Cornerstones of Security



Similar documents
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

12. Firewalls Content

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Network Security and Firewall 1

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview. SSL Cryptography Overview CHAPTER 1

Proxy Server, Network Address Translator, Firewall. Proxy Server

ISM/ISC Middleware Module

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Intranet, Extranet, Firewall

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

DMZ Network Visibility with Wireshark June 15, 2010

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

VPN. Date: 4/15/2004 By: Heena Patel

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Chapter 10. Network Security

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

CS5008: Internet Computing

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Network Security Topologies. Chapter 11

What would you like to protect?

Computer Networks. Secure Systems

Secure Network Design: Designing a DMZ & VPN

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

Chapter 17. Transport-Level Security

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

How To Protect Your Network From Attack

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Network Access Security. Lesson 10

SSL VPN vs. IPSec VPN

Technical papers Virtual private networks

Security Technology: Firewalls and VPNs

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Enterprise Security Interests Require SSL with telnet server from outside the LAN

Figure 41-1 IP Filter Rules

Cryptography and network security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

z/os Firewall Technology Overview

Firewalls. Ahmad Almulhem March 10, 2012

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

CTS2134 Introduction to Networking. Module Network Security

ΕΠΛ 674: Εργαστήριο 5 Firewalls

How To Understand And Understand The Security Of A Key Infrastructure

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Security: Focus of Control. Authentication

Savitribai Phule Pune University

Internet Security Firewalls

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Network Configuration Settings

Lecture 23: Firewalls

Is your data safe out there? -A white Paper on Online Security

VPN Lesson 2: VPN Implementation. Summary

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Citrix MetaFrame XP Security Standards and Deployment Scenarios

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Multi-Homing Dual WAN Firewall Router

Chapter 7 Transport-Level Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Chapter 5. Data Communication And Internet Technology

Overview. Firewall Security. Perimeter Security Devices. Routers

Internet Privacy Options

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

7.1. Remote Access Connection

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Chapter 37. Secure Networks

Chapter 20. Firewalls

Chapter 32 Internet Security

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Securing an IP SAN. Application Brief

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Chapter 4 Virtual Private Networking

Common Remote Service Platform (crsp) Security Concept

Transcription:

Internet Security

Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to the sender and receiver Integrity the contents of a message are not modified (intentionally or accidentally) during transmission Non-repudiation the sender of a message cannot deny that he, she or it actually sent the message

Encryption Private Key Encryption (Symmetrical Key Encryption) Data Encryption Standard (DES) is the most widely used symmetrical encryption algorithm Private Key Private Key Message Text Encryption Ciphered Text Decryption Message Text Sender Receiver

Encryption (cont.) Public Key Encryption (Asymmetrical Key Encryption) Public Key of Recipient Private Key of Recipient Message Text Encryption Ciphered Text Decryption Message Text Sender Receiver

Encryption (cont.) Digital Signatures : Authenticity and Non-Denial Public Key of Private Key of Recipient Recipient Message Text Signature Encryption Ciphered Text Decryption Message Text Signature Sender Private Key of Sender Public Key of Sender Receiver

Digital Certificates and Certifying Authorities Digital Certificates Verify the holder of a public and private key is who he, she or it claims to be Certifying Authorities (CA) Issue digital certificates Verify the information and creates a certificate that contains the applicant s public key along with identifying information Uses their private key to encrypt the certificate and sends the signed certificate to the applicant

Secure Socket Layer (SSL) Is a secure socket connection protocol that operates at the TCP/IP layer Authenticates and encrypts communications between browsers and servers Supports a variety of encryption algorithms and authentication methods Verifies that the content of the message hasn t been altered HTTP servers that implement SSL must run on socket port 443 instead of 80. It has become a common practice for firewall vendors to leave this port open.

