1 / 22

Information Security Principle

Information Security Principle. University of Palestine. Ahmed abu sada 120070547. Firewall and VPN. Network Security. Outlines. Introduction Network Security Threats Firewalls Virtual Private Network security of wireless networks Conclusion. What is a Firewall?.

Download Presentation

Information Security Principle

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security Principle University of Palestine Ahmed abu sada 120070547

  2. Firewall and VPN Network Security

  3. Outlines • Introduction • Network Security Threats • Firewalls • Virtual Private Network • security of wireless networks • Conclusion

  4. What is a Firewall? A firewall's basic task is to transfer traffic between computer networks of different trust levels.

  5. Network Security Threats There are four general categories of security threats to the network: • Unstructured threats • Structured threats • External threats • Internal threats

  6. The Four Primary Attack Categories All of the following can be used to compromise your system: • Reconnaissance attacks • Access attacks • Denial of service attacks • Worm, Viruses and Trojan horses

  7. Reconnaissance Attacks Reconnaissance refers to the overall act of learning information about target network by using readily available information and application Using a packet sniffer software application (exploit information passed in clear text) (Protocols: Telnet, FTP, SNMP, and HTTP)

  8. Access Attacks In access attacks intruders attack networks to: • Retrieve data • Gain access • Escalate their access privileges

  9. Denial of Service Attacks Denial of service attacks occur when an intruder attacks your network in a way that damages or corrupts your computer system or denies you and others access to your network, systems, or services

  10. Firewalls A Firewall is a system or group of systems that manages access between two networks

  11. Firewalls • Firewalls define rules for inbound/outbound network traffic • Integration provides centralized policy management • Firewall Technologies

  12. VPN/Firewall Security Gateways

  13. Virtual Private Network • VPN is an extension of an enterprise’s private intranet across a public network such as the Internet, creating a secure private connection, essentially through a private tunnel • VPN securely convey information across the Internet connecting remote users, branch offices, and business partners into an extended corporate network

  14. Virtual Private Network • VPN provide protection from data interception of unprotected assets using secure connectivity, encryption, and traffic authentication • Company LANs and remote users can connect to the network using the same access methods that are used for Internet access: dialup, digital subscriber line (DSL), cable, ISDN, T1/E1, and wireless

  15. Security Considerations for VPNs A typical end-to-end data path might contain: • Several machines not under control of the corporation (for example, the ISP access box in a dial-in segment and the routers within the Internet) • A security gateway (firewall or router) that is located at the boundary between an internal segment and an external segment • An internal segment (intranet) that contains hosts and routers. some will carry a mix of intra-company and inter-company traffic • An external segment (Internet) that carries traffic not only from your company’s network but also from other sources

  16. VPN/Firewall Security Gateways

  17. security of wireless networks • Characterized by the concept of security as a broad and generalized to a large extent. Any "security" mean? • We start by defining the "context" the right of security for wireless network security study • We will review the security of wireless networks within the context of information security.

  18. Ensure the security of communications properties relate to the subject of this unit: * Confidentialityالسرية * Authentication. والتحقق من الهوية

  19. Confidentiality • That the information did not reach the people, processes or devices not authorized to access to this information. "Protection from unauthorized disclosure of information

  20. Authentication • "A security measure to ensure the validity of the call, the message source or way to verify the validity of a person to receive information of a specific classification."To verify the source of information

  21. المراجع: www.moe.gov.jo/school www.mydream5.jeeran.com www.mediacenre.tv/images www.educatorskonnect.com www.alexeng.edu.eg www.purdue.edu informationsecurity.iu.edu

  22. Thank You

More Related