|
|
|
- Jack Tyler
- 10 years ago
- Views:
Transcription
1 Computer Security Lectures Network Security Jussipekka Leiwo
2 Network threats Network controls Firewalls Internet security Outline
3 Network threats Causes of security problems: Sharing of resources and workload Complexity of systems and interconnection mechanisms Unknown security perimeter Multiple points of attacks Anonymity of attackers Unknown access paths to resources
4 What could be attacked? local nodes connected via local communications links to a local area network which also has local data storage, local processes, and local devices. The LAN is also connected to a network gateway that gives access via network communications links to network control resources, network routers, and network resources, such as databases.
5 What can an attacker do? Intercept data in transit Modify data in transit Gain unauthorized access to programs or data in remote hosts Modify programs or data in remote hosts Insert communications Replay previous communication Block selected traffic Block all traffic Run a program at a remote host
6 By what means? Wiretapping Impersonation Message confidentiality violations Message integrity violations Hacking Code integrity violations Denial of service
7 Wiretapping Passive vs. active wiretapping Cable packet sniffing inductance Does multiplexing help? Microwave Satellite communications Optical fibre
8 Impersonation Authentication foiled by guessing Authentication foiled by eavesdropping Nonexistent authentication Use of well-known authentication Use of trusted authentication
9 Message confidentiality violations Misdelivery Exposure in processing systems Traffic flow analysis
10 Message integrity violations Change content of a message Change part of the content of a message Replace a message Reuse an old message Change the apparent source of a message Redirect a message Destroy or delete a message
11 By means of Active wiretap Trojan horse Impersonation Pre-empted host Pre-empted workstation
12 Hacking hacker vs. cracker Hacking tools Automated attacks Distributed automated attacks Are they a real threat?
13 Code integrity violations User is typically unaware of the content of the downloaded file File downloading may happen without user s permission File downloading may happen without user s permission
14 Denial of service Connectivity Flooding Routing problems Disruption of service
15 Network controls Encryption Access control Authorization and authorization Traffic Control Data integrity
16 Encryption Link encryption End-to-end encryption Security within hosts Message exposed in sending host Message encrypted in sending host Message exposed in intermediate nodes Message encrypted in intermediate nodes Role of user By sending host, invisible to user Host maintains encryption One facility for all users Can be implemented in HW All or no messages encrypted Requires one key per host pair Provides node authentication By sending process, user involved User must find algorithm User must select encryption Software implementation User chooses granularity of application Implementation concerns Requires one key per user pair Provides user authentication
17 Access control Port protection Automated call-back Differentiated access rights Silent modem Firewalls
18 Authentication and authorization Threats: Impersonation of a server by a rogue process Interception or modification of data exchanged Replay of previous authentication exchange Example solutions: Kerberos SESAME DCE
19 Kerberos A secret key based service for providing authentication in a network, originally by MIT During a login session, user A accesses remote resources (e.g. hosts, file servers) over an insecure network. Each resource needs to authenticate A, but A s workstation performs the authentication on A s behalf transparently to A.
20 V1-V3 obsolete, V4 and V5 conceptually similar but different in implementation. Components: Key Distribution Center (KDC) that runs on a physically secure node, often implements Ticket Granting Service (TGS) A library of subroutines used by distributed applications which want to authenticate their users. Operational principles: User A logs into a workstation by providing a username and password Workstation (A-WS) obtains information from KDC used by processes to access remote resources on behalf of the user.
21 Some modified applications: Telnet (RFC854) BSD r-tools NFS (RFC1094) Replicated KDCs Realms inter-realm authentication is not allowed Key version numbers
22 Encryption for privacy and integrity Kerberos V4 uses Plaintext Cipher Block Chaining (PCBC) encryption to achieve both privacy and integrity in a single cryptographic transformation: C1 = E(m1 IV) Cn = E(mn-1 mn cn-1) If the final block decrypts properly, integrity is guaranteed However, PCBC is not fully capable of detecting integrity violations in case of block reordering
23 Encryption for integrity only DES-CBC integrity checking requires computation of the full DES value of the message On software, DES is too slow and Kerberos designers wanted something faster The Kerberos integrity checking algorithm was developed for Kerberos, however never fully specified Only source code is available, hence nobody has bothered to analyze it
24 Differences of V4 and V5 Message specification Naming Delegation of rights Ticket lifetime Key versions One password can result in different master key in different realms Some cryptographic optimizations
25 Cryptographic algorithms V4 assumes use of DES, V5 allows different algorithms and variable length key-fields in messages Algorithms of V4 are fixed against known weaknesses.
