IAS102 Week 6 LESSON Security Technology Firewalls and VPNs
IAS102 Week 6 LESSON Security Technology Firewalls and VPNs
SECURITY TECHNOLOGY:
FIREWALLS AND VPNs
Access Control
Access Control
Is the method by which system
determine whether and how to admit
a user into a trusted area of the
organization
Achieved by means of a combination
of policies, program, technologies
Can be mandatory, non-discretionary,
or discretionary
Access Control
Access Control
Mandatory access control
use data classification schemes, users and data owners limited control to
information resources
Nondiscretionary control
are strictly-enforced version of MAC’s that are managed by central authority
in the organization and can be based on an individual role
Discretionary access control
are implemented at the discretion or option of the data user
Access Control
Access Control This figure shows an example of a discretionary access control
from peer-to-peer network using Microsoft Windows
In general, all access
control approaches rely on
as the following
mechanism
Identification
Authentication
Authorization
Accountability
Access Control
Identification
Identification is a mechanism
whereby an unverified entity – called
a supplicant – that seeks access to
resource proposes a label by which
they are known to the system
Identifier (ID) the label applied to
the supplicant or supplied by the
supplicant
Access Control
Authentication
Authentication is the process of
validating a supplicant’s purported
identity
Three widely used authentication
mechanism or authentication factors
Something a supplicant knows
something a supplicant has
something a supplicant is
Access Control
Authorization
Authorization is the matching of
authenticated entity to a list of
information assets and corresponding
access level
It can be handled in one of three ways
Authorization for each authenticated user
Authorization for members of a group
Authorization across multiple system
Access Control
Accountability
Accountability also known as
auditability, ensures that all action
on a system – authorized or
unauthorized – can be attributed to
an authenticated identity
it is accomplished by means of
system logs and database journals
and auditing of records
Firewall
Firewall
A firewall in an information
technology is prevent
specific types of information
from moving between the
outside world known as
untrusted network and the
inside world known as
trusted network
Firewall
Firewall Processing Mode
Firewalls fall into five major processing-mode categories
Packet-filtering
application gateway
circuit gateway
Mac layer firewalls
Hybrids
Firewall
Firewall Processing Mode
Firewalls fall into five major
processing-mode categories
Packet-filtering
application gateway
circuit gateway
Mac layer firewalls
Hybrids
Firewall
Packet-Filtering Firewall It shows the structure of IPv4 packet
technique used to control network access by
monitoring outgoing and incoming packets
and allowing them to pass or halt based on
the source and destination internet protocol
address, protocols and ports
it examine incoming packet header and filter
based on header information such as:
Destination address
Source address
Packet type
Other key information
Firewall
Packet-Filtering Firewall
Restriction most commonly
implemented are based on a
combination of the following
IP source and destination address
Direction
Protocol
TCP or UDP source and destination
port request
Firewall
Packet-Filtering Firewalls
Three subset of packet-filtering firewalls
Static filtering
allow entire sets of on type of packet to enter in
response to authorized request
Dynamic filtering
it allows only particular packet with particular
source, destination and port address to enter
Stateful inspection
also called satefull firewals, it can expedite
incoming packets that are responses to internal
request.
Firewall
Application Gateways
Also known as application-level firewall
or application firewall and proxy server
it is frequently installed on a dedicated
computer, separate from the filtering
router, but is commonly used in
conjunction with filtering router
Demilitarized Zone or DMZ is an area
between a trusted network and untrusted
network
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 6 – SECURITY TECHNOLOGY: FIREWALLS AND VPNs
Firewall
Circuit Gateway
It does not usually look at traffic
flowing between one network
and another, but they do prevent
direct connections between one
network and another.
Firewall
MAC Layer Firewall
MAC layer firewall link the
address of specific host
computers to ACL entries
that identify the specific
types of packets that can be
sent to each host, and block Figure 6-6: shows
all other traffic where in the OSI
model each of the
firewall processing
inspects data
Firewall
Hybrid Firewalls
Combine the elements of other
types of firewalls
A packet filtering and proxy server
packet filtering and circuit gateways
it consist of two separate firewall
devices, each is separate firewall
system, but they are connected so
that they worked in tandem
Firewall
Firewall Architecture
All firewall devices can be configures in a number of
network connection architecture
Three factors configuration that works best
the objectives of the network
the organization’s ability to develop and implement the
architecture
the budget available for the function
Four common architectural implementations
Packet-filtering routers
Screened host firewalls
Dual-homed firewalls
screened subnet firewalls
Firewall
Firewall Rules
Examine the control information in
individual packets. The rules either block
or allow those packets based on rules
that are defined on these pages.
Firewall rules are assigned directly to
computers or to policies that are in turn
assigned to a computer or collection of
computers
Firewall rules operates on the principles
of “that which is not permitted is
prohibited”
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 6 – SECURITY TECHNOLOGY: FIREWALLS AND VPNs
Firewall
Content Filters
Content filters is a software filter that allows administration to restrict
access to content from within a network
Set of program that restricts user in
to access networking protocols and internet locations
From receiving general types or specific examples of internet content
Reverse firewalls
Restrict internal access to external material
two components
Rating
Filtering