SlideShare a Scribd company logo
1 of 51
INTERNET SECURITY
INSTR:-HC/RO TAPAN KUMAR KHILAR , FIT ,CTC (T&IT)
INTRODUCTION
Internet security refers to securing
communication over the internet . It includes
specific security protocols such as:-
1. Internet Security Protocol (IPSec)
2. Secure Socket layer(SSL)
Internet Security Protocol (IPSec)
It consists of a set of protocols designed by
internet Engineering Task Force(IETF).It
provides security at network level and helps to
create authenticated and confidential packets
for IP(Internet Protocol) layer.
Secure Socket layer(SSL)
It is a security protocol developed by Netscape
Communications Corporation . It provides
security at transport layer. It addresses the
following security issues:
Privacy
Integrity
Authentication
Threats
Internet security threats impact the network
,data security and other internet connected
systems.
Cyber criminals have evolved several techniques
to threat privacy and integrity of bank
accounts,business and organisations.
Following are some of the internet security
threats:-
Mobile worms,malware,spam,phishing etc.
SSL:- (SECURE SOCKETS LAYER)
1. It is a standard security technology for establishing an
encrypted link between a server and a client ,typically
a web server and a browser.
2. SSL allows sensitive information such as credit card
numbers ,social security numbers ,and login
credentials to be transmitted securely.
3. SSL protocols describes how algorithms should be
used ,in this case ,the SSL protocols determines
variables of the encryption for both the link and data
being transmitted.
4. Internet users have come to associate their online
security with the lock icon that comes with an SSL-
secured website or green address bar that comes
with an extended validation SSL-secured websites .
5. SSL-secured websites also begin with https rather
than http.
6. SSL certificates have a key pair:a public key and a
private key. These keys work together to establish
an encrypted connection.
7. The most important part of an SSL certificate is that
is digitally signed by a trusted CA (Certificate
Authority) like digicert.
CONTINUE……
WEB PROXY
1. A proxy server as a computer that acts as an intermediary
between the user’s computer and the internet.
2. It allows client computers to make indirect network connections
to other network services.
3. Proxy server uses for various purposes like
i- sharing internet connections on a local area network.
ii- hide our IP address.
iii- implement internet access control.
iv- access blocked websites etc.
4. A proxy server can acts as an intermediary to prevent from attack
and unexpected access.
5. To implement internet access control like authentication for
internet connection,bandwidth control,online time
control,internet web filter and content filter etc.
6. To bypass security restrictions and filters.
CONTINUE….
USE PROXY SERVER FOR IE (INTERNET EXPLORER):-
Click Tools – Internet options –connections-LAN setting-
select”use a proxy server for your LAN”-Advanced
USE PROXY SERVER FOR GOOGLE CHROME:-
Google setting- network tab –change proxy settings-
connections-LAN setting-select”use a proxy server for your LAN”-
Advanced
SSL:- (SECURE SOCKETS LAYER)
1. It is a standard security technology for establishing an
encrypted link between a server and a client ,typically
a web server and a browser.
2. SSL allows sensitive information such as credit card
numbers ,social security numbers ,and login
credentials to be transmitted securely.
3. SSL protocols describes how algorithms should be
used ,in this case ,the SSL protocols determines
variables of the encryption for both the link and data
being transmitted.
4. Internet users have come to associate their online
security with the lock icon that comes with an SSL-
secured website or green address bar that comes
with an extended validation SSL-secured websites .
5. SSL-secured websites also begin with https rather
than http.
6. SSL certificates have a key pair:a public key and a
private key. hese keys work together to establish an
encrypted connection.
7. The most important part of an SSL certificate is that
is digitally signed by a trusted CA (Certificate
Authority) like digicert.
CONTINUE……
WEB PROXY
1. A proxy server os a computer that acts as an intermediary
between the user’s computer and the internet.
2. It allows client computers to make indirect network connections
to other network services.
3. Proxy server uses for various purposes like
i- sharing internet connections on a local area network.
ii- hide our IP address.
iii- implement internet access control.
iv- access blocked websites etc.
4. A proxy server can acts as an intermediary to prevent from attack
and unexpected access.
5. To implement internet access control like authentication for
internet connection,bandwidth control,online time
control,internet web filter and content filter etc.
6. To bypass security restrictions and filters.
CONTINUE….
USE PROXY SERVER FOR IE (INTERNET EXPLORER):-
Click Tools – Internet options –connections-LAN setting-
select”use a proxy server for your LAN”-Advanced
USE PROXY SERVER FOR GOOGLE CHROME:-
Google setting- network tab –change proxy settings-
connections-LAN setting-select”use a proxy server for your LAN”-
Advanced
14
Firewalls
Effective means of protection a local
system or network of systems from
network-based security threats while
affording access to the outside world
via WAN`s or the Internet
Firewall Design
Principles
• The firewall is inserted between the
premises network and the Internet
• Aims:
– Establish a controlled link
– Protect the premises network from
Internet-based attacks
– Provide a single choke point
Firewall Characteristics
• Design goals:
– All traffic from inside to outside must
pass through the firewall (physically
blocking all access to the local network
except via the firewall)
– Only authorized traffic (defined by the
local security police) will be allowed to
pass
Firewall Characteristics
• Design goals:
– The firewall itself is immune to
penetration (use of trusted system with
a secure operating system)
Firewall Characteristics
• Four general techniques:
• Service control
