24
Network Security CHRISTOPHER D. CONEWAY under the direction of Dr. Foorood Amirmadhi for the CASS/CREST STARS Program Tennessee State University

Training in Network Security Issues and Internet Communications

Embed Size (px)

Citation preview

Page 1: Training in Network Security Issues and Internet Communications

Network Security

CHRISTOPHER D. CONEWAY

under the direction of Dr. Foorood Amirmadhifor theCASS/CREST STARS ProgramTennessee State University

Page 2: Training in Network Security Issues and Internet Communications

Agenda

ObjectiveBasic Network ComponentsThe Lab SystemsSecuring the NetworkCurrent WorkConclusion

Page 3: Training in Network Security Issues and Internet Communications

Objective

Our objective is to better understand Network Security issues, and means to protect it.

Our goals are as follows: Network Layer Host Layer Application Layer

Page 4: Training in Network Security Issues and Internet Communications

OSI Model

Page 5: Training in Network Security Issues and Internet Communications

Control DataProtocol DestinationSource

A Conceptual Packet Structure

Page 6: Training in Network Security Issues and Internet Communications

Basic Network Components

Router

Switch

Hub

PCsPCsFirewallFirewall

Page 7: Training in Network Security Issues and Internet Communications

The Lab Systems

Hardware components Switch, Hub, PC’s

Operating Systems Unix: Sun Os 5.5 Linux: Red Hat 9.0,

SuSE 8.2 Windows: 2000,

2000 Server, NT4.0

Page 9: Training in Network Security Issues and Internet Communications

Firewall

Firewall –Hardware or software that examines and controls the traffic between two or more networks (i,e; Internal, and Internet)

Firewall policies are a collection rules:

internet

Page 10: Training in Network Security Issues and Internet Communications

Policies-Firewall

Page 11: Training in Network Security Issues and Internet Communications

Securing the Network: Security Tools

Port Scanner (Protocol holes) Security Analyzer (Application Holes) Network Analyzer/Sniffer (Decoding)

Page 12: Training in Network Security Issues and Internet Communications

Security Analyzer Report Sample

Page 13: Training in Network Security Issues and Internet Communications

Port Analysis Section

Page 14: Training in Network Security Issues and Internet Communications

Current Works

Secure Mail Microsoft Active Directory VPN (Virtual Private Network) Unix systems

Page 15: Training in Network Security Issues and Internet Communications

Secure Mail

Virus protection - Server based virus protection using your existing antivirus software.

Spam filtering - Checks to see if the computer which sent a message is blacklisted on the major RBL lists. Quarantines or deletes any such messages.

Content filtering -. Check for unacceptable language.

Attachment filtering - Part of the content filtering. Removes unwanted types of file attachment before they reach the end user.

IMAP (Internet Message Access Protocol) support - Store all message folders centrally, allowing side by side access from a mail client or web-mail.

Web-based mail client - Provide users with web-based access to their e-mail.

Web-based administration - Remotely administer mail using a web browser.

Http-s- An extension to the http protocol to support sending data securely over the web.

Page 16: Training in Network Security Issues and Internet Communications

Secure Mail Diagram

Mail Server Client Computers

Page 17: Training in Network Security Issues and Internet Communications

Active Directory

Microsoft Active Directory Domain Name Service User and Group account management Organizational units and resources

management

Page 18: Training in Network Security Issues and Internet Communications

Active Directory Diagram

Page 19: Training in Network Security Issues and Internet Communications

VPN (Virtual Private Network)

VPN (Virtual Private Network) Checkpoint VPN (CP2000, CPNG) Data integrity and confidentiality are

protected through authentication and encryption

Data can be securely transmitted between two locations across the Internet or be encrypted between a server and a client

within a Local Area Network

Page 20: Training in Network Security Issues and Internet Communications

VPN Diagram

Page 21: Training in Network Security Issues and Internet Communications

VPN Client Connected to Private COE-Lab Network

Page 22: Training in Network Security Issues and Internet Communications

Unix Systems

Unix systems Internet services (web, mail, proxy, etc..) Redhat & Suse, Sun system platforms

Page 23: Training in Network Security Issues and Internet Communications

Conclusions

Security in All Layers Required Be Up-to-date in New Security Issues Consistency in the process of securing

systems

Page 24: Training in Network Security Issues and Internet Communications

Questions