateways.! They provide little or useful logging. Circuit-level Gateways Circuit-level gateway is a firewall that validates TCP and, in some products, User Datagram Protocol (UDP) sessions before opening a connection or circuit through the firewall. The state of the session is monitored, and traffic is only allowed while the session is still open. This is more secure than packet filtering but allows any kind of data through the firewall while the session is open, creating a security hole. This is better than packet filtering but still falls short of total security. If this gateway does not support UDP, it cannot support native UDP traffic such a domain name service (DNS) and SNMP. Application Gateways: An application gateway uses server programs (called proxies) that run on the firewall. These proxies take external requests, examine them and forward legitimate requests to the internal host that provides the appropriate service. Application gateways can support functions such as user authentication and logging. Because an application gateway is considered as the most secure type of firewall, this configuration provides a number of advantages to the medium-high risk site:! The firewall can be configured as the only host address that is visible to the outside network, requiring all connections to and from the internal network to go through the firewall.! The use of proxies for different services prevents direct access to services on the internal network, protecting the enterprise against insecure or misconfigured internal hosts.! Strong user authentication can be enforced with application gateways.! Proxies can provide detailed logging at the application level. Application level firewalls shall be configured such that out-bound network traffic appears as if the traffic had originated from the firewall. In this manner, direct access to network services on the internal network is not allowed. All incoming requests for different network services such as Telnet, FTP, HTTP, RLOGIN, etc., regardless of which host on the internal network will be the final destination, must go through the appropriate proxy on the firewall. Applications gateways require a proxy for each service, such as FTP, HTTP, etc., to be supported through the firewall. When a service is required that is not supported by a proxy, an organization has three options:! Deny the services until the firewall vendor has developed a secure proxy - this is the preferred approach, as many newly introduced Internet services have unacceptable vulnerabilities.! Develop a custom proxy - this is a fairly difficult task and should be undertaken only by very sophisticated technical organizations.! Pass the service through the firewall - using what are typically called plugs, most application gateway firewalls allow services to be passed directly through the firewall with only a minimum of packet filtering. This can limit some of the vulnerability but can result in compromising the security of systems behind the firewall. Hybrid or Complex Gateways Hybrid gateways combine two or more of the above firewall types and implement them in series rather than in parallel. If they are connected in series, then the overall security is enhanced; on the other hand, if they are connected on parallel, then the network security perimeter will be only as secure as the least secure of all methods used. In medium to high-risk environments, a hybrid gateway may be the ideal firewall implementation. Firewall Architectures: Firewalls can be configured in a number of different architectures and can provide various levels of security at different costs of installation and operation. An organization should match their risk profile to the type of firewall architecture selected. The following sections describe typical firewall architectures. Multi-homed host: A multi-homed host is a host (a firewall) that has more than one network interface, with each interface connected to logically and physically separate network segments. A dual-homed host (host with two interfaces) is the most common instance of a multi-homed host. A dual-homed firewall is a firewall with two network interfaces cards (NICs) with each interface

6 Página 6 de 8 connected to different networks. For instance, one network interface is typically connected to the external or untrusted network, while the other interface is connected to the internal or trusted network. In this configuration, a key security tenet does not allow traffic coming in from the untrusted network to be directly routed to the trusted network - the firewall always act as an intermediary. In dual-homed firewall, routing by the firewall shall be disabled so those IP packets from one network are not directly routed from one network to the other. Screened host: A screened host firewall architecture uses a host (bastion host) to which all outside hosts connect, rather than allow direct connection to other, less secure internal hosts. To achieve this, a filtering router is configured so that all connections to the internal network from the outside network are directed towards the bastion host. Screened subnet: The screened subnet architecture is essentially the same as the screened host architecture, but adds an extra strata of security by creating a network where the bastion host resides (often call perimeter network) which is separated from the internal network. Adding a perimeter network in order to separate the internal network from the external will deploy a screened subnet. This assures that if there is a successful attack on the bastion host, the attacker is restricted to the perimeter network by the screening router that is connected between the internal and perimeter network. Figure 1: An example of firewall configuration (Internet-Ireland, pg.1) Implementing Intranet Security Security strategies should not be based on current or future products or technology but on the existing functional needs and risks of the organization. The toughest part of developing a security strategy is determining what needs to be secured and from whom. When implementing an Intranet security, the security plans should encompass four major aspects of information security:! Physical (physical and procedural controls to corporate resources, for example)! Network (network isolation and packet encryption)! Platform (intrusion protection and compliance monitoring tools)! Application security (strong authentication and electronic commerce)

