VPN Gateway Research in Wireless Network Based on SSL Technology
|
|
|
- Miranda Haynes
- 10 years ago
- Views:
Transcription
1 , pp VPN Gateway Research in Wireless Network Based on SSL Technology Xingkui Wang 1 and Xinguang Peng 2 1 College of Computer Science and Technology,Taiyuan University of Technology,Taiyuan, China [email protected] College of Computer Science and Technology,Taiyuan University of Technology,Taiyuan, China [email protected] 1, [email protected] 2 Abstract Security is an important issue in the design and deployment of wireless networks. Existing equipment is mainly used in security technology include SSID, MAC address Filtering, WEP and x etc. There exists certain safety defects in design and not well protect the security of the wireless network. This paper puts forward a VPN technology was applied to the deployment scheme in wireless networks, which design a set of VPN gateway using SSL technology in Linux environment, so as to solve the current security issues in accessing resources within the network through wireless network. Keywords: Secure Sockets Layer (SSL), Virtual Private Network (VPN), wireless network, gateway, encryption 1. Introduction Nowadays numerous enterprises and schools have their own VPN networks for wired network access and identity authentication. VPN in wired network is comparatively mature technically and for commercial use. But researches and application targeted at wireless VPN are much less. Since wireless media of communication is usually exposed to air and is space-reliant signal transmission. It is more likely to be intercepted of important information once hackers break into compared with wired network. Therefore the safety issue of wireless network is of remarked significance. This thesis conducts a research on realizing safe wireless network use SSL VPN. 2. Wireless Network Security Solution at Present At present, approaches for solving wireless network security concentrate on access control and date encryption. Access control secures sensitive data only permits authorized user in, and data encryption ensures that data transmitted is only received and comprehended by expected users. Regular technologies for wireless network security are specified as follows: (1) Service Set Identifier (SSID) Match. Wireless clients must set up an identical SSID to wireless AP for access; if it is different from the certain AP SSID, then Internet surfing throughout this service area will be denied by the AP: set a hidden AP and SSID area division and access control for data encryption, notwithstanding SSID is usually a simple password. (2) Physical address (MAC) filtering. Manually maintained a set of legal MAC address list of wireless client network card, in order to realize physical address filtering. Shortcomings: the efficiency rest in this approach will be reduced as the terminal number ISSN: IJUNESST Copyright c 2015 SERSC
2 increases. Illegal users are also accessible to legal MAC address lists via network intercept, and they can take over legal MAC addresses for illegal access. (3) Wired equivalent protection (WEP). In IEEE802.il, it is WEP defined for encrypting wireless transmitted data. RC4 algorithm is the core for WEP. Shortcomings: fixed secret key, limited initial vectors and algorithm strength. (4) Port access control technology (IEEE802.1X).When wireless workstation (STA) relates with wireless access point (AP), the accessibility of AP service depends on identification result of 802.1X. [2] If the identification passes, AP will open the logical port for STA, or otherwise user network access will be denied. Shortcomings: IEEE802.1X provides wireless client for identification with RADIUS server, rather than the identification between client and wireless access point (AP). User identification data applied is only a user name and password, which features great hazards in storage, use and identification information transmission. Therefore for highly demanding or large-sized wireless network, VPN scheme is a better choice. Since in large-sized networks, workstation maintenance, secret key for AP WEP encryption, MAC address list in AP are tough risks for management. For wireless network, the VPN based resolution is an ideal substitute for WEP mechanism and MAC address filtering mechanism. 3. SSL Protocol Realizes VPN Virtual Private Network (VPN for short) utilizes a public network (e.g. Internet) to build up a network only for private use. Traditional VPN is a network security system based on IP safeguard construction, and the network layer-based IPSec VPN is a typical example. Its primary shortcomings include: it requires VPN far-end service groups to open several ports; the client-side must implement complicated and tedious configurations and specific maintenance management; IPSec VPN is unable to cross equipments compatible with NAT. A SSL/TLS protocol based VPN structure (SSL VPN) relying on Web Server rises in response to the extensive use of HTTPS. It features no client-side compared with traditional VPN for better use in the wireless network SSL Communication Process SSL security protocol is actually a group of protocols consisting of SSL handshake protocol, SSL cryptograph modification protocol, SSL alert protocol and SSL record protocol, which is situated in TCP/IP protocol model residing network layer and the application layer, which realizes reliable end-to-end security service in use of TCP. SSL protocol has already completed encryption algorithm, communication secret key negotiation and server authentication prior to the application layer communication. After