– Determines the types of Internet services
that can be accessed, inbound or outbound
• Direction control
– Determines the direction in which
particular service requests are allowed to
flow
Firewall Characteristics
• User control
– Controls access to a service according to
which user is attempting to access it
• Behavior control
– Controls how particular services are used
(e.g. filter e-mail)
Types of Firewalls
• Three common types of Firewalls:
– Packet-filtering routers
– Application-level gateways
• Application-level Gateway
Net filtering
Internet service providers (ISPs) that block material
containing pornography, or controversial religious, political,
or news-related content en route are often utilised by
parents who do not permit their children to access content
not conforming to their personal beliefs.
Content filtering software can, however, also be used to
block malware and other content that is or contains hostile,
intrusive, or annoying material including adware, spam,
computer viruses, worms, trojan horses, and spyware.
Filters can be implemented in many different ways: by
software on a personal computer, via network
infrastructure such as proxy servers, DNS servers, or
firewalls that provide Internet access.
Browser based filters .
Browser based content filtering solution is the most
lightweight solution to do the content filtering, and is
implemented via a third party browser extension.
E-mail filters
E-mail filters act on information contained in the mail
body, in the mail headers such as sender and subject, and
e-mail attachments to classify, accept, or reject messages.
Types of filtering
Client-side filters.
This type of filter is installed as software on each
computer where filtering is required.This filter can
typically be managed, disabled or uninstalled by
anyone who has administrator-level privileges on
the system.
Network-based filtering .
This type of filter is implemented at the transport
layer as a transparent proxy, or at the application
layer as a web proxy.Filtering software may include
data loss prevention functionality to filter outbound
as well as inbound information.
Search-engine filters
Many search engines, such as Google offer users the
option of turning on a safety filter. When this safety filter
is activated, it filters out the inappropriate links from all
of the search results. If users know the actual URL of a
website that features explicit or adult content, they have
the ability to access that content without using a search
engine. Engines like Lycos, Yahoo, and Bing offer
childoriented versions of their engines that permit only
children friendly websites.
IP filtering
To provide security, an IP router can allow or
disallow the flow of very specific types of IP
traffic. This capability, called IP packet filtering,
provides a way for the network administrator to
precisely define what IP traffic is received and
sent by the router. IP packet filtering is an
important element of connecting corporate
intranets to public networks like the Internet.
Common IP Filtering Techniques
• Route filtering
• Firewall filtering
• Email filtering
Communication with IPSec protocol
Why IPsec?
• Internet Protocol (IP) is not secure – IP
protocol was designed in the early stages of the
Internet where security was not an issue – All
hosts in the network are known • Possible
security issues – Source spoofing – Replay
packets – No data integrity or confidentiality
Internet Protocol Security (IPSec)
• Layer 3 protocol for remote access,
intranet, and extranet VPNs
–Internet standard for VPNs
–Provides flexible encryption and
message authentication/integrity
IPsec Standards •
RFC 4301 “The IP Security Architecture” –
Defines the original IPsec architecture and
elements common to both AH and ESP •
RFC 4302 – Defines authentication headers (AH)
• RFC 4303 – Defines the Encapsulating
Security Payload (ESP) •
RFC 2408 – ISAKMP •
RFC 5996 – IKE v2 (Sept 2010) •
RFC 4835 – Cryptographic algorithm
implementation for ESP and AH
Benefits of IPsec
• Confidentiality – By encrypting data
• Integrity – Routers at each end of a tunnel
calculates the checksum or hash value of the
data
•Authentication – Signatures and certificates –
All these while still maintaining the ability to
route through existing IP networks
• Anti-replay protection – Optional; the sender
must provide it but the recipient may ignore
• Key management – IKE – session negotiation
and establishment – Sessions are rekeyed or
deleted automatically – Secret keys are securely
established and authenticated – Remote peer is
authenticated through varying options
VPN Encapsulation of Packets
RSA SecurID
4/26/2020
Agenda
• Introduction
• Components
– Tokens
– Server
– Algorithm
• Weaknesses
• Comparison
• Conclusion
• RSA SecurID – the standard for Three
scientist last name
RIVEST SHAMIR ADLEMAN
1. RON RIVEST
2. ADI SHAMIR
3. LEONARD ADLEMAN
4/26/2020
Components of the SecurID® System
• Tokens
• Authentication Server
• Algorithm
PASSCODE = +PIN TOKENCODE
Two-factor Authentication
with RSA SecurID
PIN TOKENCODE
Login: GLAU
Passcode: 2468234836
Token code:
Changes every 60
seconds
Unique seed
Internal battery
Clock synchronized
to UCT (Universal
Coordinate Time) /
GMT(Greenwich
Mean Time)
User enters Passcode
(PIN + token code)
User
Authenticated!
Authentication
Manager
Authentication
Agent
Calculates
passcode
RSA SecurID Authentication
Solution
RSA SecurID
Time Synchronous Two-Factor Authentication
RSA
Authentication
Manager
RAS,
VPN,
Web Server,
WAP
etc.
RSA Authentication
Agent
SeedTime
Algorithm
SeedTime
032848
Algorithm
Same Seed
Same Time
4/26/2020
Components of the SecurID® System
• Authentication Server
–Maintains database of user assigned
tokens
–Generates pass code following the same
algorithm as the token
–Seed – similar to symmetric key
4/26/2020
Components of the SecurID® System
• Algorithm
–Brainard’s Hashing Algorithm
–AES Hashing Algorithm
4/26/2020
Comparison to Password Systems
• Password systems are built-in, no
additional implementation cost?
–Administration Costs
–Security Costs
• SecurID
–No need to regularly change passwords
–No changes as long as tokens
uncompromised (and hash function)