26 SESAME SESAME = A Secure European System for Applications in a Multi-vendor Environment Partly funded by European Commission under it s RACE programme. Developed in co-operation by Bull, ICL and Siemens
27 Operation principles: A user authenticates to the Authentication Server (AS) AS returns user a token used to prove his identity The user presents the token to a Privilege Attribute Server (PAS) to obtain a guaranteed set of access rights contained in a Privilege Attribute Certificate (PAC) User presents the PAC to the target application whenever requesting access to a protected resource The target application makes an access control decision based on the user s security attributes contained in the PAC and access control information (e.g. ACL) attached to the controlled resource.
28 Supports delegation of access rights and public key certificates Relationship to Kerberos Some SESAME components can be accessed through Kerberos V5 and can use both Kerberos V5 and SESAME data structures SESAME extends heterogeneity, access control, scalability of public key systems, audit and delegation to Kerberos. Accessed through the GSS-API
29 DCE Security Distributed Computing Environment (DCE) is a product of Open Software Foundation (OSF) incorporated into a number of products from different vendors DCE security is conceptually similar to Kerberos and Kerberos V5 is one of the components of DCE security.
30 As Kerberos is designed mostly for authentication, modular design of DCE allows dealing with authentication, encryption and authorization, as architecturally separate. Incorporates (conceptual) Privilege Server and Registration Server into the KDC Privilege server: To get the principal s UUID (Universal User ID) and groups to which principal belongs to the Kerberos ticket in a secure way
31 Registration server To provide a combined database for a KDC and corresponding Privilege Server Access control lists: DCE provides a platform-independent encoding of (128 bit long) names of formats used by specific systems (e.g. 32 bit UID, GID) DCE also translates names to UUID Makes heavy use of Kerberos V5 AUTHORIZATION-DATA field.
32 Traffic control Pad traffic Routing control
33 Data Integrity Sequence numbers etc. Checksums Cryptographic checksums Digital signatures Notarization
34 Firewalls In the good ol days, cities were protected by thick walls, and houses were separated from each other by firewalls that prevented of, for example, spread of fire throughout the city Single point of control where network traffic is examined, could help in the maintenance of security
35 Physical world analogies: Passport (and visa) checking at borders Apartments are often locked at the entrance in addition to each door Properties: All traffic from inside to outside, and vice versa, must pass through a firewall Only authorized traffic, as defined by the local security policy, will be allowed to pass The firewall itself is immune to penetration
36 Firewall components Firewall policy Packet filters Application gateways
37 Firewall policy Service access policy (high level policy): The TCP/IP protocols and services that should be allowed or denied from the protected network How these services should be used How exceptions of the policy are handled Firewall design policy (low level policy): How the firewall actually enforces the service access policy
38 Packet filtering Applies a set of rules to incoming packets to decide whether forwarded or disgarded. IP packets usually filter based in the IP header information, such as Protocol number Source and destination IP addresses Source and destination port numbers TCP connection flags Other options
39 Packet filter is stateless For example Nr. Type Source addr. Dest. addr. Source port Dest. port Action 1 tcp * > Permit 2 tcp * > Permit 3 tcp * > Permit 4 tcp > Permit 5 udp * *.* > Permit 6 * * * * * Deny
40 Application Gateways internetworking device that interconnects one network to another for a specific application A gateway must understand and implement the corresponding application protocol From the client s point of view, the AG is like a server From the server s point of view, the AG is like a client Works at the application or transport layer Application-level gateway (proxy server) circuit-level gateway
41 For example Client Proxy Server Request Authentication Session Session Relay Bastion host An exposed firewall system that hosts an application gateway Must be confiured to be particularly secure Usually, a secure operating system Code and files must be protected from outside attacks Firewall code is the only software permitted to run
