ACCESS CONTROL TO A NETWORKED COMPUTER SYSTEM



Similar documents
CTS2134 Introduction to Networking. Module Network Security

Security. TestOut Modules

BeamYourScreen Security

MIKOGO SECURITY DOCUMENT

Cisco QuickVPN Installation Tips for Windows Operating Systems

Passing PCI Compliance How to Address the Application Security Mandates

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Chapter 7 Transport-Level Security

Fundamentals of Network Security - Theory and Practice-

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

7.1. Remote Access Connection

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Configuring User Identification via Active Directory

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Internet Privacy Options

How to Secure a Groove Manager Web Site

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

NetBrain Security Guidance

II. Implementation and Service Information

Chapter 17. Transport-Level Security

CCNA Security v1.0 Scope and Sequence

CISCO IOS NETWORK SECURITY (IINS)

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

Computer Networks. Secure Systems

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

CCNA Security 2.0 Scope and Sequence

Cornerstones of Security

Connecting an Android to a FortiGate with SSL VPN

Introduction of Intrusion Detection Systems

Implementing Cisco IOS Network Security v2.0 (IINS)

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Network Access Security. Lesson 10

How To Configure Apple ipad for Cyberoam L2TP

CCNA Security v1.0 Scope and Sequence

Xerox Mobile Print Cloud

Thick Client Application Security

Xerox DocuShare Security Features. Security White Paper

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Configuring Global Protect SSL VPN with a user-defined port

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Configuring Security Features of Session Recording

Achieving PCI-Compliance through Cyberoam

Setting Up Scan to SMB on TaskALFA series MFP s.

Advanced Authentication

Proxy firewalls.

HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity

Open Thunderbird. To set up an account in Thunderbird, from the Tools menu select Account Settings; choose account; then click Next.

Ficha técnica de curso Código: IFCAD111

Client Configuration Secure Socket Layer. Information Technology Services 2010

INTRUSION DETECTION SYSTEMS and Network Security

Clientless SSL VPN Users

How To Configure L2TP VPN Connection for MAC OS X client

WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition

State of Wisconsin DET File Transfer Protocol (FTP) Roles and Responsibilities

Remote Access Security

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Cisco Virtual Office Express

Introduction to Computer Security

GS1 Trade Sync Connectivity guide

Central Desktop Enterprise Edition (Security Pack)

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Chapter 10. Cloud Security Mechanisms

Network Security Protocols

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

Chapter 32 Internet Security

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

vcloud Director User's Guide

VPN. Date: 4/15/2004 By: Heena Patel

Implementing Core Cisco ASA Security (SASAC)

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

MadCap Software. Upgrading Guide. Pulse

Fig : Packet Filtering

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

WebEx Security Overview Security Documentation

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Network Security Essentials Chapter 5

Transport Layer Security Protocols

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

VoIPon Tel: +44 (0) Fax: +44 (0)

How To Understand And Understand The Security Of A Key Infrastructure

Getting a Secure Intranet

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

LifeSize Transit Deployment Guide June 2011

Section 12 MUST BE COMPLETED BY: 4/22

DIGIPASS Authentication for Cisco ASA 5500 Series

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly

Integrating LANGuardian with Active Directory

Protected Trust Setup Guide for Brother MFC Devices

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

Transcription:

Mestrado em Ciência da Informação Segurança da Informação 2013/2014 ACCESS CONTROL TO A NETWORKED COMPUTER SYSTEM André Pinto & Ricardo Silva

Summary 1 2 Introduction 1.1 Information Security 1.2 Work s Description Access Control 2.1 Authentication 2.2 Authorization 2.3 Accounting 2.4 Cookies

Summary 3 3.1 Security Systems 3.1.1 3.1.2 3.1.3 3.1.4 3.1.5 3.1.6 3.2 3.2.1 3.3 3.3.1 IDS - Intrusion detection system Network-Based IDS Network-Based IDS: Problems Host-Based IDS Host-Based IDS: Problems Disadvantages of Intrusion Detection System Software IPS - Intrusion prevention systems Software Firewall Disadvantages

Summary 4 5 6 3.4 TLS - Transport Layer Security & SSL - Secure Sockets Layer 3.4.1 Software 3.5 IPsec - IP Security Protocol 3.5.1 Software Theoretical-practice Approach and Conclusions Bibliographic References Figures Index

Introduction Information Security Two levels of security: physical and logical Confidentiality authorized personnel Integrity characteristics established by the creator Availability continuous access to information Tools that ensure Security

Introduction Work s Description In the last yeas information about new possible players for a club have been stolen and/or there are leaks of information which lead up to rivals stealing players discovered by other clubs. Build a system able to detect intrusions and prevent data loss, so players observed by a club are not "deflected" to the rival.

Access Control Common examples: door look; bodyguards. Access Control is divided in three big components: authentication, authorization and accounting. Advantages of Access Control: Access Control to some departments of a firm Register of visitants What did they do, when and for how much time. Access Control to car park Energy savings

Access Control - Authentication Answers to the question Who is? Authentication is based on: What the user knows (password) What the user has (smart card, credentials) Who is the user (fingerprint, voice) Where is the user (before or after the firewall) Username and password

Access Control - Authorization Answers to the question Which are the permissions of an user that has been identified? Permissions of reading, writing and execution Access Control Lists (ACL) Control the packages that are allowed and those that aren t (so they re blocked) in the interfaces of a router. There is only one host in a certain place How to configure a ACL? Creation of access lists (criteria) Access Lists application in interfaces

Access Control - Authorization Capabilities Pair (x, y) being x the name of an object and y a privilege set A subject has to present a capability or in order to access an object C-list (capability list) table with permissions and objects connections Cryptography

Access Control - Accounting Answers to the question What did the user do? Information retrieval about an user and dispatch of that information to a server or database Real time Accounting Batch Accounting Accounting is divided in two phases: Collection and organization of information Analysis of the information collected

Access Control - Cookies Most of them usually are text files designed to store information about the users so the administrator of the page the user has just visited can know what kind of information they are looking for or not. It also works out very well to memorize passwords and another data saving time for the user in the next time he visits the same webpage. May collect some personal information about the user which can be dangerous if the goes to the wrong hands.

Security Systems IDS IPS Firewall TLS & SSL IPsec

IDS Intrusion Detection System What is? Network-based Host-based Problems

IPS Intrusion Prevention System It is seen as an extension of the firewall that allows access to a system based on the content of the application you want to access on the system, offering a new form of security beyond the IP addresses and ports, services offered by firewalls.

Firewall A firewall is a mechanism that fosters the application of security rules at a point of a network within a network of computers, that point is usually a machine of a user associated with TCP / IP protocols. There is a great approximation between a firewall, IDS and IPS, which is essentially a firewall that combines the application and network levels and uses a reactive IDS, protecting the network.

TLS - Transport Layer Security & SSL - Secure Sockets Layer Used to check data integrity between systems on the web. Intended to encode information between two machines that are part of and are within the control network and may identify the responsible for the information to be transmitted. Provide security services to an email or navigation pages.

IPsec IP Security Protocol The IPsec works as an extension of the IP protocol, operating at the network layer, below the application and transport layers that the other systems previously viewed operate. Hashing Tunnel and Transport Modes

Theoretical and practical approach & Conclusion Registered machine Access Control IDS IPsec Problems and new system