SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Unit08:
Security Protocols
Overview
• Network Security
• IPSec
• VPN Protocol
• Kerberos
• Smart Cards
• Firewalls
• Proxy Servers
Network Security
• Security protocols protect a computer from attacks
• Networks and data are vulnerable to both active attacks,
in which information is altered or destroyed, and passive
attacks, in which information is monitored
• Types of Attacks :
– Altering data.
– Eavesdropping eg:sniffing
– IP/mac address spoofing eg:cheating
– Password pilfering eg:guessing
– Denial of service
– Virus
IPSec
• Based on cryptography /encryption
• ensures the privacy of network traffic as well as its authentication.
• IPSec functions at the Network layer
• The fact that IPSec is a network-layer protocol makes its services
transparent to applications
• IPSec ensures that data cannot be tampered with while it is
traversing any part of the network
IPSec
• Hands On Lab on Ipsec : gpedit.msc
• ICMP
– Authentication method:
– Keberos
– PreShared
– Certificates
VPN Protocols
• Virtual private networking is a system of creating a
private network connection that travels through a public
network
• One of the top considerations for using a VPN is to
reduce costs
• L2TP
– L2TP is a VPN protocol used along with IPSec to
ensure confidentiality of the data transmission
– PPTP Point-to-Point Tunneling Protocol courtesy of
Microsoft and Cisco’s Layer 2 Forwarding (L2F)
protocol
VPN
• Why Use L2TP Instead of PPTP
– L2TP client is included in Windows 2000 and later
operating systems
– L2TP supports both Cisco TACACS+ and Remote
Authentication Dial-In User Service (RADIUS)
authentication
– L2TP was developed to be a standard that is already
natively supported by Cisco routers and Windows
2000 servers
– offers a much higher level of security than PPTP
– L2TP offers a wider variety of protocols than PPTP—
supporting not only TCP/IP but also IPX/SPX and
Systems Network Architecture (SNA)
Secure Sockets Layer (SSL)
• SSL is a protocol that uses a public key to encrypt the
data transmitted across the Internet
• SSL runs transparently to applications, because it sits
below upper-layer applications and above the IP
• Working on behalf of upper-layer protocols, the SSL
server authenticates itself using a certificate and public
ID to an SSL-enabled client, which includes both
Netscape Navigator and Microsoft Internet Explorer Web
browsers, and others
SSL
SSL
• The SSL client ensures that the server’s certificate has
been issued by a trusted certificate authority (CA), it
authenticates itself back to the server using the same
process, and an encrypted link is created between the
two
• During the ensuing data transmission, SSL enacts a
mechanism to ensure that the data is not tampered with
before it reaches its destination
SSL is able to use several different types
of ciphers
• Data encryption standard (DES) and Triple DES.
– DES is a private key exchange that applies a 56-bit key to each 64-bit
block of data. Triple DES is the application of three DES keys in
succession.
• Key Exchange Algorithm (KEA).
– KEA enables the client and server to establish mutual keys to use in
encryption.
• Message Digest version 5 (MD5).
– This cipher creates a 128-bit message digest to validate data.
• Rivest-Shamir-Adleman (RSA).
– This is the most commonly used key exchange for SSL. It works by
multiplying two large prime numbers, and through an algorithm
determining both public and private keys. The private key does not need
to be transmitted across the Internet but is able to decrypt the data
transmitted with the public key.
• Secure Hash Algorithm (SHA).
– SHA produces a message digest of 160 bits using the SHA-1 80-bit key
to authenticate the message.
Client makes certain that the SSL server’s
certificate is issued by a trusted CA
Clients are authenticated by SSL servers
Kerberos
• Kerberos is an authentication protocol that is used to
establish trust relationships between domains and verify
the identities of users and network services
• When an entity attempts to access a Kerberos-protected
resource and provides correct authentication information,
Kerberos issues a ticket to it
• The ticket is actually a temporary certificate
• Each process requires a complex mutual authentication,
but this is completely transparent to the user
Kerberos
• Kerberos Trust Relationships
– Kerberos trust relationships
are typically transitive and
bidirectional in nature
– Wherever a Kerberos trust
exists, the users in one
domain will be able to
access resources in the
other domain as long as
the administrator has
granted those users
access
Smart Cards
• A way to ensure secure authentication using a physical
key
• Smart cards contain chips to store a user’s private key
and can also store logon information
• Smart cards require Public Key Infrastructure (PKI), a
method of distributing encryption keys and certificates
Firewall
• Piece of equipment is actually a router with two interfaces—one
leading to the public network and the other to the private network
• One of the methods a firewall uses to secure the network is packet
filtering
• For packets that meet firewall rules, they are either permitted or
blocked, depending on how the rule is implemented
• Firewalls are useful for protecting the network from unauthorized
access to data
• A firewall uses an access control list for all the commands to
execute packet filters
• When implementing a new firewall, you should review every
application that must function across the firewall.
Firewall
Firewall
• Demilitarized Zones
– demilitarized zone (DMZ) is an offshoot from a firewall
– DMZ is a middle area that offers more freedom of access from
the Internet
– DMZ is to provide access to certain servers, such as a Web
server or e-mail server, yet protects your network
Proxy Servers
• For a more sophisticated and secure method of blocking and
permitting traffic, you need to use a proxy server
• A proxy server doesn’t permit traffic to pass through it between
networks
• examine each packet up to the application layer and reassemble a
new packet for the other network
• the proxy server is able to log traffic and perform audits