that, all data transmitted by the application layer protocol is encrypted. SSL handshake duration will be shortened by taking advantage of the mutually established effective SSL dialogue for access. Detailed process is specified as follows: (1) SSL client end sends greeting massages for the client to SSL server. The dialogue ID is a established one. (2) SSL server will check if there is a designated dialogue by the client after receiving the greeting message from the SSL client end. If it do not exists, SSL will establish access totally via the handshake protocol; if it exists, SSL server end will response an identical ID to that from the greeting message from the client end, and ensure that the negotiated encryption parameter at the server end is the same as the elected encryption parameter in the original dialogue. (3) SSL server end will then send a message of encryption standard change to the SSL client end and close up the message with the handshake server end. SSL client will send a message of encryption standard change to the SSL client end and close up the message with the handshake server end upon reception. 18 Copyright c 2015 SERSC
3 2.2. Algorithm Implementation SSLVPN security is based on SSL protocol, and therefore SSL protocol implementation is a key factor. The article adopts existing database OpenSSL, which is free of charge, and greatly simplifies implementation of the entire system. First of all, use function SSL libraiy_init() to initialize OpenSSL, utilizes SSL_load_error_strings() for initializing error messages. One SSL dialogue access requires a SSL environment, the process briefings are as follows: (1)Establish the protocol for access this dialogue: SSL_METHOD* SSLv23_server_method(void). (2)Apply an SSL dialogue environment CTX: the OpenSSL function for applying an SSL environment is SSLK _CTX* SSL_CTX_new(SSL_METHOD* ). This function returns to the current SSL access environment. Then set up the verification mode for SSL handshake phases and load the certificate. void SSL_CTX set_verify ( SSL _CTX*,int, int*(int, X509_STORE_CTX*)) void SSL_CTX _ load _ verify _ locations ( SSL _CTX*, constchar*,constchar* ) int SSL_CTX _use_ certificate_ file( SSL _CTX * ctx, constchar int type) int SSL_CTX _use_privatekey _ file( SSL _CTX * ctx, constchar *f ile, int type) After loading the certificate and document, conduct identification to determine the consistence between the private key and certificate: BOOISSL_CTX_check_private_key ( SSL_CTX* ). (3)Bind SSL and the connected socket: SSL*SSL_new (SSL_CTX* ) this function applies a SSL socket, then conduct binding via function int SSL_set_fd( SSL* ) for socket read-write. (4) Initiate SSL handshake movements in use of the function: int SSL_connect(SSL*) (5) After the handshake validates, communication is initiated. Use SSL read and SSL write for SSL socket instead of traditional ones, the function is: int SSL_read ( SSL * ss,l char* bu,fint num) int SSL_write (SSL * ss,l char* bu,fint num) For VPN gateway server, please use SSL accept instead of the traditional accept call, the function is: int SSL_accept(SSL * ssl). (6) When the communication is over, please release the SSL resource applied formerly in use of the following function: int SSL_shutdown(SSL * ssl) open SSL socket void SSL_free (ssl) release SSL socket void SSL_CTX_free(ctx) release SSL environment 3. Construction of SSL VPN Gateway in the Wireless Network 3.1. General Design of VPN Gateway The most fundamental SSLVPN is composed of two parts specified as the client server and SSLVPN gateway. The client server uses SSL technology to send an encryption access request to the SSL VPN gateway. The gateway will transmit the decoded message to Web servers of the enterprise, thus forming an encryption tunnel on the Internet between one client end to the SSLVPN gateway, as shown in Figure 1. The core part of the SSLVPN gateway is composed of various independent functional servers, including the LDAP server in charge of preservation of public certificate and security key. As the LDAP client-end, the SSLVPN checks user information on the LDAP server to test whether the user identity is legal or not. The RADIUS server is responsible for accessing control strategies correlated to authentication. As the RADIUS client end, the SSLVPN gateway server functions in testing legality of user identity by interactive authentication with RADIUS server. AD is a certificate authentication server. Copyright c 2015 SERSC 19
4 Figure 1. Whole Construction of Wireless SSL VPN Gateway In Figure 1, the VPN gateway server and other servers are located in different mainframes in the intranet. VPN gateway server serves as a security agent in the intranet. Since it shares the same location in the intranet with other servers of various kinds, data transmission between them can be proclaimed in writing. The client end and VPN gateway server are located in different networks, and a secure channel must be built up between the two by using SSL for data encryption communication. 