7 Página 7 de 8 The steps of implementing a security plan are listed below. These steps should be followed and answered pertaining to the needs of the company. 1. Develop a security policy! Decide value of resources! Determine who must use those resources! Determine what ratio of security/accessibility is feasible Two basic attitudes:! List of permitted actions! List of forbidden actions 2. Configure system around security policy 3. Inform system users! Inform of their part in security maintenance! Define proper use of resources 4. Maintain system and user information level 5. Response to breaches Intranet Security after Implementation Once the security is developed, the policy needs regular review and update. The environment and technologies are constantly changing, and so is the protection that is needed for the information. In any Intranet implementation where information needs protection, there are three regular activities that should take place in order to keep the company current. These include: Threat Identification! The information is evaluated to the business, the value to potential security risks, and consequences of a security breach. External consultants are used in this process because of the knowledge needed to identify threats. Active Penetration Testing! This involves sanctioned attempts to actually penetrate the security at known vulnerability points. A package known as SATAN can be used to duplicate known hacking techniques and apply them against the target system. External Audits! External auditing is used because they see a broader range of experiences and results in the course of their business as compared to that of which any one company would encounter. Internal auditing is valuable, but external auditing is a must. Conclusion There is a potential benefit in using an Intranet in that many of the complicated security schemes can be bypassed for the basic reason that the network is private and there is a known set of users. This will certainly not increase the security of the system, but it may reduce its cost and complexity, and if properly designed, should not prevent the future addition of stricter security schemes and a migration to the Internet. This should be balanced against the cost of implementing the Intranet, and the more restricted access on the Intranet. Overall, security concerns for Intranets and the Internet are much like concerns for any networked environment: provide proper configurations, make information available only to authorized users, remember security when developing applications, think about privacy needs of your users and keep system and application software maintained to current service levels.

8 Página 8 de 8 Bibliography Cooper, Frederic J.; Goggans, Chris,; Halvey, John K.; Hughes, Larry; Morgan, Lisa; Siyan, Karanjit; Stallings, William; Stephenson, Peter, "Implementing Internet Security", Indianapolis: New Riders Publishing, Hinrichs, Randy J., "Intranets: What's The Bottom Line?", SunSoft/Prentice Hall, Hughes, Larry J., "Actually Useful Internet Security Techniques", Indianapolis: New Riders Publishing, McCarthy, Linda, "Intranet Security: Stories from the Trenches," Sun Microsystems Press, Siyan, Karanjit and Hare, Chris, "Internet Firewalls and Network Security", Indianapolis: New Riders Publishing, Intranet Organization: Strategies for Management Change, by Steven L. Telleen, Ph.D., Iorg.com, Internet Security Policy: A Technical Guide, Gaithersburg: National Institute of Standards and Technology, Internet/Intranet Firewall Security for TCP/IP and IPX Networks: A Manageable, Integrated Solution, Ukiah Software, Inc., Microcomputer Network Controls and the Intranet, by Frederick Gallegos and Steven r. Powell, Auerbach, This paper by Lisa Lin was one of three that won the ISACA Los Angeles Chapter's Best Paper Contest. Assurance Security Governance Members & Leaders Professionals & Practitioners Student & Educators Exhibitors & Advertisers Info Request Join Bookstore My ISACA About ISACA Home Site Map Shopping Cart Logout Contact Us Terms Of Use Copyright 2004 Information Systems Audit and Control Association (ISACA ) All rights reserved 3701 Algonquin Road Suite 1010 Rolling Meadows, Illinois USA Site designed and developed by Active Matter

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Module 8. Network Security. Version 2 CSE IIT, Kharagpur Module 8 Network Security Lesson 3 Firewalls Specific Instructional Objectives On completion of this lesson, the students will be able to answer: What a firewall is? What are the design goals of Firewalls

More information

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: victorkleo@live.com ABSTRACT Internet security

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering Network Security by David G. Messerschmitt Supplementary section for Understanding Networked Applications: A First Course, Morgan Kaufmann, 1999. Copyright notice: Permission is granted to copy and distribute

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information

83-10-41 Types of Firewalls E. Eugene Schultz Payoff

83-10-41 Types of Firewalls E. Eugene Schultz Payoff 83-10-41 Types of Firewalls E. Eugene Schultz Payoff Firewalls are an excellent security mechanism to protect networks from intruders, and they can establish a relatively secure barrier between a system

