SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN



Similar documents
CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Internet infrastructure. Prof. dr. ir. André Mariën

CMPT 471 Networking II

Packet filtering and other firewall functions

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN

Proxy Server, Network Address Translator, Firewall. Proxy Server

Network Security Management with Firewalls

Firewall Design Principles Firewall Characteristics Types of Firewalls

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Network Security. Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ. July Network Security 08

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

12. Firewalls Content

Internet Security Firewalls

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN

What would you like to protect?

Security Technology: Firewalls and VPNs

FIREWALL ARCHITECTURES

IT6203 Systems & Network Administration. (Optional)

Chapter 15. Firewalls, IDS and IPS

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF SOFTWARE ENGINEERING COURSE PLAN.

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Network Security Administrator

Cornerstones of Security

Developing Network Security Strategies

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Overview. Firewall Security. Perimeter Security Devices. Routers

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Internet Security Firewalls

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

CIS 156. Firewalls and Intrusion Detection

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

Firewalls. Mahalingam Ramkumar

21.4 Network Address Translation (NAT) NAT concept

Chapter 31 Network Security

Firewall Security. Presented by: Daminda Perera

Network Security and Firewall 1

Network Security Course Specifications

How To Understand A Firewall

Intranet, Extranet, Firewall

Network Security Topologies. Chapter 11

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

NETWORK SECURITY (W/LAB) Course Syllabus

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

CIT 480: Securing Computer Systems. Firewalls

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Firewalls, IDS and IPS

Network Security. Chapter 13. Internet Firewalls. Network Security (WS 07/08): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

7.0 Self Service Guide

How To Protect Your Network From Attack From Outside From Inside And Outside

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Proxy Services: Good Practice Guidelines

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER APPLICATIONS COURSE PLAN

Secure networks are crucial for IT systems and their

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Firewalls CSCI 454/554

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Chapter 9 Firewalls and Intrusion Prevention Systems

Firewalls. Chapter 3

ICAB5238B Build a highly secure firewall

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

How To Protect Your Network From Attack

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Proxies. Chapter 4. Network & Security Gildas Avoine

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Chapter 11 Cloud Application Development

Sage Accpac CRM 5.8. Self Service Guide

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

NIIT Education and Training, Doha, Qatar - Contact: /1798;

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

STREAM FRBC

Firewalls. Ahmad Almulhem March 10, 2012

Firewalls & Intrusion Detection

Campus Firewall. Bruce Campbell, IST Trevor Grove, CSCF

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

Transcription:

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN Course Code : CS0446 Course Title : Firewall Architecture Semester : VIII Course Duration : January 2015 April 2015 Day Hour Timing Day 1 4 11.25-12.15 Day 2 2, 4 9.35-10.25, 11.25-12.15 Day 3 Day 4 Day 5 Location : S.R.M. Faculty Details Gro up 1 Name Office Office hour Mail id Dr.T.PEER MEERA LABBAI 2 JEYASEKAR. A. 3 4 Mrs.R.MANGAL AGOWRI Mrs.G.NIRANJA NA 706A 703A 703A 803A peermeera.t@ktr.srmuniv.ac.in Jeyasekar.a@ktr.srmuniv.ac.in mangalagowri.r@ktr.srmuniv.ac.in niranjana.g@ktr.srmuniv.ac.in Required Text Books: 1. Elizabeth D Zwicky, Simon Cooper, D. Brent Chapman Building Internet Firewalls, Second edition, Shroff Publishers 2000 Prerequisite Nil

Objectives To study the network security To study the firewall technology and its architecture To design a firewall architecture To study the proxy systems and boston hosts To study the maintenance of firewall architecture Assessment Details Attendance : 5 Marks Cycle Test I : 10 Marks Cycle Test I : 10 Marks Model Exam : 20 Marks Surprise Test//Assign. : 5 Marks Test Schedule Total : 50 Marks S.No. DATE TEST DURATION 1 As per Calander Cycle Test I and II 2 periods 2 As per Calander Model Exam 3 Hrs Outcomes Students who have successfully completed this course will have full understanding of the following concepts Course outcome To understand the security mechanism provided in the internet To understand the concepts of firewall architecture and its types To understand the firewall architecture and its design criteria To understand the maintenance of firewall architecture Program outcome An ability to understand the security mechanism used in the Internet. An ability to understand the concepts of firewall and its types An Ability to design a firewall architecture for Internet. An ability to understand the maintenance of firewall architecture used in the Internet Detailed Session Plan

Network Security Sessi on No. 1 2 3 4 5 Internet firewalls Topics to be covered Internet services: secure services and safe services Email and news, file transfer, File sharing and printing Remote access, real time conferencing services Authentication and auditing services, databases, games Time (min) Ref Teaching Method Testing Method Open Discussion and Security strategies: Least privilege 6 7 Defense in depth, choke point, 8 9 Weakest link, fail safe stance universal-participation, simplicity Unit II FIREWALL TECHNOLOGIES AND ARCHITECTURE 10 11 Firewall technologies: Definitions, Packet filtering Proxy Services, Network Address Translation 12 Virtual Private Networks Surprise Test 13 Firewall architecture 14 Single box Architectures, 15 Screened Host Architectures, 16 Multiple Screened Subnets Architectures

17 18 Variations on firewall architectures, Terminal servers and modem pools Internal Firewalls Unit III FIREWALL DESIGN 19 20 21 22 Firewall design Packet Filtering, Configuring A Packet Filtering Router Packet Filtering Tips and rules Filtering by address 23 Filtering by service 24 25 26 27 Choosing a packet filtering router Implementations Where to do packet filtering What Rules should use for packet filtering Unit IV PROXY SYSTEMS AND BASTION HOSTS 28 Proxy systems, server terminology, SOCKS for proxying 29 TIS internal firewall toolkit for proxying 30 31 32 33 34 Bastion hosts, principles Choosing Machine And Location Locating Bastion Hosts, selecting services Disabling User Accounts, Building A Bastion Host Securing Disabling Non Required Services, Operating Bastion Hosts,, Comparative study Surprise Test Comparative study Comparative study

35 36 Protecting the machine Case study: Screened subnet architecture Merged Routers And Bastion Host Unit V MAINTAINING FIREWALLS 1 BB 37 Maintaining firewalls Comparative study 38 House Keeping Comparative study 39 Monitoring your systems 40 Keeping up to date 41 42 43 44 45 Two sample firewalls: Screened Subnet Architecture Screened Subnet Architecture - Continuation Screened Subnet Architecture - continuation Merged Routers And Bastion Host Using General Purpose Hardware Merged Routers And Bastion Host Using General Purpose Hardware - continuation Signature of the Staff (A. Jeyasekar) Signature of the HOD/CSE (Dr E.Poovammal)