Weitere ähnliche Inhalte

Was ist angesagt?

BSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALBSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINAL
Glenn Haley
 

Was ist angesagt? (20)

CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
 
CNIT 123 12: Cryptography
CNIT 123 12: CryptographyCNIT 123 12: Cryptography
CNIT 123 12: Cryptography
 
20 palo alto site to site
20 palo alto site to site20 palo alto site to site
20 palo alto site to site
 
SSL
SSLSSL
SSL
 
PKI & SSL
PKI & SSLPKI & SSL
PKI & SSL
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
IWMW 1998: Server Management (3) Controlling access
IWMW 1998: Server Management (3) Controlling accessIWMW 1998: Server Management (3) Controlling access
IWMW 1998: Server Management (3) Controlling access
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
 
BSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALBSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINAL
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSL
 
Firewall traversals
Firewall traversalsFirewall traversals
Firewall traversals
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography by Afroz haider mir
Cryptography by Afroz haider mirCryptography by Afroz haider mir
Cryptography by Afroz haider mir
 
Key management
Key managementKey management
Key management
 
CNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationCNIT 123: 6: Enumeration
CNIT 123: 6: Enumeration
 

Andere mochten auch

I psec
I psecI psec
I psec
nlekh
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong
 

Andere mochten auch (17)

Types of authentication
Types of authenticationTypes of authentication
Types of authentication
 
I psec
I psecI psec
I psec
 
End-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsEnd-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed Applications
 
Dynamic Spectrum Access and the race for mobile capacity
Dynamic Spectrum Access and the race for mobile capacityDynamic Spectrum Access and the race for mobile capacity
Dynamic Spectrum Access and the race for mobile capacity
 
(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Vpn site to site
Vpn site to siteVpn site to site
Vpn site to site
 
Brute Forcing
Brute ForcingBrute Forcing
Brute Forcing
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
 
Password Attack
Password Attack Password Attack
Password Attack
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
 
Kerberos
KerberosKerberos
Kerberos
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 

Ähnlich wie Unit08

SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
Wajahat Rajab
 

Ähnlich wie Unit08 (20)

SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
SecureSocketLayer.ppt
SecureSocketLayer.pptSecureSocketLayer.ppt
SecureSocketLayer.ppt
 
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Unit 5.ppt
Unit 5.pptUnit 5.ppt
Unit 5.ppt
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Web Security
Web SecurityWeb Security
Web Security
 
A Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgA Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric Vanderburg
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
 
lecture 7.pptx
lecture 7.pptxlecture 7.pptx
lecture 7.pptx
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 

Mehr von Nurul Nadirah (11)

Unit11
Unit11Unit11
Unit11
 
Unit10
Unit10Unit10
Unit10
 
Unit09
Unit09Unit09
Unit09
 
Unit06
Unit06Unit06
Unit06
 
Unit05
Unit05Unit05
Unit05
 
Unit04
Unit04Unit04
Unit04
 
Unit03
Unit03Unit03
Unit03
 
Unit02
Unit02Unit02
Unit02
 
Unit01
Unit01Unit01
Unit01
 
Unit07
Unit07Unit07
Unit07
 
Unit00
Unit00Unit00
Unit00
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Unit08