3.2 Logical Structure Logical Design: The entire VPN system is composed of SSL gateway, Web server and AP. Among them, the SSL gateway is the most important, which ensures communication security, or confidentiality, message integrity and endpoint authentication. The SSL gateway consists of primary components including processing module, user authentication module, tunneling protocol module and secret key management protocol etc. The logic structure is specified in Figure 2 attached below Primary System Modules: Demand processing module: this module is a daemon process for resident memory in charge of SSL connects and fixed server ends monitoring. User authentication module: it adopts public key certificate authentication based on ECC elliptical curve code system. The entire identity authentication module consists of the client end, AP and the certificate server. Amid them, the certificate server includes CA, RA and CRL database and LDAP database. The certificate server undertakes the role of a server, which preserves the digital certificate ratified by CA on the client end and the authentication server. When the user connects AP, he must first be approved by the authentication server for allowing him to access AP if a legal certificate is owned as the results suggest. The secret key management module is part of the CA system. Functions contained in the secret key management module are: secret key generation, secret key update, secret key backup, secret key recovery, secret key destroy and filing processing etc. Access control module: the system administer conducts access control on intranet resources by setting up listed resource documents based on content access control. 20 Copyright c 2015 SERSC
5 SSL gateway request processing module 标 题 user authentication module application program access control module Web server access request module tunnel protocol module key management module Figure 2. SSL VPN System Logic Structure 4. SSL VPN Gateway Applied in Wireless Campus Network The SSL VPN based typical application raised in this thesis is wireless campus network. Libraries of institutes of higher education purchase enormous external resources, which are specified as remote electronic data and printed publications. These resources are not preserved on the library server, but stored in content provider server. Once the library pays for use, the content provider judges whether the applying user is authorized according to the user IP. A wide range of students and teachers can realize secure access to library resources via wireless campus network through SSLVPN Application System Design The school can deploy an SSL gateway device at the back of firewall provided no change occur in the exiting wireless network. The internal resource server groups can be connected in parallel with the SSL gateway to the exchanger at the back of firewall, which will not cause communication bottlenecks and single point of failure to the system and maintain the stability of the former system to the utmost. The entire system is composed of the SSL gateway, internal servers and AP, which is illustrated in figure 3. The article uses OPEN VPN to set up campus network VPN system. It is a type of open source software compatible with various means of identity authentication, including advanced share of private key, third party certificate and user name/password combination. It uses a number of OPEN SSL encryption libraries and SSL V3/TLSV1 and is also compatible with various VPN access schemes like remote access, and Wifi etc. Copyright c 2015 SERSC 21
6 school library resources SSL VPN gateway smartphone Portable Computer wireless network tablet PC Internal resources server 4.2 Wireless User Authentication Design Figure 3. SSL Application System Authentication Process: Division of VPN service limits of authority. Conduct security verification on the user environment according to the figure 4 workflow before establishing SSL handshake, and provide corresponding access permits to limits of authority in compliance with the security degree. Detailed process is explained as follows: (1)Conduct verification on user password and token. SSL connect denied and dialogue closed if either is incorrect; and the process proceeds if both of them are correct; (2)Conduct security verification on client environment. If the environment is dependable, it will provide a highly authorized service to the user. (3)If the environment is not reliable, it will request the user to download security monitor and document removal program from the SSL VPN application gateway, confining the client to inferior authorization for access; (4)If the client computer does not allow downloading and program installation, the system will force close the cashed function on the insecure endpoint and order the user not to buffering download the displayed content, confining the user to inferior authorization for access the server; (5)Conduct SSL handshake with the client in consistence with the regulatory limits of authorization, and execute examination of encryption algorithm strength on the client computer. If the encryption algorithm strength is lower than the minimum security level preset in the gateway, the connect request will be denied; (6)Implement SSL handshake and establish connect, providing corresponding SSLVPN access service to the client Authentication Implementation: In Linux system, the SSL VPN server uses OpenSSL database function to realize its function: provide SSL encryption/decryption, build up SSL data channel and realize point-to-point secure communication with the client end and the VPN server. Design ideologies stated below can realize user authentication on the SSL VPN server. (1)Use Apache Server to manage a user access list. This list signifies specific servers accessible to each member and concrete port they need to pass through. This access list be gained by sending a webpage order request in the form of GET url + getserver. List.action +cookie.url contained in the form stands for the server address; getserver.list.action 22 Copyright c 2015 SERSC
