Lecture 9

Week 09: Security Technology (Part 2)

TCP/IP layers

Security: the Demilitarized Zone (DMZ)

alt text

Home web server - What is happening

alt text

WhatIsMyIPAddress.com (or worse, https://amiunique.org/fp)

Business web surfing – what is happening?

alt text

The benefits of a proxy (#1)

alt text

Benefit #1:

alt text

Benefit #2:

alt text

Proxy types

Transparent Proxy

Non-Transparent Proxy

Explicit Proxy

Proxies – in summary

Virtual private networks (VPNs)

alt text

This is exactly the result that many situations need - all communications secured – regardless of the type of sending application! Let’s consider two popular scenarios for VPN usage in business

(1)Transport mode

alt text

alt text

Virtual private networks (VPNs) – Design #2

(2)Tunnel mode

alt text

‘Geographical’ restrictions to certain services are problematical

alt text

alt text

VPNs – the ‘business case’

  1. VPNs provide a cheap, secure and flexible way to extend the ‘boundaries’ of the business network
  1. In the ‘teleworker’ model, the VPN also means that the remote network users (i.e. the ‘teleworkers’) must follow the same corporate policies as workers ‘within’ the network must embrace. This is a good result for the organization.
  2. Point 2 is further enhanced (for web usage) when we consider how a VPN server and a Web Proxy server interact – we now look to consider this!

Proxies AND VPNs – working together #1

alt text

alt text

Intrusion Detection System (IDS) : Introduction – why needed?

alt text

We need something like a ‘magnifying glass’ over the internal network - IDS

IDS (intrusion detection systems) – strategy in overview

alt text

IDS

An intrusion detection system (IDS) – a software system - will:

Important terminology

IDS – More terminology

Why use an IDS

IDS: 2 types of operating scope & 2 detection methods used

Detection method (1) : signature-based IDS

Detection method (2) : statistical anomaly-based IDS

IDS Scope (1): Network-Based IDS (NIDS)

alt text

Advantages and Disadvantages of NIDSs

IDS Scope (2): Host-based IDS

alt text

Advantages and Disadvantages of HIDSs

Deploying Network-Based IDSs

alt text