Training in Network Security Issues and Internet Communications
-
Upload
networksguy -
Category
Documents
-
view
224 -
download
3
Transcript of Training in Network Security Issues and Internet Communications
![Page 1: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/1.jpg)
Network Security
CHRISTOPHER D. CONEWAY
under the direction of Dr. Foorood Amirmadhifor theCASS/CREST STARS ProgramTennessee State University
![Page 2: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/2.jpg)
Agenda
ObjectiveBasic Network ComponentsThe Lab SystemsSecuring the NetworkCurrent WorkConclusion
![Page 3: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/3.jpg)
Objective
Our objective is to better understand Network Security issues, and means to protect it.
Our goals are as follows: Network Layer Host Layer Application Layer
![Page 4: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/4.jpg)
OSI Model
![Page 5: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/5.jpg)
Control DataProtocol DestinationSource
A Conceptual Packet Structure
![Page 6: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/6.jpg)
Basic Network Components
Router
Switch
Hub
PCsPCsFirewallFirewall
![Page 7: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/7.jpg)
The Lab Systems
Hardware components Switch, Hub, PC’s
Operating Systems Unix: Sun Os 5.5 Linux: Red Hat 9.0,
SuSE 8.2 Windows: 2000,
2000 Server, NT4.0
![Page 8: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/8.jpg)
Network Diagram
W2K
-WS1/R
ED
HA
T
W2K
/RE
DH
AT
W2K
/RE
DH
AT
W2K
server
SUSE
/W2K
W2K
/SU
SE
Linux
UN
IX B
OX
Network 1
Private Class-C:
Address
NAT
Network Address Translator
Router
Internet
Firewall
Hub Switch
Network 2
Private Class-C:
Address
SU
SE
Firewall NG
Hub
![Page 9: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/9.jpg)
Firewall
Firewall –Hardware or software that examines and controls the traffic between two or more networks (i,e; Internal, and Internet)
Firewall policies are a collection rules:
internet
![Page 10: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/10.jpg)
Policies-Firewall
![Page 11: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/11.jpg)
Securing the Network: Security Tools
Port Scanner (Protocol holes) Security Analyzer (Application Holes) Network Analyzer/Sniffer (Decoding)
![Page 12: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/12.jpg)
Security Analyzer Report Sample
![Page 13: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/13.jpg)
Port Analysis Section
![Page 14: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/14.jpg)
Current Works
Secure Mail Microsoft Active Directory VPN (Virtual Private Network) Unix systems
![Page 15: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/15.jpg)
Secure Mail
Virus protection - Server based virus protection using your existing antivirus software.
Spam filtering - Checks to see if the computer which sent a message is blacklisted on the major RBL lists. Quarantines or deletes any such messages.
Content filtering -. Check for unacceptable language.
Attachment filtering - Part of the content filtering. Removes unwanted types of file attachment before they reach the end user.
IMAP (Internet Message Access Protocol) support - Store all message folders centrally, allowing side by side access from a mail client or web-mail.
Web-based mail client - Provide users with web-based access to their e-mail.
Web-based administration - Remotely administer mail using a web browser.
Http-s- An extension to the http protocol to support sending data securely over the web.
![Page 16: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/16.jpg)
Secure Mail Diagram
Mail Server Client Computers
![Page 17: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/17.jpg)
Active Directory
Microsoft Active Directory Domain Name Service User and Group account management Organizational units and resources
management
![Page 18: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/18.jpg)
Active Directory Diagram
![Page 19: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/19.jpg)
VPN (Virtual Private Network)
VPN (Virtual Private Network) Checkpoint VPN (CP2000, CPNG) Data integrity and confidentiality are
protected through authentication and encryption
Data can be securely transmitted between two locations across the Internet or be encrypted between a server and a client
within a Local Area Network
![Page 20: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/20.jpg)
VPN Diagram
![Page 21: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/21.jpg)
VPN Client Connected to Private COE-Lab Network
![Page 22: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/22.jpg)
Unix Systems
Unix systems Internet services (web, mail, proxy, etc..) Redhat & Suse, Sun system platforms
![Page 23: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/23.jpg)
Conclusions
Security in All Layers Required Be Up-to-date in New Security Issues Consistency in the process of securing
systems
![Page 24: Training in Network Security Issues and Internet Communications](https://reader030.fdocuments.net/reader030/viewer/2022020307/55a612d61a28ab991b8b457e/html5/thumbnails/24.jpg)
Questions