7 means an order for list acquiring; cookie is provided by HTTP protocol to ensure the Web vibration and security. The basic data structure is: typedef struct { char username[32];clistlist[size];} UserAccessList,* PuserAccessList; typedef struct { char m_ip[40] ;char m_netm ask[40]; int32 m_port; char Protocol[10] ;} CList,* PList; A document form is allowable for storage and management. When a user applies for the list, all lists contained in the C user Access List will be returned to VPN Server. Received a connection request client to enter the password NO Key=? Token id=? yes client environment security certification NO Verify the number is equal to N? yes display error message and end the session Is security? NO client download safety monitoring and file cleaners program yes higher permissions granted to the user Is download? NO close unsafe site cache function yes appropriate permissions granted to user lower permissions granted to user in accordance with provisions to SSL handshake,provide the corresponding VPN service to user Figure 4. Client Security Certification Process (2)The client and the SSL VPN server will execute private handshake to testify whether the client is authorized to access the real server. The establishment of private handshake is conducted after the client end gains the list from the server and a link request is sent in use of personal data format. The header format of private handshake requires some changes, and a mar can be added to the head like my head. The entire head is myhead GET url+getserver.list.action + cookie. This head is unidentifiable for the server intended to be accessed, since it is private communication data with SSL VPN. After the SSL VPN server beheads the my head mark attached to the request asking for the list, it will transmit to the Apache server and generates a Flag mark. The Apache server will skip over step (1) and return a server list the user is permitted to. The Flag mark means that the client end has already established private handshake with SSL VPN. The SSL VPN server will send the Flag and list to the client end. An Auth-List for user authentication will be maintained on the SSL VPN server. Copyright c 2015 SERSC 23
8 4.3 System Working Process The basic workflow in the entire VPN system is specified as follows: (1) Users connected with campus wireless network connect the SSLVPN server via HTTPS, and the gateway will conduct user authentication (currently it is user certificate authentication). Resources lists are returned to users according to their limits of authorization. (2) Send a request to the processing module for reception of the data packet, and sent the decrypted data to the access control module. (3) The tunnel protocol module is responsible for end-to-end tunnel establishment. (4) The access control module determines whether the user can access the intranet resources according to the preset access control strategies. 4.4 Security Analysis It is evident by observing figure 3 that, the SSL VPN raised in the article is required to be installed at the back of firewall, and users required to register by the intranet for authorized external access can be moved on SSLVPN. In terms of firewall, the 443 port should be open up for public network users, which can remarkably reduce the chance for the entire network to be attacked by the public network. SSL protocol tunnel established in the application layer functions in virus and worm prevention, and all accesses are transmitted by the SSL VPN gateway to avoid threats posed by direct access to the network layer. Additionally, since the SSLVPN also serves as a server agent, all installed client ends can be protected from virus or hacker attacks. Fine grit mandatory access control and log audit are also permitted. 5. Conclusion As a new security transmission technology, SSL VPN emerges in response to the ever-increasing demand on network security. As the article mentions, SSL VPN application provides end-to-end connect in the wireless network, and data between the client end and the server is transmitted in encoded form, which ensures the security of network resources and user data. Since SSLVPN not requires client configuration, users are allowed to adopt some traditional application tools at their disposal to realize wireless network access with ease. Acknowledgements The authors would like to thankwang Zheng, Wang Ying, Fu Donglai, and Bian jing for their insightful comments and suggestions. The anonymous reviewers also provided valuable feedback. This paper is supported by the Natural Science Foundation of Shanxi Province under Grant No and Shanxi Scholarship Council of China Grant No References [1] Q.-h. Zeng, W.-x. Xu and Q.-p. Lin, The Construction of Library's Remote Access System Based on SSL VPN, Information Science, vol. 10, (2007). [2] Y.-K. Ou, J.-L. Zhou, T. Xia and S.-S. Yu, Research for Virtual Service Based SSL VPN, Journal of Chinese Computer Systems, vol. 2, no. 27, (2006). [3] Z.-t. Li, J.-m. He and J. Lei, The Threats in SSL VPN and the Solutions, Computer Engineering & Science, vol. 8, no. 28, (2006). [4] K. Zhang, B. Bei and J. Zhang, Construction of Remote Access System to the Digital Resources Based on SSL VPN, Journal of Hebei University(Natural Science Edition), vol. 4, no. 33, (2013). [5] S.-s. Yu, L.-j. Dong, K. Ouyang and T. Xia, Research for STDM Based SSL VPN, Journal of Chinese Computer Systems, vol. 7, no. 27, (2006). 24 Copyright c 2015 SERSC