More Related Content

What's hot (20)

Computer security and
Computer security andComputer security and
Computer security and
 
Cia security model
Cia security modelCia security model
Cia security model
 
Network security
Network security Network security
Network security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network security
Network securityNetwork security
Network security
 
Email security
Email securityEmail security
Email security
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security
Computer securityComputer security
Computer security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Computer security
Computer securityComputer security
Computer security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Social engineering
Social engineering Social engineering
Social engineering
 

Similar to Internet security

Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdfAschalewAyele2
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for securityAyan974999
 
Securing Web Application, Services and Servers
Securing Web Application, Services and ServersSecuring Web Application, Services and Servers
Securing Web Application, Services and ServersDr.S.Jagadeesh Kumar
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commercehidivin652
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetVi Tính Hoàng Nam
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 
SECURING THE WEB DOMAIN BASED ON HASHING
SECURING THE WEB DOMAIN BASED ON HASHINGSECURING THE WEB DOMAIN BASED ON HASHING
SECURING THE WEB DOMAIN BASED ON HASHINGAM Publications
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsPalani Kumar
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)Pasquale Tursi
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptxssuserd24233
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Network security
Network securityNetwork security
Network securityAli Kamil
 

Similar to Internet security (20)

Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for security
 
Securing Web Application, Services and Servers
Securing Web Application, Services and ServersSecuring Web Application, Services and Servers
Securing Web Application, Services and Servers
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Network security
Network securityNetwork security
Network security
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internet
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
SECURING THE WEB DOMAIN BASED ON HASHING
SECURING THE WEB DOMAIN BASED ON HASHINGSECURING THE WEB DOMAIN BASED ON HASHING
SECURING THE WEB DOMAIN BASED ON HASHING
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Network security
Network securityNetwork security
Network security
 