The SSL protocol provides Private client/server interactions using encryption Server authentication Message integrity checks that detect tampering When a client and server first start communicating: They agree on an SSL protocol version Select the cryptographic algorithm Optionally authenticate each other Use public-key encryption technology for message sending SSL is now called TLS (Transport Layer Security) protocol

S-HTTP S-HTTP is a security-enhanced variant of the HTTP protocol Adds application-level encryption and security on top of ordinary sockets-based communications The browser and server communicate over an ordinary HTTP session and then negotiate their security requirements Like SSL, S-HTTP incorporates public-key cryptography from RSA. It also supports password- and Kerberos-based security systems.

S-HTTP (cont.) It provides the following security checks: It authenticates both clients and servers It checks for server certificate revocations It supports certificate chaining and hierarchies It supports digital signatures that attest to a message s authenticity It allows an application to negotiate the security levels it needs It provides secured communications through existing corporate firewalls

S-HTTP on top of SSL Web browser HTTP Message S-HTTP SSL Web Server Port 443 Secure Web S-HTTP Seal

IPSec It provides authentication and encryption at the IP layer (Layer 3) SSL operates at the TCP layer (Layer 4) IPSec is less visible than SSL IPSec is faster since IP switches and routers can implement the protocol in their hardware

TCP/IP encryption: the choices Layer 7 Application (S-HTTP) Layer 5 Sockets (SSL) Layer 4 TCP (IPSec) Layer 3 IP

Access Control Password Protection Passwords are notoriously susceptible to compromise Users have a habit of sharing their passwords with others, writing them down where others can see them, and choosin passwords that are easily guessed. Browser transmits the passwords in a form that is easily intercepted and decoded. One of the roles of a firewall: making sure that even if the passwords are compromised the intruder only has restricted access to the rest of the network.

Firewalls A network node consisting of both hardware and software that isolates a private network from a public network Make sure that even if the passwords are compromised the intruder only has restricted access to the rest of the network Three types Packet-filtering firewalls Application level firewalls (Dual-homed gateway) bastion gateway connects a private internal network to outside Internet proxies (software programs) run on the gateway server and pass repackaged packets from one network to the other Screen-host gateway screened subnet gateway in which the bastion gateway offers access to a small segment of the internal network demilitarized zone (DMZ) is the open subnet

Packet-filtering firewalls packet filter Internet Intranet mail server IP address Port 25 Are typically implemented in routers at the IP level Drop, reject or permit packets based on Destination IP address Source IP address Application port number Drawback: easy to mimic the IP addresses of trusted machines

Proxy (application) firewalls The most secure form of firewalls. They run a small number of proxies that can be secured and trusted. All incoming Internet traffic is passed to the appropriate proxy gateway (for mail, HTTP, FTP, etc.). The proxies transfer the incoming information to the internal network, based on access rights of individual users. The proxy makes its decision based on authentication, authorization rules instead of IP addresses. The proxy s firewall address is the only one visible to the outside world. The IP addresses of your internal network are totally invisible to the outside world.

Combined Firewall Combined Firewall Bastion Host Internet Stop Traffic denied Traffic permitted Router Local Network Router is configured to only allow traffic through the bastion s IP address Computers on both sides of the firewall can only communicate via the bastion

Screened Subnet Firewall Web Server Bastion Host Internet Router Router Local Network Proxies: Telnet, etc.

Demilitarized zone (DMZ) firewall packet filter socks packet filter Intranet DMZ Internet ftp http

Firewall Design Guidelines Anything not explicitly permitted is denied Keep it simple: complexity is a risk No unneeded services on firewall No other applications No users Watch those logs Integration with systems management

Virtual Private Networks (VPN) A VPN lets organizations connect their geographically dispersed LANs via the Internet. A VPN combines encryption, authentication, and protocol tunneling to provide secure transport of private communications over the public Internet. It s as if the Internet becomes part of a larger enterprise wide area network (WAN). A VPN user can access enterprise data by making a local call into an ISP (Internet Service Provider) rather than using a long distance phone call. In this way, transmission costs are drastically reduced.

Structure of a VPN ISP IPSec-Encrypted VPN Remote client Public Internet Intranet Intranet VPN server Firewall Firewall VPN

Köszönöm a figyelmüket? További információ: www.lpds.sztaki.hu