Authentication
Authentication
Camarines Sur
AUTHENTICATION PROTOCOL
What is a Firewall?
Sometimes called a network firewall.
Is a cybersecurity tool that is used to filter traffic on a network.
Can be used to separate network nodes from external traffic sources, internal traffic
sources, or even specific applications.
Firewalls can be software, hardware, or cloud−based, with each type of firewall having
its own unique pros and cons.
The primary goal of a firewall is to block malicious traffic requests and data packets
while allowing legitimate traffic through.
https://computer.howstuf fworks.com/firewall.htm
Access Control
Security technique that regulates who or what can view or
use resources in a computing environment.
A fundamental concept in security that minimizes risk to the business or
organization.
Perform identification authentication and authorization of users and entities
by evaluating required login credentials that can include passwords, personal
identification numbers (PINs), biometric scans, security tokens or other
authentication factors.
o Multifactor authentication (MFA), which requires two or more
authentication factors, is often an important part of a layered defense
to protect access control systems.
Five Authentication Factor Categories and How They Work Knowledge Factors
Require the user to provide some data or information before they can access
a secured system. a password or personal identification number (PIN) is the
most common type of knowledge−based authentication factor used to restrict
access to a system.
Possession Factors
Possession factors require the user to possess a specific piece of information or device
before they can be granted access to the system. Possession factors are typically
controlled through a device that is known to belong to the correct user.
Inherence Factors
Inherence factors authenticate access credentials based on factors that are unique to
the user. These include fingerprints, thumbprints, and palm or handprints. Voice and
facial recognition and retina or iris scans are also types of inherent authentication
factors.
Location Factors
Network administrators can implement services that use geolocation security checks
to verify the location of a user before granting access to an application, network or
system.
Behavior Factors
What is a Firewall?
Sometimes called a network
firewall.
Is a cybersecurity tool that is used
to filter traffic on a network.
Can be used to separate network
nodes from external traffic sources,
internal traffic sources, or even
specific applications.
Firewalls can be software,
hardware, or cloud−based, with
each type of firewall having its own unique pros and cons.
The primary goal of a firewall is to block malicious traffic requests and data
packets while allowing legitimate traffic through.
Packet−filtering firewalls
Circuit−level gateways
Stateful inspection firewalls
Application−level gateways (a.k.a. proxy firewalls)
Next−gen firewalls
Software firewalls
Hardware firewalls
Cloud firewalls
Note: The last three bullets list methods of delivering firewall functionality,
rather than being types of firewall architectures in and of themselves.
Packet-Filtering Firewalls - This is the oldest firewall type out there. They are
designed to create checkpoints at individual routers or switches. The packet−filtering
firewalls will check the data packets that try to come through, without inspecting the
contents. If the information trying to come through looks suspicious, it cannot get
through the network. This is a simple
firewall that does not impact network performance too much.
Circuit-Level Gateways –
Stateful Inspection Firewalls − A combination of the two firewalls above, the stateful
inspection firewalls offer a higher level of protection for your business. The problem
with these is that they take up more resources, which can slow down the legitimate
packet transfer.
Next-Generation Firewalls − There9s no real insight into what makes a firewall today
<next−generation= besides the time it was created. There are commonalities
between these firewalls and the originals, and those include TCP handshakes and
packet inspections. Next−generation firewalls also use IPS – intrusion prevention
systems – to stop network attacks.
Software Firewalls − These are any firewalls installed on local devices. The biggest
draw for these in that they can create a useful, in−depth defense path.
Hardware Firewalls − Hardware firewalls use physical appliances, and they act like a
traffic router. The intercept data packets before they are connected to a network
server. The weakness here is that they can be easily bypassed, which goes against
your need for a firewall.
Maintaining these on more than one device is not easy, though, so you may
need more than one for each asset.
Cloud Firewalls − Cloud solutions are also called FaaS – firewalls as a service. They
often go hand in hand with proxy firewalls, and the most significant benefit to these is
that they grow with your business. They work to filter large amounts of traffic away
from your company, where it9s malicious.
Cloud and hardware, individual software firewalls – it all works to cover your
network. Once you identify your business needs, you can decide which firewalls will
be best.
Many small businesses think that they won9t need firewalls – after all, they are only
tiny outfits. The thing is, firewalls are not just created for larger companies. Every
single business needs to protect itself from outside attacks. 60% of smaller
businesses do not survive a cyberattack – which is why you need one.
Without a firewall, you put your business at risk of being hacked and having data
stolen. If you do not want to take that risk, you need to do your research on the best
firewalls for your business.
For example:
Allowing pornographic content into the workplace can put a company at risk
for sexual harassment claims, or otherwise create a hostile or demeaning
work environment.
Spam sites can lead to malware or other malicious software being installed
onto work computers.
Hate sites or sites with violent content can compromise employee safety and
also reflect poorly on the company as a whole.
Social networking sites can reduce productivity and distract employees from
routine tasks.
Content filtering helps to mitigate these risks by making such content difficult to
access in the workplace, and by demonstrating the company9s intolerance for
inappropriate, illegal, or objectionable content in general.
To be effective, content filtering has to be deployed across all content channels. The
most common channels include:
Web: The screening of Web sites or pages, as well bookmarks and other web
traffic.
Email: Screening of email for a variety of spam, malware and other undesired
or malicious content. This is usually done by scanning the subject line of the
emails forwarded through the filtering system. When a message is received
that fills the relevant criteria, the message will be placed in the recipient9s
junk folder. In some cases, it will even be sent back to the sender as
undeliverable.
Executables: The screening of executable files that may install malicious
software without warning.
What Is a VPN?
Virtual Private Network - Is an encrypted
connection over the Internet from a device to
a network. The encrypted connection helps
ensure that sensitive data is safely
transmitted. It prevents unauthorized people
from eavesdropping on the traffic and allows
the user to conduct work remotely. VPN
technology is widely used in corporate
environments.
Secure remote access − provides a safe, secure way to connect users and devices
remotely to a corporate network. It includes VPN technology that uses strong ways
to authenticate the user or device. VPN technology is available to check whether a
device meets certain requirements, also called a device9s posture, before it is allowed
to connect remotely.
Types of VPNs
Remote access - A remote access VPN securely connects a device outside the
corporate office. These devices are known as endpoints and may be laptops, tablets,
or smartphones. Advances in VPN technology have allowed security checks to be
conducted on endpoints to make sure they meet a certain posture before
connecting. Think of remote access as computer to network.
Site-to-site - A site−to−site VPN connects the corporate office to branch offices over
the Internet. Site−to− site VPNs are used when distance makes it impractical to have
direct network connections between these offices. Dedicated equipment is used to
establish and maintain a connection. Think of site−to−site access as network to
network.
Learning Activities:
1. Which Firewall Is Best for Your Business Needs and why Business
Need a Firewall? (20 pts.)
2. How do these firewalls work? And, which ones are the best for
your business’ cybersecurity needs?? (20 pts.)