More from Tapan Khilar

CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
SNMP_ network monitoring.pptx
SNMP_ network monitoring.pptxSNMP_ network monitoring.pptx
SNMP_ network monitoring.pptxTapan Khilar
 
cctv setup (2).pptx
cctv setup (2).pptxcctv setup (2).pptx
cctv setup (2).pptxTapan Khilar
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxTapan Khilar
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
Snmp network monitoring
Snmp  network monitoringSnmp  network monitoring
Snmp network monitoringTapan Khilar
 
Server operating system
Server operating systemServer operating system
Server operating systemTapan Khilar
 
Memory and storage
Memory and storageMemory and storage
Memory and storageTapan Khilar
 
Input and output device
Input and output deviceInput and output device
Input and output deviceTapan Khilar
 
I series processor
I series  processorI series  processor
I series processorTapan Khilar
 
Computer networking
Computer networkingComputer networking
Computer networkingTapan Khilar
 

More from Tapan Khilar (20)

CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
SNMP_ network monitoring.pptx
SNMP_ network monitoring.pptxSNMP_ network monitoring.pptx
SNMP_ network monitoring.pptx
 
cctv setup (2).pptx
cctv setup (2).pptxcctv setup (2).pptx
cctv setup (2).pptx
 
FIBER OPTICS .ppt
FIBER OPTICS .pptFIBER OPTICS .ppt
FIBER OPTICS .ppt
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Acl cisco
Acl ciscoAcl cisco
Acl cisco
 
Data security
Data securityData security
Data security
 
Snmp network monitoring
Snmp  network monitoringSnmp  network monitoring
Snmp network monitoring
 
Server operating system
Server operating systemServer operating system
Server operating system
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Network switch
Network switchNetwork switch
Network switch
 
Network devices
Network devicesNetwork devices
Network devices
 
Memory and storage
Memory and storageMemory and storage
Memory and storage
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Input and output device
Input and output deviceInput and output device
Input and output device
 
I series processor
I series  processorI series  processor
I series processor
 
Computer networking
Computer networkingComputer networking
Computer networking
 

Recently uploaded

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 

Recently uploaded (20)

