CSCI 1800 Cybersecurity and Interna4onal Rela4ons. Network Based Cyber A1acks John E. Savage Brown University
|
|
- Candace Kelly
- 5 years ago
- Views:
Transcription
1 CSCI 1800 Cybersecurity and Interna4onal Rela4ons Network Based Cyber A1acks John E. Savage Brown University
2 Outline Firewalls, inward and outward facing. Tunneling SSH, IPsec Intrusion detec4on Types of alarm, IDS system, event, data collec4on Port scanning, honeypots Data Loss Preven4on Wireless networking Lect07 2/18/2015 JE Savage 2
3 Two Approaches to ATacks Keep the bad guys out. There are two types of corpora4ons, those that know they have been compromised and those that don t. Dmitri Alperovitch, Crowdstrike Use firewalls and intrusion detec4on to stop them Cope with them once they get in. Detect, disrupt, deny atackers communica4ons with their command and control network to prevent data loss. Lect07 2/18/2015 JE Savage 3
4 Firewalls Firewalls are designed to keep bad guys out. Firewalls enforce policies concerning IP addresses, port numbers, and some content. Lect07 2/18/2015 JE Savage 4
5 Firewalls Usually placed at the periphery of a network May be in a special processor (a proxy) or so`warew Policies limit traffic going out and coming in. Packets are allowed through, dropped, or rejected. May use whitelists (blacklists) of sites (not) allowed to communicate with the network or machine. Lect07 2/18/2015 JE Savage 5
6 Sample Firewall Policies Packets arrive at an IP address with a port number 1. File type is shown at beginning of a file, e.g. <!DOCTYPE html... %PDF Allow HTTP (HTTPS) traffic only on port 80 (443) 3. Only internal users may ini4ate HTTP sessions. 4. VoIP traffic rejected may hide malicious traffic 5. No packets accepted from blacklisted sites. Lect07 2/18/2015 JE Savage 6
7 Stateless Firewalls No info kept on packets previously seen. If server handling only web request, no need to permit SYN packets on port 80 from it. Client SYN Seq = X Server SUN- ACK Seq = Y Ack = X+1 Firewall ACK Seq = X+1 Ack = Y+1 Lect07 2/18/2015 JE Savage 7
8 Stateful Firewalls Like NATs, they keep data on previously seen packets, such as IP addresses, port number, sequence number, and protocol type. Could allow only TCP sessions ini4ated internally. Applica4on layer firewalls manage accesses based on content at the applica4on layer. Could filter SQL queries to avoid injec4on, deny access to malicious web sites, drop malware, etc.. Lect07 2/18/2015 JE Savage 8
9 Tunneling Tunneling is the embedding of packets from one protocol as payload of another, o`en for security. Security requires robust iden4ty and authoriza4on. Encryp4on/decryp4on increases overhead. Protocol 1 Packet is Payload for Protocol 2 H2 H1 =Body 1 Protocol 2 Packet Lect07 2/18/2015 JE Savage 9
10 Types of Tunneling Secure shell (SSH), provides privacy IPsec, provides authen4city & privacy at network layer Virtual Private Network (VPN) allows trusted sharing of remote network resources. It simulates being on site at the remote computer. Lect07 2/18/2015 JE Savage 10
11 Public- Key Cryptography Each party has public & private keys Alice: Priv Alice, Pub Alice ; Bob: Priv Bob, Pub Bob. Alice encrypts message M for Bob with X = E K (M) where K = Pub Bob. Bob decrypts Alice s encrypted message with M = D K* (X) where K* = Priv Bob. Idea proposed by Diffie and Hellman Rivest, Shamir and Adleman (RSA) gave first prac4cal method (1977). Lect07 2/18/2015 JE Savage 11
12 Symmetric vs Public Key Crypto Symmetric key system has one key per user pair Thus, there are n(n- 1)/2 keys for n users. If n = 10 4, that s about 50x10 6 keys! In public- key system, 2n keys suffice. Each party publishes one key, keeps the other secret Symmetric key system faster than public key. PK systems o`en used to create/exchange secret key Lect07 2/18/2015 JE Savage 12
13 RSA Public- Key System Brief defini4on of modular arithme4c add and mul4ply integers modulo n result is remainder a`er dividing by n. E.g. (3+4) mod 5 = 2, (4*3) mod 3 = 0 Bob s public key is integer pair (e,n). His secret key is d. Message is integer M in {0,1,2, n- 1}, n is product of two primes. e,d and n are such that M de mod n = M. Finding d from e and n is as hard as factoring n very hard! Alice encrypts message M for Bob as C = M e mod n Bob decrypts by compu4ng C d mod n = M. Note that C d mod n = (M e ) d mod n = M de mod n = M Lect07 2/18/2015 JE Savage 13