42 Different levels of security: Security level Services No security Unrestricted access Traffic interception Packet filters Authenticated traffic PF, Application or circuit-level gateways Restricted access PF, AG and and name gateways Tamperproof firewall Special purpose OS for firewall Extended security Additional security protocols (VPN) Isolation No access Stateful inspection vs. application gateways In addition to packet headers, inspection is based on both transport and application level headers and data Maintains information about past packets First packet in a connection is examined
43 Proxy Servers An AG residing in a proxy server typically hosts a number of proxy servers Usually, require modification on the clients Advantages of Proxy Servers AG only allows those TCP/IP protocols and services for which a Proxy Server exists Prevents use on unreliable network services Prevents implementation of untrusted services behind the firewall Application protocols can be screened and filtered
44 For example, FTP GET is allowed but PUT denied Preventation of Java applets and ActiveX controls Disadvantages of Proxy Servers Not good at handling UDP-based applications Not good at handling proprietary application protocols For example, Lotus Notes, SQLnet,SAP
45 Dual-Homed firewall Intranet R R Internet Bastion Host Inner network segment Outer network segment
46 Intranet Screened host firewall Bastion Host R Internet R Inner network segment Outer network segment
47 Intranet Screened subnet firewall R Bastion Host R Internet R Inner network segment Outer network segment
48 Limitations No protection agains internal attacks No protection outside the perimeter No protection if compromised No protection against data-driven attacks, such as computer viruses, malicious content, or macro viruses
49 Internet security IETF Security Area IP Security Transport level security
50 IETF Security Area An Open Specification for PGP (openpgp) Authenticated Firewall Traversal (aft) Common Authentication Technology (cat) IP Security Policy (ipsp) IP Security Protocol (ipsec) IP Security Remote Access (ipsra) Intrusion Detection Exchange Format (idwg) Kerberized Internet Negotiation of Keys (kink) Kerberos WG (krb-wg)
51 One Time Password Authentication (otp) Public-Key Infrastructure (X.509) (pkix) S/MIME Mail Security (smime) Secure Network Time Protocol (stime) Secure Shell (secsh) Securely Available Credentials (sacred) Security Issues in Network Event Logging (syslog) Simple Public Key Infrastructure (spki) Transport Layer Security (tls) Web Transaction Security (wts) XML Digital Signatures (xmldsig)
52 IP Security (RFC 2401) Components: IP Encapsulating Security Payload (ESP) IP Authentication Header (AH) Cryptographic key and security Association (SA) Management procedures Modes of operation: Transport mode Tunnel mode
53 IP ESP (RFC 2406) Provides: Confidentiality Data Origin authentication Connectionless integrity Anti-replay service Limited traffic flow confidentiality
54 IP ESP packet format Security Parameters Index (SPI) Sequence Number Payload Data* (variable) Padding (0-255 bytes) Pad Length Next Header Authentication Data (variable)
55 IP ESP Header placement Transport mode IPv4 orig IP hdr ESP ESP ESP (any options) Hdr TCP Data Trailer Auth <----- encrypted ----> < authenticated -----> IPv6 orig hop-by-hop,dest*, dest ESP ESP IP hdr routing,fragment. ESP opt* TCP Data Trailer Auth <---- encrypted ----> <---- authenticated ---->
56 Tunnel mode IPv4 new IP hdr* orig IP hdr* ESP ESP (any options) ESP (any options) TCP Data Trailer Auth < encrypted > < authenticated > IPv6 new* new ext orig* orig ext ESP ESP IP hdr hdrs* ESP IP hdr hdrs * TCP Data Trailer Auth < encrypted > < authenticated >
57 IP AH (RFC 2402) Provides: Connectionless integrity Data origin authentication (Optionally) protection against replays May be applied Alone In acombination with IP ESP In a nested fashion (tunnel mode)
58 IP AH packet format Next Header Payload Len RESERVED Security Parameters Index (SPI) Sequence Number Field Authentication Data (variable)
59 IP AH Header placement Transport mode IPv4 orig IP hdr (any options) AH TCP Data < authenticated > except for mutable fields IPv6 hop-by-hop, dest*, dest orig IP hdr routing, fragment. AH opt* TCP Data <---- authenticated except for mutable fields >