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 

Internet security

  • 1. INTERNET SECURITY INSTR:-HC/RO TAPAN KUMAR KHILAR , FIT ,CTC (T&IT)
  • 2. INTRODUCTION Internet security refers to securing communication over the internet . It includes specific security protocols such as:- 1. Internet Security Protocol (IPSec) 2. Secure Socket layer(SSL)
  • 3. Internet Security Protocol (IPSec) It consists of a set of protocols designed by internet Engineering Task Force(IETF).It provides security at network level and helps to create authenticated and confidential packets for IP(Internet Protocol) layer.
  • 4. Secure Socket layer(SSL) It is a security protocol developed by Netscape Communications Corporation . It provides security at transport layer. It addresses the following security issues: Privacy Integrity Authentication
  • 5. Threats Internet security threats impact the network ,data security and other internet connected systems. Cyber criminals have evolved several techniques to threat privacy and integrity of bank accounts,business and organisations. Following are some of the internet security threats:- Mobile worms,malware,spam,phishing etc.
  • 6. SSL:- (SECURE SOCKETS LAYER) 1. It is a standard security technology for establishing an encrypted link between a server and a client ,typically a web server and a browser. 2. SSL allows sensitive information such as credit card numbers ,social security numbers ,and login credentials to be transmitted securely. 3. SSL protocols describes how algorithms should be used ,in this case ,the SSL protocols determines variables of the encryption for both the link and data being transmitted.
  • 7. 4. Internet users have come to associate their online security with the lock icon that comes with an SSL- secured website or green address bar that comes with an extended validation SSL-secured websites . 5. SSL-secured websites also begin with https rather than http. 6. SSL certificates have a key pair:a public key and a private key. These keys work together to establish an encrypted connection. 7. The most important part of an SSL certificate is that is digitally signed by a trusted CA (Certificate Authority) like digicert. CONTINUE……
  • 8. WEB PROXY 1. A proxy server as a computer that acts as an intermediary between the user’s computer and the internet. 2. It allows client computers to make indirect network connections to other network services. 3. Proxy server uses for various purposes like i- sharing internet connections on a local area network. ii- hide our IP address. iii- implement internet access control. iv- access blocked websites etc. 4. A proxy server can acts as an intermediary to prevent from attack and unexpected access. 5. To implement internet access control like authentication for internet connection,bandwidth control,online time control,internet web filter and content filter etc. 6. To bypass security restrictions and filters.
  • 9. CONTINUE…. USE PROXY SERVER FOR IE (INTERNET EXPLORER):- Click Tools – Internet options –connections-LAN setting- select”use a proxy server for your LAN”-Advanced USE PROXY SERVER FOR GOOGLE CHROME:- Google setting- network tab –change proxy settings- connections-LAN setting-select”use a proxy server for your LAN”- Advanced
  • 10. SSL:- (SECURE SOCKETS LAYER) 1. It is a standard security technology for establishing an encrypted link between a server and a client ,typically a web server and a browser. 2. SSL allows sensitive information such as credit card numbers ,social security numbers ,and login credentials to be transmitted securely. 3. SSL protocols describes how algorithms should be used ,in this case ,the SSL protocols determines variables of the encryption for both the link and data being transmitted.
  • 11. 4. Internet users have come to associate their online security with the lock icon that comes with an SSL- secured website or green address bar that comes with an extended validation SSL-secured websites . 5. SSL-secured websites also begin with https rather than http. 6. SSL certificates have a key pair:a public key and a private key. hese keys work together to establish an encrypted connection. 7. The most important part of an SSL certificate is that is digitally signed by a trusted CA (Certificate Authority) like digicert. CONTINUE……
  • 12. WEB PROXY 1. A proxy server os a computer that acts as an intermediary between the user’s computer and the internet. 2. It allows client computers to make indirect network connections to other network services. 3. Proxy server uses for various purposes like i- sharing internet connections on a local area network. ii- hide our IP address. iii- implement internet access control. iv- access blocked websites etc. 4. A proxy server can acts as an intermediary to prevent from attack and unexpected access. 5. To implement internet access control like authentication for internet connection,bandwidth control,online time control,internet web filter and content filter etc. 6. To bypass security restrictions and filters.
  • 13. CONTINUE…. USE PROXY SERVER FOR IE (INTERNET EXPLORER):- Click Tools – Internet options –connections-LAN setting- select”use a proxy server for your LAN”-Advanced USE PROXY SERVER FOR GOOGLE CHROME:- Google setting- network tab –change proxy settings- connections-LAN setting-select”use a proxy server for your LAN”- Advanced
  • 14. 14 Firewalls Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet
  • 15. Firewall Design Principles • The firewall is inserted between the premises network and the Internet • Aims: – Establish a controlled link – Protect the premises network from Internet-based attacks – Provide a single choke point
  • 16. Firewall Characteristics • Design goals: – All traffic from inside to outside must pass through the firewall (physically blocking all access to the local network except via the firewall) – Only authorized traffic (defined by the local security police) will be allowed to pass
  • 17. Firewall Characteristics • Design goals: – The firewall itself is immune to penetration (use of trusted system with a secure operating system)
  • 18. Firewall Characteristics • Four general techniques: • Service control – Determines the types of Internet services that can be accessed, inbound or outbound • Direction control – Determines the direction in which particular service requests are allowed to flow