9 [6] L. Guo and W.-s. Li, Design and Implementation of SSL VPN, COMPUTER TECHNOLOGY AND DEVELOPMENT, vol. 8, no. 17, (2008). [7] R. Stanton, Securing VPNs: comparing SSL and IPsec, Computer Fraud & Security, vol. 9, (2005). [8] A. Harding, SSL Virtual Private Networks, Computers & Security, vol. 5, (2003). [9] T. Rowan, VPN technology: IPSEC vs SSL, Network Security, vol. 12, (2007). [10] D. Bradbury, A private path to security, Infosecurity, vol. 8, (2008). [11] Y. Kuihe, Implementation of Improved VPN Based on SSL < ICEMI '07. 8th International Conference on Electronic Measurement and Instruments, (2007) August 16-18, Xian, Chinese. Authors Xingkui Wang, He born in Shanxi Province, China, in He received the B.Eng. degree in computer application and M.E. degree in network security from Taiyuan University of Technology, Taiyuan, China, in 2002 and 2005, respectively, where he is currently working towards the Ph.D. degree in information security. In 2005, he joined Taiyuan University of Technology, where he is currently an Assistant Professor with College of Computer Science and Technology. His research interests include network security, trusted computing, virtualization technology, and study the data leak prevention. Xinguang Peng, He received the B.Eng. degree in Department of Electronic Information and M.E. degree in computer application from Taiyuan University of Technology, Taiyuan, China, in 1979 and He received the Ph.D. degrees in computer application technology from Beijing Institute of Technology, Beijing, China, in He joined Taiyuan University of Technology, Taiyuan, China, in 1980, where he is currently a Professor leading his laboratory of network security and technology. He worked in University of Erlangen-nurnber ( ), Bayern, Germany, as a visiting scholar supported by the Ministry of Education. He has authored/coauthored more than 100 journal/conference publications and 8 textbooks. His recent research efforts have been focused on network security, intrusion detection, virtualization technology and trusted computing. 论 文 题 目 所 属 主 题 VPN Gateway Research in Wireless Network Based on SSL Technology 移 动 安 全 第 一 作 者 姓 名 王 星 魁 职 称 / 学 位 讲 师 / 硕 士 单 位 太 原 理 工 大 学 计 算 机 科 学 与 技 术 学 院 邮 编 地 址 山 西 太 原 市 迎 泽 西 大 街 79# 电 话 手 机 [email protected] Copyright c 2015 SERSC 25
10 第 二 作 者 姓 名 彭 新 光 职 称 / 学 位 教 授 / 博 士 单 位 太 原 理 工 大 学 计 算 机 科 学 与 技 术 学 院 邮 编 地 址 山 西 太 原 市 迎 泽 西 大 街 79# 电 话 手 机 [email protected] 26 Copyright c 2015 SERSC
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Chapter 4: Security of the architecture, and lower layer security (network security) 1
Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Study on Remote Access for Library Based on SSL VPN
, pp.111-122 http://dx.doi.org/10.14257/ijca.2016.9.1.11 Study on Remote Access for Library Based on SSL VPN Mei Zhang Library, Linyi University, Shandong, 276000, China [email protected] Abstract With
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY
REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY Babul K Ladhe 1, Akshay R Jaisingpure 2, Pratik S Godbole 3, Dipti S Khode 4 1 B.E Third Year, Information Technology JDIET, Yavatmal [email protected]
Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security
Chapter 12 Network Security Security Policy Life Cycle A method for the development of a comprehensive network security policy is known as the security policy development life cycle (SPDLC). Network Security
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Intranet Security Solution
Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices
This document is to be used to verify that a payment application has been validated against Visa U.S.A. Payment Application Best Practices and to create the Report on Validation. Please note that payment
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
Administrator's Guide
Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Automatic Hotspot Logon
WHITE PAPER: for VPN Setup Features of the integrated, dynamic NCP Personal Firewall Solution Table of Contents 1. Insecure mobile computing via Wi-Fi networks (hotspots)...1 1.1 Basic hotspot functionality...
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
Inspection of Encrypted HTTPS Traffic
Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
Security OpenSSL SSL. Roberta Daidone. [email protected]
Security OpenSSL SSL Roberta Daidone [email protected] What are we going to do? Use BIO objects to create SSL connections. Create an SSL connection. Let the client authenticate the server and
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer
Corporate VPN Using Mikrotik Cloud Feature By SOUMIL GUPTA BHAYA Mikortik Certified Trainer What is a VPN? A virtual private network (VPN) is a method for the extension of a private network across a public
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the
Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK
MAC Web Based VPN Connectivity Details and Instructions
MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Security and privacy in public WLAN networks
Security and privacy in public WLAN networks Savio Lau [email protected] March 01, 2005 Roadmap Introduction of public WLAN networks Network security User privacy Experiments and analysis Conclusion March
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
ReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert
VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert Contents: 1.0 Introduction p2 1.1 Ok, what is the problem? p2 1.2 Port Forwarding and Edge based Solutions p2 1.3 What is a VPN? p2 1.4
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security
Xerox SMart esolutions. Security White Paper
Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
SVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