60 Tunnel Mode IPv4 new IP hdr* orig IP hdr* (any options) AH (any options) TCP Data <- authenticated except for mutable fields --> in the new IP hdr IPv6 ext hdrs* ext hdrs* new IP hdr* if present AH orig IP hdr* if present TCP Data <-- authenticated except for mutable fields in new IP hdr ->
61 ISAKMP et al. ISAKMP (RFC 2408) defines exchanges of key generation and authentication data independently of specific protocols Oakley (RFC2412) defines a series of key exchanges that provide different services SKEME (no RFC) describes a particular key exchange technique IKE (RFC 2409) interprets parts of Oakley and SKEME in ISAKMP
62 Transport level security Secure Shell (SSH) Secure Sockets Layer (SSL) Private Communication Technology (PCT) Transport Layer Security Protocol (TLS)
63 Secure Shell (SSH) For securely logging in to a remote host Strong authentication and secure communication over an insecure channel Replaces rlogin, rsh, rcp and rdist, often telnet X11 and other TCP/IP connections can be secured using the Integrated Port Forwarding feature Manually distributed, preconfigured public keys
64 SSH Overview Host key = typically 1024 bit RSA key to bind a connection to a specific host Server key = typically a 768 bit RSA key changing every hour to prevent decrypting of recorded traffic in case of a host key compromise Server key is never saved on a disk The client compares the received host key against the database of manually distributed and preconfigured public host keys Depending on the configuration, the client can automatically add or reject unknown keys
65 Session key = a 256 bit random number Client chooses an encryption algorithm of those supported by the server, typically Blowfish, DES, 3DES The client pads the key with random bytes, double encrypts it with host and server RSA keys and sends to the client Server decrypts the message to recover the session key and sends an encrypted confirmation to the client Supports also user authentication: Password-only authentication where a password is transmitted over the channel, transparently encrypted by SSH RSA authentication where server generates the client a random number encrypted with the public key of the user for a challenge and the client must reply with a correct MD5 hash
66 value of the decrypted challenge and other data that binds the result to the current session IETF Secure Shell WG working with SSH Transport Layer Protocol and SSH Authentication Protocol
67 SSH Transport Layer Protocol Provides cryptographic host authentication, data confidentiality and integrity protection Does not provide user authentication User authentication protocol is layered on top of SSH Transport Layer Protocol Supports a number of compression, encryption, message authentication and key exchange algorithms
68 Protocol execution:
69 Secure Socket Layer (SSL) Extends security into the BSD sockets Authentication of peer entities Exchange of secret keys Use of exchanged keys to authenticate and encrypt data streams communicated between communicating peer entities Developed by Netscape Corporation, currently in v3.0 (v1.0 for inside use only)
70 Positioning of SSL protocols
71 SSL functions Communicating peers can authenticate each other using public key cryptography The confidentiality of the transmitted data is protected as the connection is transparently encrypted after the initial handshake and session key determination
72 The integrity of transmitted data is protected as messages are transparently authenticated and integrity-checked with MACs. No protection against traffic analysis attacks Client and server must know that the other party is using SSL. Three ways of knowing this: Use dedicated port numbers reserved by the IANA Use normal port numbers and negotiate security options as part of the application protocol Use a TCP option to negotiate the use of security protocol during the TCP/IP connection establishment phase.
73 1. SSL Record protocol Receives data from higher layer protocols and deals with data fragmentation, compression, authentication and encryption:
74 Each SSL record contains Content type, Protocol version number Length Data payload (optionally compressed and encrypted) Message Authentication Code Other SSL Protocols may be layered on top of SSL Record protocol
75 Private Communication Technology (PCT) Microsoft Corporation 1995 Only slightly different from SSL2.0 PCT Record protocol to encapsulate handshake and application data into PCT records PCT handshake protocol, layered on top of PCT Record Protocol, to authenticate the server to the and agree on encryption and MAC algorithms and keys.