14 Secure Shell (SSH) Uses public key cryptography (PKC) to create & exchange private keys for efficient, secure communica4on. TCP used to connect client and server Both agree on SSH version, encryp4on method. Exchange secret session key using PKC. Client authen4ca4on occurs SSH provides secure access to resources, such as file transfer and command prompt. Lect07 2/18/2015 JE Savage 14
15 Diffie- Helman Key Exchange Alice and Bob need a common secret. Start with common color Each chooses secret color They mix their two colors Send mixtures to other Add in their secrets Create a common secret! Can do this with numbers! Lect07 2/18/2015 JE Savage 15
16 Diffie- Helman Key Exchange B & A choose prime p & primi6ve root g mod p. (g is primi4ve if for each integer in {0,1,2,, p- 1} is equal to g k mod p for some integer k.) Alice s secret is a and Bob s is b. A sends r = g a mod p. B sends s = g b mod p. A computes s a mod p. B computes r b mod p. s a mod p = (g b mod p) a = g ba mod p = g ab mod p = r b mod p. They now have a common secret! Lect07 2/18/2015 JE Savage 16
17 IPsec Ipsec offers secure communica4on at network layer It is completely transparent to applica4ons. Provides confiden4ality, authen4ca4on & data integrity. Ini4alizing IPsec Par4es set up ini4al generic encrypted channel. Decide on subsequent encryp4on method, hash algorithm, and authen4ca4on method. Now ready for secure communica4on. Lect07 2/18/2015 JE Savage 17
18 IPsec Two modes: transport and tunnel Tunnel Mode: En4re old packet encrypted, placed in new packet Used for VPN Transport Mode: Only payload is encrypted or authen4cated IPsec header informa4on inserted before payload. Lect07 2/18/2015 JE Savage 18
19 Protec4on via Inward Facing Firewalls 1 Try to prevent atacker from communica4ng with a command and control site. Blacklist malicious sites by URL or IP address Author 1 proposes crea4on of a Na4onal Cyber Threat Response Center (NCTRC) Threat reports from cer4fied sensors sent to NCTRC Firewall vendors provide NCTRC data to customers 1 Based on A Na4onal Model for Cyber Protec4on by Jeff Brown, CISO, Raytheon, See htp:// 29_isa_response.pdf Featured on and Cyber Command site. Lect07 2/18/2015 JE Savage 19
20 Protec4on via Inward Facing Firewalls 1 Advantages to customers of this service: Order of magnitude improved protec4on. Early no4ce of infec4on. Advantages of repor4ng infec4ons to NCTRC Common opera4onal picture of infec4ons possible Can reveal nature of atacks underway. Disadvantage legi4mate sites that have been compromised would be blocked. Lect07 2/18/2015 JE Savage 20
21 Intrusion Detec4on Intrusion detec4on systems (IDSs) are more complex than simple firewalls. They monitor ac4vity. Rules based on ac4vity determine whether alarms are sounded. Can you invent some interes4ng rules? Many IDSs do deep packet inspec4on (DPI). DPI: packet content analyzed, not just the headers US Department of Homeland Security (DHS) has designed three IDSs, Einstein 1, 2 and 3. htp://en.wikipedia.org/wiki/einstein_(us- CERT_program) Lect07 2/18/2015 JE Savage 21
22 Types of IDS Alarms Malware atack ARP (address resolu4on protocol) spoofing Denial of service atack Port scans one site tes4ng many ports ATempt at DNS cache poisoning Lect07 2/18/2015 JE Savage 22
23 Types of ATacker Masquerader atacker impersonates another. Misfeasant insider exceeds granted authority Clandes4ne user tries to cover his tracks Lect07 2/18/2015 JE Savage 23
24 Types of IDS Host IDS Monitors ac4vity on one machine. Tries to catch criminal & clandes4ne user. Looks for abnormal or unauthorized ac4vity. Network IDS Tradi4onal IDS, placed at periphery of network. Does DPI looking for sta4c or sta4s4cal signatures. May look for protocol viola4ons, e.g. on web server. Lect07 2/18/2015 JE Savage 24
25 IDS Events Alarm sounded False posi4ve benign event found, annoying True posi4ve malicious event found good Alarm not sounded True nega4ve benign event good False nega4ve malicious event, serious oversight Lect07 2/18/2015 JE Savage 25
26 Data Loss Preven4on (DLP) Monitor outgoing Internet traffic Endpoint DLP or network DLP border) Works on unencrypted files only! Look for structured content or indices on unstructured data Structured content Keywords, SSNs, credit card #s Unstructured content So`ware, text pictures Lect07 2/18/2015 JE Savage 26
