security
security
AH (Authentication Header)
o adds digital signature to packet to protect against spoofing
o verifies that packet headers have not been modified
o no encryption, nor confidentiality
o signs whole packet
Transport mode
o is used to encrypt data inside a tunnel
o provides end-to-end security, all the way from the sending computer to the
final destination
Tunnel mode
o is used to create a virtual private network
o provides gateway protection
Be able to be enforced with security tools, where appropriate, and with sanctions,
where actual prevention is not technically feasible
Clearly define the areas of responsibility for the users, the administrators, and the
managers
Risk
1.Assets
2.Threats
3.Vulnerabilities
Types of attack
1.Disclosure of data (DOD)
2.Corruption of data(COD)
3.Denial of service(DOS)
Strategy Function
1.Prevention expiry date are not exceeded
________ can make web sites temporarily unavailable and is designed to bring the
network to its knees by flooding it with useless traffic.
Terminology
Firewall
Trojan Horse
Virus
Worm
Firewall types
1.Proxy-based firewall
2.Packet filtering firewall
3.Stateful inspection firewall
4.Bastion host
1.Proxy-based firewall
A proxy is a process that sits between a client process and a server process.
A company wants to make some pages of its web server accessible to all external users
but it wants to restrict certain of the pages to corporate users at one or more remote sites.
Which types of firewall can be implemented in this case.?
An IP packet filter firewall allows you to create a set of rules that either discard or
accept
traffic over a network connection.
Packet filtering firewalls operate on Layer3 of the OSI model, the Network layer.
A stateful firewall is a firewall that keeps track of the state of network connections (such
as
TCP streams, UDP communication) traveling across it.
“keepalive” messages are sent periodically in order to stop a firewall from dropping the
connection during periods of no user-activity.
4.Bastion host
A bastion host is a computer on the network that provides a single entrance and exit
point to
the Internet from the LAN and vice versa.
bastion host is a mail gateway which is located in DMZ and the mail server is
located in LAN.
A symmetric key (sometimes called private, secret key, or single key) system uses a
single
key. That key is used both to encrypt and to decrypt information. A symmetric key
cryptosystem uses the one key to encrypt and decrypt messages.