More information

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

3. Firewall Evaluation Criteria

3. Firewall Evaluation Criteria Firewall Management Prep. drd. Radu Constantinescu Academy of Economics Studies, Bucharest ABSTRACT Network connectivity can be both a blessing and a curse. On the one hand, network connectivity can enable

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection

More information

Remote Access Security

Remote Access Security Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to

More information

Intranet, Extranet, Firewall

Intranet, Extranet, Firewall Indian Institute of Technology Kharagpur Intranet, Extranet, Firewall Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. I.I.T. Kharagpur, INDIA Lecture 31: Intranet, Extranet, Firewall On completion,

More information

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations

More information

Fig. 4.2.1: Packet Filtering

Fig. 4.2.1: Packet Filtering 4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the

More information

12. Firewalls Content

12. Firewalls Content Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall

More information

Firewalls. Ahmad Almulhem March 10, 2012

Firewalls. Ahmad Almulhem March 10, 2012 Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2

More information

Firewall Design Principles Firewall Characteristics Types of Firewalls

Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Design Principles Firewall Characteristics Types of Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for these slides. Fall 2008

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

IMPLEMENTING INTERNET FIREWALL SECURITY POLICY

IMPLEMENTING INTERNET FIREWALL SECURITY POLICY NIST Special Publication 800-XX IMPLEMENTING INTERNET FIREWALL SECURITY POLICY Barbara Guttman Robert Bagwill IMPLEMENTING INTERNET FIREWALL SECURITY POLICY Information Technology Laboratory Computer Security

More information

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security Chapter 12 Network Security Security Policy Life Cycle A method for the development of a comprehensive network security policy is known as the security policy development life cycle (SPDLC). Network Security

More information

Internet Firewalls Policy Development and Technology Choices

Internet Firewalls Policy Development and Technology Choices Internet Firewalls Policy Development and Technology Choices Leonard J. D Alotto GTE Laboratories, Incorporated Abstract Since the development of the World Wide Web (WWW), more and more organizations are

More information

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls CSE 4482 Computer Security Management: Assessment and Forensics Protection Mechanisms: Firewalls Instructor: N. Vlajic, Fall 2013 Required reading: Management of Information Security (MIS), by Whitman

More information

Guideline on Firewall

Guideline on Firewall CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June

More information

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall? What is a Firewall? Computer Security Firewalls fire wall 1 : a wall constructed to prevent the spread of fire 2 usually firewall : a computer or computer software that prevents unauthorized access to

More information

83-10-40 Firewalls: An Effective Solution for Internet Security E. Eugene Schultz Payoff

83-10-40 Firewalls: An Effective Solution for Internet Security E. Eugene Schultz Payoff 83-10-40 Firewalls: An Effective Solution for Internet Security E. Eugene Schultz Payoff Firewalls are an effective method of reducing the possibility of network intrusion by attackers. The key to successful

More information

Overview. Firewall Security. Perimeter Security Devices. Routers

Overview. Firewall Security. Perimeter Security Devices. Routers Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

Firewall Architecture

Firewall Architecture NEXTEP Broadband White Paper Firewall Architecture Understanding the purpose of a firewall when connecting to ADSL network services. A Nextep Broadband White Paper June 2001 Firewall Architecture WHAT

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Lecture 23: Firewalls

Lecture 23: Firewalls Lecture 23: Firewalls Introduce several types of firewalls Discuss their advantages and disadvantages Compare their performances Demonstrate their applications C. Ding -- COMP581 -- L23 What is a Digital

More information

Firewalls and Virtual Private Networks

Firewalls and Virtual Private Networks CHAPTER 9 Firewalls and Virtual Private Networks Introduction In Chapter 8, we discussed the issue of security in remote access networks. In this chapter we will consider how security is applied in remote

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality

More information

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall. Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls

More information

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

FIREWALL ARCHITECTURES

FIREWALL ARCHITECTURES FIREWALL ARCHITECTURES The configuration that works best for a particular organization depends on three factors: The objectives of the network, the organization s ability to develop and implement the architectures,

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 9 Firewalls and Intrusion Prevention Systems First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Firewalls and Intrusion

More information

8. Firewall Design & Implementation

8. Firewall Design & Implementation DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or

More information

Network Security Topologies. Chapter 11

Network Security Topologies. Chapter 11 Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network

More information

Firewalls (IPTABLES)

Firewalls (IPTABLES) Firewalls (IPTABLES) Objectives Understand the technical essentials of firewalls. Realize the limitations and capabilities of firewalls. To be familiar with iptables firewall. Introduction: In the context