27 Data Loss Preven4on (DLP) Unstructured data chopped into standard pieces and hash of each piece is computed Hashes are stored in database. As data exits network, Compare structured data to template or database Compute hash of unstructured data and compare to hashes in database DLP is a supplement to other technologies. Lect07 2/18/2015 JE Savage 27
28 Port Scanning Internet- based computers communicate using IP addresses and port numbers. Some port numbers: 22 SSH, 80 HTTP, 143 IMAP, 179 BGP, 443 HTTPS, Nintendo WiFi For security, firewalls block access to most ports A port is open (responding) or blocked (non- responding). What is a port scan? It s a scan of ports at an IP address to see which ports respond. Code running at a port might have a flaw, such as a buffer overflow error, allowing penetra4on. Lect07 2/18/2015 JE Savage 28
29 Types of Scan TCP Scans atempt to connect via TCP SYN Scans try TCP SYN packet on all ports. If response received, send RST port is open. Fingerprin4ng slight differences in response to scans can iden4fy OS and service running at a port. Lect07 2/18/2015 JE Savage 29
30 Blind Port Scan Blind port scan is technique to do a port scan on vic4m without revealing your iden4ty (aka idle scan) 1. ATacker A sends TCP packet to innocent zombie Z to get its sequence number X. 2. ATacker A sends TCP packet to vic4m V with Z as source. If V responds to Z, Z may increase its sequence number X to X A sends 3 rd TCP packet to Z to learn if Z s sequence number is X+1 or if V has responded. Lect07 2/18/2015 JE Savage 30
31 Honeypots A honeypot is a collec4on of machines, data and applica4ons that looks real but serves no other purpose than to atract an atacker. Any traffic to a honeypot is deemed suspicious. Can be used for following reasons: Intrusion detec4on allows defenders to study intrusion methods. Evidence incrimina4ng evidence may be le`. Diversion can distract atackers from real thing. Lect07 2/18/2015 JE Savage 31
32 Wireless Networking All traffic sent via radio can be heard by all! Wireless protocols support encryp4on methods WEP (wired equivalent privacy) not very secure WAP (Wi- Fi protected access) is considered secure Lect07 2/18/2015 JE Savage 32
33 Review Firewalls, inward and outward facing. Tunneling SSH, IPsec Intrusion detec4on Types of alarm, IDS system, event, data collec4on Port scanning, honeypots Data Loss Preven4on Wireless networking Lect07 2/18/2015 JE Savage 33
CSCI 1800 Cybersecurity and Interna4onal Rela4ons. Design and Opera-on of the Internet John E. Savage Brown University
CSCI 1800 Cybersecurity and Interna4onal Rela4ons Design and Opera-on of the Internet John E. Savage Brown University Outline Network security The link layer The network layer The transport layer Denial
More informationFirewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Intrusion Detection Systems Intrusion Actions aimed at compromising the security of the target (confidentiality, integrity, availability of computing/networking
More informationFirewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
More informationNetwork Security. Thierry Sans
Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability
More informationModular arithme.c and cryptography
Modular arithme.c and cryptography CSC 1300 Discrete Structures Villanova University Public Key Cryptography (Slides 11-32) by Dr. Lillian Cassel, Villanova University Villanova CSC 1300 - Dr Papalaskari
More informationL13. Reviews. Rocky K. C. Chang, April 10, 2015
L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing
More informationInt ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28
Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The
More informationPublic Key Algorithms
Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular
More informationLecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005
Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA
More informationCSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography
CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography Outline 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography
More informationDistributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive
More informationOutline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA
CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography 1. Introduction 2. RSA Outline 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography
