26
WEB SECURITY Security Issues on web, Importance of Firewall Unit III

Unit 3

Embed Size (px)

Citation preview

Page 1: Unit 3

WEB SECURITYSecurity Issues on web, Importance of

Firewall

Unit III

Page 2: Unit 3

Firewalls

Page 3: Unit 3

What is a Firewall?• A choke point of control and monitoring • Interconnects networks with differing trust• Imposes restrictions on network services• only authorized traffic is allowed

• Auditing and controlling access• can implement alarms for abnormal behavior

• Itself immune to penetration• Provides perimeter defence

Page 4: Unit 3

Classification of Firewall•Characterized by protocol level it controls in•Packet filtering•Circuit gateways•Application gateways•Combination of above is dynamic packet filter

Page 5: Unit 3

Firewall

Page 6: Unit 3

Firewalls – Packet Filters

Page 7: Unit 3

Firewalls – Packet Filters• Simplest of components • Uses transport-layer information only

• IP Source Address, Destination Address• Protocol/Next Header (TCP, UDP, ICMP, etc)• TCP or UDP source & destination ports• TCP Flags (SYN, ACK, FIN, RST, PSH, etc)• ICMP message type

• Examples• DNS uses port 53• No incoming port 53 packets except known trusted servers.

Page 8: Unit 3

Usage of Packet Filters• Filtering with incoming or outgoing interfaces• E.g., Ingress filtering of spoofed IP addresses• Egress filtering

• Permits or denies certain services• Requires intimate knowledge of TCP and UDP

port utilization on a number of operating systems

Page 9: Unit 3

Firewall Gateways• Firewall runs set of proxy programs

• Proxies filter incoming, outgoing packets• All incoming traffic directed to firewall • All outgoing traffic appears to come from firewall

• Policy embedded in proxy programs• Two kinds of proxies

• Application-level gateways/proxies• Tailored to http, ftp, smtp, etc.

• Circuit-level gateways/proxies• Working on TCP level

Page 10: Unit 3

Firewalls - Application Level Gateway

(or Proxy)

Page 11: Unit 3

Firewalls - Circuit Level Gateway

Page 12: Unit 3

SPAM• - Corporate employees are reported to accrue a loss of

productivity of 3.1%. - Nucleus Research Analysis

• To increase the effectiveness of SPAM detection, always report any SPAM mail to your SPAM filter.

Page 13: Unit 3

E-Commerce Security Issues

Page 14: Unit 3

General E-Business Security Issues• Any E-Business needs to be concerned about network security.• The Internet is a “public” network consisting of thousands of

interconnected private computer networks. • Private computer network systems are exposed to threats from

anywhere on the public network.• Businesses must protect against the unknown. • New methods of attacking networks and Web sites, and new

network security holes, are being constantly discovered or invented.• An E-Business cannot expect to achieve perfect security for its

network and Web site.

Page 15: Unit 3

WHAT IS WEB SECURITY?

Almost everything relies on computers and the Internet now • communication (email, cell phones) • transportation (car engine systems) airplane navigation )• medicine (equipment, medical records) • shopping (online stores, credit cards) • entertainment (digital cable, mp3s)

Page 16: Unit 3

Network and Web Site Security• An entire glossary of words and phrases identifies network and

Web security risks, such as hacker, cracker, Trojan horse, and more.• As part of planning a startup E-Business’s security, management

should become familiar with network and Web server security risk terminology.

Page 17: Unit 3

Viruses

• A common threat that is not unique to networks.• Networks facilitate the spread of viruses.• Potential for harm is high including loss of data and

downtime.• Good software defenses are available.• Defenses require diligence.

Page 18: Unit 3

Web Site Defacement• Occurs when a hacker penetrates the system and replaces

text or graphics with “other” material.• Risk is primarily down time and repair costs.• There have been many well publicized examples, including

high profile industry and government sites.• Ordinary defenses against unauthorized logins are a first line

defense. • Total security may be difficult to achieve.

Page 19: Unit 3

Credit Card Fraud & Data Theft• E-Business is at risk from credit card fraud from stolen data.• Secure your own data.• Verify the identity of your customers and the validity of the

incoming credit card data. • Identity theft by a miscreant masquerading as someone else is

also a common problem.

Page 20: Unit 3

E-Business Security• An important issue that is often overlooked or given a lower

priority in the face of startup activity.• A startup firm should consider outsourcing Web and Internet

services in part since the outsourcing company can address security concerns as part of the “package.”

Page 21: Unit 3

Network and Web Site Security• Tools such as passwords, firewalls, intrusion detection

systems, and virus scanning software should be used to protect an E-Business’s network and Web site.

Page 22: Unit 3

Transaction Security and Data Protection

• Use a predefined key to encrypt and decrypt the data during transmission.• Use the secure sockets layer (SSL) protocol to protect data

transmitted over the Internet.• Move sensitive customer information such as credit card

numbers offline or encrypting the information if it is to be stored online.

Page 23: Unit 3

Security Providers and Products• There are many security consultants.• Many commercial products are available.• Training for in-house staff is a key issue.

Page 24: Unit 3

Risk Management• Network and Web site security and intruder detection

programs• Antivirus protection• Firewalls• Sound security policies and procedures• Employee education.

Page 25: Unit 3

Risk Management Problems• The list of potential risks is long and includes:

• Business interruptions caused by Web site defacement or denial of service attacks• Litigation and settlement costs over employees’ inappropriate use of e-

mail and the Internet• Product or service claims against items advertised and sold via a Web

site.• Web related copyright, trademark, and patent infringement lawsuits• Natural or weather-related disasters.

Page 26: Unit 3