Security
Upcoming SlideShare
Loading in...5
×
 

Security

on

  • 658 views

 

Statistics

Views

Total Views
658
Views on SlideShare
658
Embed Views
0

Actions

Likes
0
Downloads
4
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Firewall Categorization Methods Firewalls can be categorized by: processing mode, development era, or intended structure.
  • First generation firewalls are static packet filtering firewalls and filter packets according to their headers as the packets travel to and from the organization’s networks. Second generation firewalls are application-level firewalls or proxy servers — dedicated systems that are separate from the filtering router and that provide intermediate services for requestors. Third generation firewalls are stateful inspection firewalls, and monitor network connections between internal and external systems using state tables. Fourth generation firewalls are dynamic packet filtering firewalls and allow only a particular packet with a particular source, destination, and port address to enter. Fifth generation firewalls are kernel proxy and are a specialized form that works under the Windows NT Executive, which is the kernel of Windows NT.
  • There are a number of popular symmetric encryption cryptosystems. One of the most familiar is Data Encryption Standard (DES), developed in 1977 by IBM and based on the Data Encryption Algorithm (DEA). DEA uses a 64-bit block size and a 56-bit key. The algorithm begins by adding parity bits to the key (resulting in 64 bits) and then apples the key in 16 rounds of XOR, substitution, and transposition operations. With a 56 bit key, the algorithm has 256 possible keys to choose from (over 72 quadrillion). DES is a federally approved standard for nonclassified data. DES was cracked in 1997 when Rivest-Shamir-Aldeman (RSA) put a bounty on the algorithm. RSA offered a $10,000 reward for the first person or team to crack the algorithm. Fourteen thousand users collaborated over the Internet to finally break the encryption.
  • Asymmetric Encryption Another category of encryption techniques is asymmetric encryption, also known as public key encryption. Whereas the symmetric encryption systems are based on a single key to both encrypt and decrypt a message, asymmetric encryption uses two different keys. Either key can be used to encrypt or decrypt the message, however, if Key A is used to encrypt the message, only Key B can decrypt, and if Key B is used to encrypt a message, only Key A can decrypt it. The public key is stored in a public location, where anyone can use it. The private key, as its name suggests, is a secret known only to the owner of the key pair. The problem with asymmetric encryption is that it requires four keys to hold a single conversation between two parties. Asymmetric encryption is not as efficient as symmetric encryptions in terms of CPU computations. As a result, the hybrid system described in the section on Public Key Infrastructure is more commonly used, instead of a pure asymmetric system.

Security Security Presentation Transcript

  • Firewall Categorization Methods
    • Firewalls can be categorized by processing mode, development era, or intended structure
    • Five processing modes that firewalls can be categorized by are:
      • Packet filtering
      • Application gateways
      • Circuit gateways
      • MAC layer firewalls
      • Hybrids
  •  
  •  
  • Firewalls Categorized by Development Generation
    • First generation : static packet filtering firewalls
    • Second generation : application-level firewalls or proxy servers
    • Third generation : stateful inspection firewalls
    • Fourth generation : dynamic packet filtering firewalls; allow only packets with particular source, destination and port addresses to enter
    • Fifth generation : kernel proxies; specialized form working under kernel of Windows NT
  •  
  • Packet Filters
    • Either block or allow transmission of packets of information based on criteria such as port, IP address, and protocol
    • Review the header, strip it off, and replace it with a new header before sending it to a specific location within the network
    • Fundamental components of firewalls
  • Viewing Header Contents
  • The Use of Rules
  • The Use of Rules
  •  
  • Stateful Packet Filtering
  • Dual-Homed Host Proxy Server Configuration
  •  
  • Figure 8-3 Symmetric Encryption Example
  • Cryptographic Algorithms
    • Data Encryption Standard (DES): one of most popular symmetric encryption cryptosystems
      • 64-bit block size; 56-bit key
      • Adopted by NIST in 1976 as federal standard for encrypting non-classified information
    • Triple DES (3DES): created to provide security far beyond DES
    • Advanced Encryption Standard (AES): developed to replace both DES and 3DES
  • Cryptographic Algorithms
    • Asymmetric Encryption (public key encryption)
      • Uses two different but related keys; either key can encrypt or decrypt message
      • If Key A encrypts message, only Key B can decrypt
      • Highest value when one key serves as private key and the other serves as public key
  • Figure 8-4 Using Public Keys
  •  
  • A Public Key Generated by PGP
  • Network Address Translation (NAT)
    • Used, by most firewalls, to shield a private network from outside interference
      • Translates between private addresses inside a network and public addresses outside the network
      • Done transparently (unnoticed by external computers)
      • Internal IP addresses remain hidden
    • Performed by NAT proxy servers
      • Uses an address table to do translations
      • Ex: a computer inside accesses a computer outside
        • Change source IP address to its own address
        • Change source port number to a unique number
          • Used as an index to the original source IP address
        • Performs reverse operations for response packets
  • Network Address Translation (NAT) NAT Firewall Client From 172.47.9.6, Port 31789 From 192.168.34.2, Port 13472 Internet Server Host IP Addr 172.47.9.6 … Port 31789 … IP Addr 192.168.34.2 … Port 13472 … Internal External Translation Table 1 2
  • Network Address Translation (NAT) NAT Firewall Client Internet Server Host To 172.47.9.6, Port 31789 To 192.168.34.2, Port 13472 Translation Table IP Addr 172.47.9.6 … Port 31789 … IP Addr 192.168.34.2 … Port 13472 … Internal External 4 3
  • Tunneling Protocols Used with VPNs
    • IPSec
    • PPTP (Point-to-Point Tunneling Protocol)
    • L2TP (Layer 2 Tunneling Protocol)
    • PPP over SSL (Point-to-Point Protocol over Secure Sockets Layer)
  • IPSec
    • IPSec provides:
      • Encryption of the data part of packets
      • Authentication
      • Encapsulation between two VPN hosts
      • Two security methods (AH and ESP)
      • Capability to work in two modes (transport and tunnel)
  • PPTP
    • Developed by Microsoft for granting VPN access to remote users over dial-up connections
    • Uses Microsoft Point-to-Point Encryption (MPPE) to encrypt data
    • Useful if support for older clients is needed
    • Compatible with Network Address Translation (NAT)
    • Replaced by L2TP
  • L2TP
    • Extension to PPP that enables dial-up users to establish a VPN connection to a remote access server
    • Uses IPSec to encrypt data
    • Incompatible with NAT but provides a higher level of encryption and authentication
  • PPP Over SSL
    • UNIX based method for creating VPNs
    • Both combine existing tunnel system (PPP) with a way of encrypting data in transport (SSL)
      • SSL
        • Public key encryption system used to provide secure communications over the Web
  •  
  • Detecting Unauthorized Access
    • Intrusion Detection Systems (IDSs):
      • Network-based IDSs
        • Install IDS sensors on network circuits and monitor packets
        • Reports intrusions to IDS Management Console
      • Host-based IDSs
        • Monitor all activity on the server as well as incoming server traffic
      • Application-based IDSs
        • Special form of host-based IDSs
        • Monitor just one application, such as a Web server
  • Techniques Used by IDSs
    • Misuse detection
      • Compares monitored activities with signatures of known attacks
      • If an attack is recognized the IDS issues an alert and discards the packet
      • Challenge: keep database current
    • Anomaly detection
      • Operates in stable computing environments
      • Looks for major deviations from the “normal” parameters of network operation
        • e.g., a large number of failed logins
      • When detected, an alert is issued, packets discarded
      • Problem: false alarms (valid traffic different from normal)
  • Use of IDSs with Firewalls