  • 2. Overview • Network Security • IPSec • VPN Protocol • Kerberos • Smart Cards • Firewalls • Proxy Servers
  • 3. Network Security • Security protocols protect a computer from attacks • Networks and data are vulnerable to both active attacks, in which information is altered or destroyed, and passive attacks, in which information is monitored • Types of Attacks : – Altering data. – Eavesdropping eg:sniffing – IP/mac address spoofing eg:cheating – Password pilfering eg:guessing – Denial of service – Virus
  • 4. IPSec • Based on cryptography /encryption • ensures the privacy of network traffic as well as its authentication. • IPSec functions at the Network layer • The fact that IPSec is a network-layer protocol makes its services transparent to applications • IPSec ensures that data cannot be tampered with while it is traversing any part of the network
  • 5. IPSec • Hands On Lab on Ipsec : gpedit.msc • ICMP – Authentication method: – Keberos – PreShared – Certificates
  • 6. VPN Protocols • Virtual private networking is a system of creating a private network connection that travels through a public network • One of the top considerations for using a VPN is to reduce costs • L2TP – L2TP is a VPN protocol used along with IPSec to ensure confidentiality of the data transmission – PPTP Point-to-Point Tunneling Protocol courtesy of Microsoft and Cisco’s Layer 2 Forwarding (L2F) protocol
  • 7. VPN • Why Use L2TP Instead of PPTP – L2TP client is included in Windows 2000 and later operating systems – L2TP supports both Cisco TACACS+ and Remote Authentication Dial-In User Service (RADIUS) authentication – L2TP was developed to be a standard that is already natively supported by Cisco routers and Windows 2000 servers – offers a much higher level of security than PPTP – L2TP offers a wider variety of protocols than PPTP— supporting not only TCP/IP but also IPX/SPX and Systems Network Architecture (SNA)
  • 8. Secure Sockets Layer (SSL) • SSL is a protocol that uses a public key to encrypt the data transmitted across the Internet • SSL runs transparently to applications, because it sits below upper-layer applications and above the IP • Working on behalf of upper-layer protocols, the SSL server authenticates itself using a certificate and public ID to an SSL-enabled client, which includes both Netscape Navigator and Microsoft Internet Explorer Web browsers, and others
  • 9. SSL
  • 10. SSL • The SSL client ensures that the server’s certificate has been issued by a trusted certificate authority (CA), it authenticates itself back to the server using the same process, and an encrypted link is created between the two • During the ensuing data transmission, SSL enacts a mechanism to ensure that the data is not tampered with before it reaches its destination
  • 11. SSL is able to use several different types of ciphers • Data encryption standard (DES) and Triple DES. – DES is a private key exchange that applies a 56-bit key to each 64-bit block of data. Triple DES is the application of three DES keys in succession. • Key Exchange Algorithm (KEA). – KEA enables the client and server to establish mutual keys to use in encryption. • Message Digest version 5 (MD5). – This cipher creates a 128-bit message digest to validate data. • Rivest-Shamir-Adleman (RSA). – This is the most commonly used key exchange for SSL. It works by multiplying two large prime numbers, and through an algorithm determining both public and private keys. The private key does not need to be transmitted across the Internet but is able to decrypt the data transmitted with the public key. • Secure Hash Algorithm (SHA). – SHA produces a message digest of 160 bits using the SHA-1 80-bit key to authenticate the message.
  • 12. Client makes certain that the SSL server’s certificate is issued by a trusted CA
  • 13. Clients are authenticated by SSL servers
  • 14. Kerberos • Kerberos is an authentication protocol that is used to establish trust relationships between domains and verify the identities of users and network services • When an entity attempts to access a Kerberos-protected resource and provides correct authentication information, Kerberos issues a ticket to it • The ticket is actually a temporary certificate • Each process requires a complex mutual authentication, but this is completely transparent to the user
  • 15. Kerberos • Kerberos Trust Relationships – Kerberos trust relationships are typically transitive and bidirectional in nature – Wherever a Kerberos trust exists, the users in one domain will be able to access resources in the other domain as long as the administrator has granted those users access
  • 16. Smart Cards • A way to ensure secure authentication using a physical key • Smart cards contain chips to store a user’s private key and can also store logon information • Smart cards require Public Key Infrastructure (PKI), a method of distributing encryption keys and certificates
  • 17. Firewall • Piece of equipment is actually a router with two interfaces—one leading to the public network and the other to the private network • One of the methods a firewall uses to secure the network is packet filtering • For packets that meet firewall rules, they are either permitted or blocked, depending on how the rule is implemented • Firewalls are useful for protecting the network from unauthorized access to data • A firewall uses an access control list for all the commands to execute packet filters • When implementing a new firewall, you should review every application that must function across the firewall.
  • 19. Firewall • Demilitarized Zones – demilitarized zone (DMZ) is an offshoot from a firewall – DMZ is a middle area that offers more freedom of access from the Internet – DMZ is to provide access to certain servers, such as a Web server or e-mail server, yet protects your network
  • 20. Proxy Servers • For a more sophisticated and secure method of blocking and permitting traffic, you need to use a proxy server • A proxy server doesn’t permit traffic to pass through it between networks • examine each packet up to the application layer and reassemble a new packet for the other network • the proxy server is able to log traffic and perform audits