More informationWeb Security 2 https://www.xkcd.com/177/ http://xkcd.com/1323/ Encryption basics Plaintext message key secret Encryp)on Func)on Ciphertext Insecure network Decryp)on Func)on Curses! Foiled again! key Plaintext
More informationOutline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)
Outline AIT 682: Network and Systems Security 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard Topic 5.2 Public Key Cryptography Instructor: Dr. Kun Sun 2 Public Key
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationAccessEnforcer Version 4.0 Features List
AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect
More informationChapter 8 roadmap. Network Security
Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing
More informationIntroduction and Overview. Why CSCI 454/554?
Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book
More informationReal-time protocol. Chapter 16: Real-Time Communication Security
Chapter 16: Real-Time Communication Security Mohammad Almalag Dept. of Computer Science Old Dominion University Spring 2013 1 Real-time protocol Parties negotiate interactively (Mutual) Authentication
More informationCSC 4900 Computer Networks: Security Protocols (2)
CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication
More informationCS 494/594 Computer and Network Security
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Real-Time Communication Security Network layers
More informationInformation Security CS 526
Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 7. Network Security Network Attacks Cryptographic Technologies Message Integrity and Authentication Key Distribution Firewalls Transport Layer
More informationKey Exchange. Secure Software Systems
1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?
More informationOutline today. MPLS Overview. We saw tunneling on top of IP. What about tunneling below IP? Introducing Mul<- Protocol Label Switching (MPLS) 3/21/11
UNDERLAYS and MIDDLEBOXES Outline today Network- layer principles Globally unique iden
More informationSecurity: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More informationCSc 466/566. Computer Security. 18 : Network Security Introduction
1/81 CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:57:28 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg
More informationNetwork and Communica1on Security
Network and Communica1on Security COS 461: Computer Networks Spring 2010 (MW 3:00 4:20 in COS 105) Mike Freedman hgp://www.cs.princeton.edu/courses/archive/spring10/cos461/ 1 Overview Network security
More informationCSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L
CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 20: Intrusion Prevention Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Firewalls purpose types locations Network perimeter
More informationTop 10 Web Application Vulnerabilities
Top 10 Web Application Vulnerabilities Why you should care about them plus a live hacking demo!! Why should you care?! Insecure so*ware is undermining our financial, healthcare, defense, energy, and other
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.5 Public Key Algorithms CSC 474/574 Dr. Peng Ning 1 Public Key Algorithms Public key algorithms covered in this class RSA: encryption and digital signature
More informationChapter 9. Firewalls
Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however
More informationPublic Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA
Public Key Cryptography, OpenPGP, and Enigmail Cryptography is the art and science of transforming (encrypting) a message so only the intended recipient can read it Symmetric Cryptography shared secret
More informationIssues. Separation of. Distributed system security. Security services. Security policies. Security mechanism
Module 9 - Security Issues Separation of Security policies Precise definition of which entities in the system can take what actions Security mechanism Means of enforcing that policy Distributed system
More informationOverview. Basic Components. Internet s Design: Insecure. Network security and defini1ons Brief introduc1on to cryptography
Overview Network and Communica1on Security Network security and defini1ons Brief introduc1on to cryptography Cryptographic hash func1ons Symmetric- key crypto Public- key crypto IP- Sec DNS- Sec 1! 2!
