160 likes | 329 Views
INTERNET SECURITY. Compiled by : S. Agarwal, Lecturer & Systems Incharge St. Xavier’s Computer Centre, St. Xavier’s College Kolkata. March-2003. The need for security
E N D
INTERNET SECURITY Compiled by : S. Agarwal, Lecturer & Systems Incharge St. Xavier’s Computer Centre, St. Xavier’s College Kolkata. March-2003 Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
The need for security Commercial & Government Enterprises are reluctant to use the Internet because of security concerns. Since Internet ultimately connects to a public network, the security concerns are very much valid. Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
Attacks on Routers/Routing infrastructure are more troublesome then attacking a single machine because most of the networks use Routing. The Internet currently uses BGP (Border Gateway Protocol) and TCP for transmission, the recent increase in TCP based attacks is an additional threat to BGP security. Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
The need for security is being alarmingly realized with the emergence of E-Commerce. Presently, E-Commerce operations are always threatened by fear of loss of money and privacy. Even E-mail is also under threat. When sent across the Internet, the E-mail can be intercepted and read by anybody who can lay his hands on it. To ensure the secrecy of the message the sender as well as the receiver should agree on a secret key. Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
In case of secret key, the key should be distributed to the recipient before the message can be sent to him. To overcome this logistical problem, public key cryptography was designed and is known as public key – private key pair. Another way of ensuring the secrecy of E-mail messages is through the use of a technique called signing a message. Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
Firewall Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
If you are planning to connect your organisation to Internet and your computers are accessed from remote places, you must have a Firewall to protect your Intranet. Firewall is defined as a group of systems that enforce an access control policy between two networks. In other words it is a mechanism used to protect trusted network from an untrusted network. Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
Firewall acts as a Gatekeeper between a companies internal network and the outside world. It acts as an electronic barrier to stop unauthorised entry. Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
A Firewall performs two basic functions :- • Gatekeeping – It examines the location from which the data enters your system and then decides based on your instructions whether or not to allow the information. Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
Monitoring – It includes login of all system activities and generation of reports for system administration. Monitoring can be active or passive. In active monitoring a firewall notifies a manager whenever an incidence occurs, generally by E-mail or Pager. In passive monitoring the manager has to go through the logs to determine and analyse the system activities. Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
Firewall Architecture : FIREWALL Inside protected Network Global outside Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
Drawbacks of Firewall Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
An Internet Firewall cannot protect against attacks that do not go through the Firewall. For example, if an unrestricted dial-out connection is permitted from inside the protected network the users can make a direct connection to the Internet. Savvy users who become irritated with the additional authentication required by the Firewall may be tempted to bypass the security system by purchasing a direct connection to an ISP. Since these types of connections bypass the security provided by the Firewall, they create a significant threat for backdoor attacks. Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
The Internet Firewall cannot protect against threats posed by traitors who may copy sensitive data into floppies and other media. A hacker may also persuade someone to reveal a password and grant him a temporary network access. Hence, there is a need to periodically change the passwords. Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
The Firewall cannot protect against the transfer of virus infected files or software. Hence, anti-viral software should be deployed at each desktop. Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net
Lastly the Internet Firewall cannot protect against data driven attacks. A data driven attacks occur when seemingly harmless data is mailed or copied to a computer and executed to launch a hidden attack. Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : sxcc@vsnl.net