76 2. Transport Layer Security WG To establishe a Transport Layer Security (TLS) Protocol using SSL, PCT, and SSH as a basis. Not many modifications suggested for SSL. Major modifications suggested into TLS: HMAC construction should be used FORTEZZA token-based KEA should be removed from the specification (is propriotary and unpublished) TLS record protocol should be separated from TLS handshake protocol
77 TLS Record protocol: Takes messages to be transmitted, fragments and optionally compresses them, computes MAC and attaches it to the message and encrypts the result and transmits it. TLS Handshake protocol: Used for negotiating the session state that consists of the session identifier, a peer certificate, a compression method, a cipher spec, a master key and a resumable-flag. Consists of three subprotocols. TLS Change sipher spec protocol TLS alert protocol TLS handshake protocol
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
Lecture 10: Communications Security
INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture
Protocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Introduction to Computer Security
Introduction to Computer Security Network Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Circuit switching vs. packet switching OSI and TCP/IP layered models TCP/IP encapsulation
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures
CS 4803 Computer and Network Security
Network layers CS 4803 Computer and Network Security Application Transport Network Lower level Alexandra (Sasha) Boldyreva IPsec 1 2 Roughly Application layer: the communicating processes themselves and
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Introduction to Computer Security
Introduction to Computer Security Network Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Circuit switching vs. packet switching OSI and TCP/IP layered models TCP/IP encapsulation
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Cryptography and network security CNET4523
1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local
Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls
CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 roadmap 1 What is network security? 2 Principles of cryptography 3 Message integrity, authentication
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Computer and Network Security
Computer and Network Security c Copyright 2000 R E Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@ciseufledu Network Security Protocols
WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations
Security Engineering Part III Network Security. Security Protocols (II): IPsec
Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
How To Protect Your Network From Attack
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: [email protected]
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls
Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls Computer Net Lab/Praktikum Datenverarbeitung 2 1 VPN - Definition VPNs (Virtual Private Networks) allow secure data transmission
Overview. Protocols. VPN and Firewalls
Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls VPN-Definition VPNs (Virtual Private Networks)
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
ICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
CSCI 454/554 Computer and Network Security. Final Exam Review
CSCI 454/554 Computer and Network Security Final Exam Review Topics covered by Final Topic before Midterm 20% Topic after Midterm 80% Date: 05/13/2015 9:00am noon Place: the same classroom Open book/notes
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?
What is a Firewall? Computer Security Firewalls fire wall 1 : a wall constructed to prevent the spread of fire 2 usually firewall : a computer or computer software that prevents unauthorized access to
Firewalls (IPTABLES)
Firewalls (IPTABLES) Objectives Understand the technical essentials of firewalls. Realize the limitations and capabilities of firewalls. To be familiar with iptables firewall. Introduction: In the context
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 3 Firewalls Specific Instructional Objectives On completion of this lesson, the students will be able to answer: What a firewall is? What are the design goals of Firewalls
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
12. Firewalls Content
Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall
NETWORK ADMINISTRATION AND SECURITY
NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security Ch 7 - Security 1 Confidentiality and privacy: Protect
Chapter 5: Network Layer Security
Managing and Securing Computer Networks Guy Leduc Mainly based on Network Security - PRIVATE Communication in a PUBLIC World C. Kaufman, R. Pearlman, M. Speciner Pearson Education, 2002. (chapters 17 and
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Internet Protocol Security IPSec
Internet Protocol Security IPSec Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Authentication Header (AH) Encapsulating Security Payload
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Fig. 4.2.1: Packet Filtering
4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
What would you like to protect?
Network Security What would you like to protect? Your data The information stored in your computer Your resources The computers themselves Your reputation You risk to be blamed for intrusions or cyber
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Security issues with Mobile IP
Technical report, IDE1107, February 2011 Security issues with Mobile IP Master s Thesis in Computer Network Engineering Abdel Rahman Alkhawaja & Hatem Sheibani School of Information Science, Computer and
Lecture 23: Firewalls
Lecture 23: Firewalls Introduce several types of firewalls Discuss their advantages and disadvantages Compare their performances Demonstrate their applications C. Ding -- COMP581 -- L23 What is a Digital
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls. 1 Information systems in corporations,government agencies,and other organizations
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