More information

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed

More information

Network Security. Raj Jain. The Ohio State University. Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ Raj Jain 31-1

Network Security. Raj Jain. The Ohio State University. Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ Raj Jain 31-1 Network Security Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 31-1 Overview Security Aspects Secret Key and Public Key Encryption Firewalls: Packet Filter, Bastion Host,

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

Network Security: From Firewalls to Internet Critters Some Issues for Discussion Network Security: From Firewalls to Internet Critters Some Issues for Discussion Slide 1 Presentation Contents!Firewalls!Viruses!Worms and Trojan Horses!Securing Information Servers Slide 2 Section 1:

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall SOFTWARE ENGINEERING 4C03 Computer Networks & Computer Security Network Firewall HAO WANG #0159386 Instructor: Dr. Kartik Krishnan Mar.29, 2004 Software Engineering Department of Computing and Software

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

ECE 578 Term Paper Network Security through IP packet Filtering

ECE 578 Term Paper Network Security through IP packet Filtering ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon

More information

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? (cont d) Firewall is a set of related programs, located at a network gateway server. Firewalls

More information

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network. Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Firewalls CSCI 454/554

Firewalls CSCI 454/554 Firewalls CSCI 454/554 Why Firewall? 1 Why Firewall (cont d) w now everyone want to be on the Internet w and to interconnect networks w has persistent security concerns n can t easily secure every system

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls. Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls. 1 Information systems in corporations,government agencies,and other organizations

More information

Firewall: Getting started

Firewall: Getting started Firewall: Getting started Version 4 SC41-5424-02 Firewall: Getting started Version 4 SC41-5424-02 ii Firewall: Getting started Contents Part 1. Firewall: Getting started... 1 Chapter 1. Print this topic.......

More information

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton

More information

Internet Security Specialist Compaq Computer

Internet Security Specialist Compaq Computer Internet Security Specialist Compaq Computer Proof of Concept Partners Projects Workshop Seminars Customer Briefings Compaq White Paper Performance White Papers ASE Symposium $40-80 billion potential

More information

Security threats and network. Software firewall. Hardware firewall. Firewalls

Security threats and network. Software firewall. Hardware firewall. Firewalls Security threats and network As we have already discussed, many serious security threats come from the networks; Firewalls The firewalls implement hardware or software solutions based on the control of

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Internet Security Firewalls

Internet Security Firewalls Overview Internet Security Firewalls Ozalp Babaoglu! Exo-structures " Firewalls " Virtual Private Networks! Cryptography-based technologies " IPSec " Secure Socket Layer ALMA MATER STUDIORUM UNIVERSITA

More information

What would you like to protect?

What would you like to protect? Network Security What would you like to protect? Your data The information stored in your computer Your resources The computers themselves Your reputation You risk to be blamed for intrusions or cyber

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Fall 2010 Sonja Buchegger buc@kth.se Lecture 6, Nov. 10, 2010 Firewalls, Intrusion Prevention, Intrusion Detection

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

Internet Security Firewalls

Internet Security Firewalls Internet Security Firewalls Ozalp Babaoglu ALMA MATER STUDIORUM UNIVERSITA DI BOLOGNA Overview Exo-structures Firewalls Virtual Private Networks Cryptography-based technologies IPSec Secure Socket Layer

More information

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference

More information

SECURITY via FIREWALLS

SECURITY via FIREWALLS SECURITY via FIREWALLS 1. Introduction Firewall technology has matured to the extent that today s firewalls can coordinate security with other firewalls and intrusion detection systems. They can scan for

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Firewall 1 Basic firewall concept Roadmap Filtering firewall Proxy firewall Network Address Translation

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre

More information

Chapter 20. Firewalls

Chapter 20. Firewalls Chapter 20. Firewalls [Page 621] 20.1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations 20.2 Trusted Systems Data Access Control The Concept of Trusted Systems

More information

A Model Design of Network Security for Private and Public Data Transmission

A Model Design of Network Security for Private and Public Data Transmission 2011, TextRoad Publication ISSN 2090-424X Journal of Basic and Applied Scientific Research www.textroad.com A Model Design of Network Security for Private and Public Data Transmission Farhan Pervez, Ali

More information

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015) s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

The Advantages of a Firewall Over an Interafer

The Advantages of a Firewall Over an Interafer FIREWALLS VIEWPOINT 02/2006 31 MARCH 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the Protection

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information