More informationComputer Security and Privacy
CSE P 590 / CSE M 590 (Spring 2010) Computer Security and Privacy Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for
More informationChapter 9 Public Key Cryptography. WANG YANG
Chapter 9 Public Key Cryptography WANG YANG wyang@njnet.edu.cn Content Introduction RSA Diffie-Hellman Key Exchange Introduction Public Key Cryptography plaintext encryption ciphertext decryption plaintext
More informationCS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD
ERIK JONSSON SCHOOL OF ENGINEERING & COMPUTER SCIENCE Cyber Security Research and Education Institute CS 6324: Information Security Dr. Junia Valente Department of Computer Science The University of Texas
More informationCryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1
Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography CS555 Spring 2012/Topic 16 1 Outline and Readings Outline Private key management between two parties Key management
More information20-CS Cyber Defense Overview Fall, Network Basics
20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter
More informationComputer Security: Crypto & Web Security
CSE 484 / CSE M 584 Computer Security: Crypto & Web Security TA: Thomas Crosley tcrosley@cs Many slides by Franziska Roesner and Adrian Sham HTTP://XKCD.COM/1323/ Lab 1 Deadline Reminders Lab 1 Final due
More informationSecurity: Focus of Control
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More information14. Internet Security (J. Kurose)
14. Internet Security (J. Kurose) 1 Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer:
More informationn Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network
Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology
More informationData Security and Privacy. Topic 14: Authentication and Key Establishment
Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt
More informationInternet Technology. Security
Uni Innsbruck Informatik - 1 Internet Technology Security Michael Welzl michael.welzl@uibk.ac.at DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg Institute of Computer Science University of Innsbruck,
More informationJuniper JN Security, Specialist (JNCIS-SEC)
Juniper JN0-333 Security, Specialist (JNCIS-SEC) http://killexams.com/pass4sure/exam-detail/jn0-333 QUESTION: 231 Which statement is true about a logical interface? A. A logical interface can belong to
More informationComputer Security. 12. Firewalls & VPNs. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 12. Firewalls & VPNs Paul Krzyzanowski Rutgers University Spring 2018 April 15, 2018 CS 419 2018 Paul Krzyzanowski 1 Conversation Isolation: Network Layer Virtual Private Networks (VPNs)
More informationCLIENT SERVER SYNERGY USING VPN
CLIENT SERVER SYNERGY USING VPN 1 CHETAN S MORE, 2 AMAN ANNAD, 3 KUSHAGRA RAIZADA, 4 MANUJ SRIVASTAVA 1,2,3,4 Department of Electronics and Telecommunication Engineering, Bharati Vidyapeeth (Deemed To
More informationDistributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography
More informationKurose & Ross, Chapters (5 th ed.)
Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and
More informationDenial of Service (DoS)
Flood Denial of Service (DoS) Comp Sci 3600 Security Outline Flood 1 2 3 4 5 Flood 6 7 8 Denial-of-Service (DoS) Attack Flood The NIST Computer Security Incident Handling Guide defines a DoS attack as:
More informationLab 8: Firewalls & Intrusion Detec6on Systems
Lab 8: Firewalls & Intrusion Detec6on Systems Fengwei Zhang Wayne State University CSC Course: Cyber Security Prac6ce 1 Firewall & IDS Firewall A device or applica6on that analyzes packet headers and enforces
More informationAdvanced Diploma on Information Security
Course Name: Course Duration: Prerequisites: Course Fee: Advanced Diploma on Information Security 300 Hours; 12 Months (10 Months Training + 2 Months Project Work) Candidate should be HSC Pass & Basic
More informationACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems
ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been
More informationח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms
Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,
More informationModern cryptography 2. CSCI 470: Web Science Keith Vertanen
Modern cryptography 2 CSCI 470: Web Science Keith Vertanen Modern cryptography Overview Asymmetric cryptography Diffie-Hellman key exchange (last time) Pubic key: RSA Pretty Good Privacy (PGP) Digital
More informationFirewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003
Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA
More informationVirtual Private Networks
EN-2000 Reference Manual Document 8 Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission security,
More informationImplementing Cisco Network Security (IINS) 3.0
Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
More informationDistributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 29. Firewalls Paul Krzyzanowski Rutgers University Fall 2015 2013-2015 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive data & systems not accessible Integrity:
More informationIntroduction to IPsec. Charlie Kaufman
Introduction to IPsec Charlie Kaufman charliek@microsoft.com 1 IP Security (IPsec) IETF standard for Network Layer security Popular for creating trusted link (VPN), either firewall-firewall, or machine
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Photuris and SKIP PHASE 1 IKE PHASE 2 IKE How is SA established? How do parties negotiate
More informationInternetworking Lecture 10. Communications and network security
Internetworking Lecture 10 Communications and network security Communication and network security: Threat model Passive attacks: Eavesdropping, Wiretapping, Sniffing, and Traffic analysis Alice Bob Eve
More informationIP Security IK2218/EP2120
IP Security IK2218/EP2120 Markus Hidell, mahidell@kth.se KTH School of ICT Based partly on material by Vitaly Shmatikov, Univ. of Texas Acknowledgements The presentation builds upon material from - Previous
More informationDavid Wetherall, with some slides from Radia Perlman s security lectures.
David Wetherall, with some slides from Radia Perlman s security lectures. djw@cs.washington.edu Networks are shared: Want to secure communication between legitimate participants from others with (passive
More informationComputer Communication Networks Network Security
Computer Communication Networks Network Security ICEN/ICSI 416 Fall 2016 Prof. Dola Saha 1 Network Security Goals: understand principles of network security: cryptography and its many uses beyond confidentiality
More informationCS Final Exam
CS 600.443 Final Exam Name: This exam is closed book and closed notes. You are required to do this completely on your own without any help from anybody else. Feel free to write on the back of any page
More informationNetwork Security. Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2002.