  • 19. Firewall Characteristics • User control – Controls access to a service according to which user is attempting to access it • Behavior control – Controls how particular services are used (e.g. filter e-mail)
  • 20. Types of Firewalls • Three common types of Firewalls: – Packet-filtering routers – Application-level gateways
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Net filtering Internet service providers (ISPs) that block material containing pornography, or controversial religious, political, or news-related content en route are often utilised by parents who do not permit their children to access content not conforming to their personal beliefs. Content filtering software can, however, also be used to block malware and other content that is or contains hostile, intrusive, or annoying material including adware, spam, computer viruses, worms, trojan horses, and spyware.
  • 29. Filters can be implemented in many different ways: by software on a personal computer, via network infrastructure such as proxy servers, DNS servers, or firewalls that provide Internet access. Browser based filters . Browser based content filtering solution is the most lightweight solution to do the content filtering, and is implemented via a third party browser extension. E-mail filters E-mail filters act on information contained in the mail body, in the mail headers such as sender and subject, and e-mail attachments to classify, accept, or reject messages. Types of filtering
  • 30. Client-side filters. This type of filter is installed as software on each computer where filtering is required.This filter can typically be managed, disabled or uninstalled by anyone who has administrator-level privileges on the system. Network-based filtering . This type of filter is implemented at the transport layer as a transparent proxy, or at the application layer as a web proxy.Filtering software may include data loss prevention functionality to filter outbound as well as inbound information.
  • 31. Search-engine filters Many search engines, such as Google offer users the option of turning on a safety filter. When this safety filter is activated, it filters out the inappropriate links from all of the search results. If users know the actual URL of a website that features explicit or adult content, they have the ability to access that content without using a search engine. Engines like Lycos, Yahoo, and Bing offer childoriented versions of their engines that permit only children friendly websites.
  • 32. IP filtering To provide security, an IP router can allow or disallow the flow of very specific types of IP traffic. This capability, called IP packet filtering, provides a way for the network administrator to precisely define what IP traffic is received and sent by the router. IP packet filtering is an important element of connecting corporate intranets to public networks like the Internet.
  • 33. Common IP Filtering Techniques • Route filtering • Firewall filtering • Email filtering
  • 34. Communication with IPSec protocol Why IPsec? • Internet Protocol (IP) is not secure – IP protocol was designed in the early stages of the Internet where security was not an issue – All hosts in the network are known • Possible security issues – Source spoofing – Replay packets – No data integrity or confidentiality
  • 35. Internet Protocol Security (IPSec) • Layer 3 protocol for remote access, intranet, and extranet VPNs –Internet standard for VPNs –Provides flexible encryption and message authentication/integrity
  • 36. IPsec Standards • RFC 4301 “The IP Security Architecture” – Defines the original IPsec architecture and elements common to both AH and ESP • RFC 4302 – Defines authentication headers (AH) • RFC 4303 – Defines the Encapsulating Security Payload (ESP) • RFC 2408 – ISAKMP • RFC 5996 – IKE v2 (Sept 2010) • RFC 4835 – Cryptographic algorithm implementation for ESP and AH
  • 37. Benefits of IPsec • Confidentiality – By encrypting data • Integrity – Routers at each end of a tunnel calculates the checksum or hash value of the data •Authentication – Signatures and certificates – All these while still maintaining the ability to route through existing IP networks
  • 38. • Anti-replay protection – Optional; the sender must provide it but the recipient may ignore • Key management – IKE – session negotiation and establishment – Sessions are rekeyed or deleted automatically – Secret keys are securely established and authenticated – Remote peer is authenticated through varying options
  • 39.
  • 40.
  • 43. 4/26/2020 Agenda • Introduction • Components – Tokens – Server – Algorithm • Weaknesses • Comparison • Conclusion
  • 44. • RSA SecurID – the standard for Three scientist last name RIVEST SHAMIR ADLEMAN 1. RON RIVEST 2. ADI SHAMIR 3. LEONARD ADLEMAN
  • 45. 4/26/2020 Components of the SecurID® System • Tokens • Authentication Server • Algorithm
  • 46. PASSCODE = +PIN TOKENCODE Two-factor Authentication with RSA SecurID PIN TOKENCODE Login: GLAU Passcode: 2468234836 Token code: Changes every 60 seconds Unique seed Internal battery Clock synchronized to UCT (Universal Coordinate Time) / GMT(Greenwich Mean Time)
  • 47. User enters Passcode (PIN + token code) User Authenticated! Authentication Manager Authentication Agent Calculates passcode RSA SecurID Authentication Solution
  • 48. RSA SecurID Time Synchronous Two-Factor Authentication RSA Authentication Manager RAS, VPN, Web Server, WAP etc. RSA Authentication Agent SeedTime Algorithm SeedTime 032848 Algorithm Same Seed Same Time
  • 49. 4/26/2020 Components of the SecurID® System • Authentication Server –Maintains database of user assigned tokens –Generates pass code following the same algorithm as the token –Seed – similar to symmetric key
  • 50. 4/26/2020 Components of the SecurID® System • Algorithm –Brainard’s Hashing Algorithm –AES Hashing Algorithm
  • 51. 4/26/2020 Comparison to Password Systems • Password systems are built-in, no additional implementation cost? –Administration Costs –Security Costs • SecurID –No need to regularly change passwords –No changes as long as tokens uncompromised (and hash function)