220 likes | 355 Views
Information Security Principle. University of Palestine. Ahmed abu sada 120070547. Firewall and VPN. Network Security. Outlines. Introduction Network Security Threats Firewalls Virtual Private Network security of wireless networks Conclusion. What is a Firewall?.
E N D
Information Security Principle University of Palestine Ahmed abu sada 120070547
Firewall and VPN Network Security
Outlines • Introduction • Network Security Threats • Firewalls • Virtual Private Network • security of wireless networks • Conclusion
What is a Firewall? A firewall's basic task is to transfer traffic between computer networks of different trust levels.
Network Security Threats There are four general categories of security threats to the network: • Unstructured threats • Structured threats • External threats • Internal threats
The Four Primary Attack Categories All of the following can be used to compromise your system: • Reconnaissance attacks • Access attacks • Denial of service attacks • Worm, Viruses and Trojan horses
Reconnaissance Attacks Reconnaissance refers to the overall act of learning information about target network by using readily available information and application Using a packet sniffer software application (exploit information passed in clear text) (Protocols: Telnet, FTP, SNMP, and HTTP)
Access Attacks In access attacks intruders attack networks to: • Retrieve data • Gain access • Escalate their access privileges
Denial of Service Attacks Denial of service attacks occur when an intruder attacks your network in a way that damages or corrupts your computer system or denies you and others access to your network, systems, or services
Firewalls A Firewall is a system or group of systems that manages access between two networks
Firewalls • Firewalls define rules for inbound/outbound network traffic • Integration provides centralized policy management • Firewall Technologies
Virtual Private Network • VPN is an extension of an enterprise’s private intranet across a public network such as the Internet, creating a secure private connection, essentially through a private tunnel • VPN securely convey information across the Internet connecting remote users, branch offices, and business partners into an extended corporate network
Virtual Private Network • VPN provide protection from data interception of unprotected assets using secure connectivity, encryption, and traffic authentication • Company LANs and remote users can connect to the network using the same access methods that are used for Internet access: dialup, digital subscriber line (DSL), cable, ISDN, T1/E1, and wireless
Security Considerations for VPNs A typical end-to-end data path might contain: • Several machines not under control of the corporation (for example, the ISP access box in a dial-in segment and the routers within the Internet) • A security gateway (firewall or router) that is located at the boundary between an internal segment and an external segment • An internal segment (intranet) that contains hosts and routers. some will carry a mix of intra-company and inter-company traffic • An external segment (Internet) that carries traffic not only from your company’s network but also from other sources
security of wireless networks • Characterized by the concept of security as a broad and generalized to a large extent. Any "security" mean? • We start by defining the "context" the right of security for wireless network security study • We will review the security of wireless networks within the context of information security.
Ensure the security of communications properties relate to the subject of this unit: * Confidentialityالسرية * Authentication. والتحقق من الهوية
Confidentiality • That the information did not reach the people, processes or devices not authorized to access to this information. "Protection from unauthorized disclosure of information
Authentication • "A security measure to ensure the validity of the call, the message source or way to verify the validity of a person to receive information of a specific classification."To verify the source of information
المراجع: www.moe.gov.jo/school www.mydream5.jeeran.com www.mediacenre.tv/images www.educatorskonnect.com www.alexeng.edu.eg www.purdue.edu informationsecurity.iu.edu