Network Security Computer Networking: A Top Down Approach Featuring the Internet, 1. What is network security 2. Principles of cryptography 3. Authentication 4. Integrity 5. Key Distribution and certification
More informationNetworking Security SPRING 2018: GANG WANG
Networking Security SPRING 2018: GANG WANG About the Midterm Close book; Close notes; Close computer/phone/calculator; No cheat sheet. You are NOT allowed to leave the room during the exam There are 6
More informationPractical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February
Practical Magic with SSH By David F. Skoll Roaring Penguin Software Inc. 1 February 2001 http://www.roaringpenguin.com dfs@roaringpenguin.com Overview of Presentation Why SSH? Problems with Telnet & Friends
More informationEEC-682/782 Computer Networks I
EEC-682/782 Computer Networks I Lecture 24 Wenbing Zhao wenbingz@gmail.com http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB
More informationCOMPUTER NETWORK SECURITY
COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (9 th Week) 9. Firewalls and Intrusion Prevention Systems 9.Outline The Need for Firewalls Firewall Characterictics and Access Policy Type of Firewalls
More informationKey Management. CS 161: Computer Security Prof. Vern Paxson
Key Management CS 161: Computer Security Prof. Vern Paxson TAs: Paul Bramsen, Apoorva Dornadula, David Fifield, Mia Gil Epner, David Hahn, Warren He, Grant Ho, Frank Li, Nathan Malkin, Mitar Milutinovic,
More informationComputer Network Vulnerabilities
Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
More informationTotal No. of Questions : 09 ] [ Total No.of Pages : 02
CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three
More informationOur Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II
Our Narrow Focus 15-441 15-441 Computer Networking 15-641 Lecture 22 Security: DOS Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Yes: Creating a secure channel for communication (Part I) Protecting
More informationIdeal Security Protocol. Identify Friend or Foe (IFF) MIG in the Middle 4/2/2012
Ideal Security Protocol Satisfies security requirements Requirements must be precise Efficient Small computational requirement Small bandwidth usage, network delays Not fragile Works when attacker tries
More informationExam : Title : Security Solutions for Systems Engineers. Version : Demo
Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized
More informationCS3235 Seventh set of lecture slides
CS3235 Seventh set of lecture slides Hugh Anderson National University of Singapore School of Computing October, 2007 Hugh Anderson CS3235 Seventh set of lecture slides 1 Warp 9... Outline 1 Public Key
More informationLecture 9a: Secure Sockets Layer (SSL) March, 2004
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by
More informationChapter 9. Public Key Cryptography, RSA And Key Management
Chapter 9 Public Key Cryptography, RSA And Key Management RSA by Rivest, Shamir & Adleman of MIT in 1977 The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on
More informationNetwork Security Chapter 8
Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security
More informationLecture 2 Applied Cryptography (Part 2)
Lecture 2 Applied Cryptography (Part 2) Patrick P. C. Lee Tsinghua Summer Course 2010 2-1 Roadmap Number theory Public key cryptography RSA Diffie-Hellman DSA Certificates Tsinghua Summer Course 2010 2-2
More informationSecurity Engineering. Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings)
Security Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings) Lecture Outline Network Attacks Attive Attacks Passive Attacks TCP Attacks Contermeasures IPSec SSL/TLS Firewalls
More informationPublic-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7
Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:
More informationCTS2134 Introduction to Networking. Module 08: Network Security
CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting
More informationComputer Security Sec4on Week 4: Cryptography
CSE 484 / CSE M 584 Computer Security Sec4on Week 4: Cryptography TA: Thomas Crosley tcrosley@cs Thanks to Franzi Roesner and Adrian Sham for previous slides [Examples/Images thanks to Wikipedia.] Administrivia
More informationkey distribution requirements for public key algorithms asymmetric (or public) key algorithms
topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems
More informationOverview. Public Key Algorithms I
Public Key Algorithms I Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.lsu.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601-04/ Louisiana State
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Several slides adapted from a presentation made by Dan Touitou on behalf of Cisco.
More informationProxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking
NETWORK MANAGEMENT II Proxy Servers Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking resources from the other
More informationSecuring Internet Communication: TLS
Securing Internet Communication: TLS CS 161: Computer Security Prof. David Wagner March 11, 2016 Today s Lecture Applying crypto technology in practice Two simple abstractions cover 80% of the use cases
More informationEthical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities
Ethical Hacking and Countermeasures: Web Chapter 3 Web Application Vulnerabilities Objectives After completing this chapter, you should be able to: Understand the architecture of Web applications Understand
More informationThe ElGamal Public- key System
Online Cryptography Course Dan Boneh Public key encryp3on from Diffie- Hellman The ElGamal Public- key System Recap: public key encryp3on: (Gen, E, D) Gen pk sk m c c m E D Recap: public- key encryp3on
More informationCSE543 Computer and Network Security Module: Network Security
CSE543 Computer and Network Security Module: Network Security Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 2 Communication Security Want to establish a secure channel
More information