SlideShare a Scribd company logo
Unit08:
Security Protocols
Overview
• Network Security
• IPSec
• VPN Protocol
• Kerberos
• Smart Cards
• Firewalls
• Proxy Servers
Network Security
• Security protocols protect a computer from attacks
• Networks and data are vulnerable to both active attacks,
in which information is altered or destroyed, and passive
attacks, in which information is monitored
• Types of Attacks :
– Altering data.
– Eavesdropping eg:sniffing
– IP/mac address spoofing eg:cheating
– Password pilfering eg:guessing
– Denial of service
– Virus
IPSec
• Based on cryptography /encryption
• ensures the privacy of network traffic as well as its authentication.
• IPSec functions at the Network layer
• The fact that IPSec is a network-layer protocol makes its services
transparent to applications
• IPSec ensures that data cannot be tampered with while it is
traversing any part of the network
IPSec
• Hands On Lab on Ipsec : gpedit.msc
• ICMP
– Authentication method:
– Keberos
– PreShared
– Certificates
VPN Protocols
• Virtual private networking is a system of creating a
private network connection that travels through a public
network
• One of the top considerations for using a VPN is to
reduce costs
• L2TP
– L2TP is a VPN protocol used along with IPSec to
ensure confidentiality of the data transmission
– PPTP Point-to-Point Tunneling Protocol courtesy of
Microsoft and Cisco’s Layer 2 Forwarding (L2F)
protocol
VPN
• Why Use L2TP Instead of PPTP
– L2TP client is included in Windows 2000 and later
operating systems
– L2TP supports both Cisco TACACS+ and Remote
Authentication Dial-In User Service (RADIUS)
authentication
– L2TP was developed to be a standard that is already
natively supported by Cisco routers and Windows
2000 servers
– offers a much higher level of security than PPTP
– L2TP offers a wider variety of protocols than PPTP—
supporting not only TCP/IP but also IPX/SPX and
Systems Network Architecture (SNA)
Secure Sockets Layer (SSL)
• SSL is a protocol that uses a public key to encrypt the
data transmitted across the Internet
• SSL runs transparently to applications, because it sits
below upper-layer applications and above the IP
• Working on behalf of upper-layer protocols, the SSL
server authenticates itself using a certificate and public
ID to an SSL-enabled client, which includes both
Netscape Navigator and Microsoft Internet Explorer Web
browsers, and others
SSL
SSL
• The SSL client ensures that the server’s certificate has
been issued by a trusted certificate authority (CA), it
authenticates itself back to the server using the same
process, and an encrypted link is created between the
two
• During the ensuing data transmission, SSL enacts a
mechanism to ensure that the data is not tampered with
before it reaches its destination
SSL is able to use several different types
of ciphers
• Data encryption standard (DES) and Triple DES.
– DES is a private key exchange that applies a 56-bit key to each 64-bit
block of data. Triple DES is the application of three DES keys in
succession.
• Key Exchange Algorithm (KEA).
– KEA enables the client and server to establish mutual keys to use in
encryption.
• Message Digest version 5 (MD5).
– This cipher creates a 128-bit message digest to validate data.
• Rivest-Shamir-Adleman (RSA).
– This is the most commonly used key exchange for SSL. It works by
multiplying two large prime numbers, and through an algorithm
determining both public and private keys. The private key does not need
to be transmitted across the Internet but is able to decrypt the data
transmitted with the public key.
• Secure Hash Algorithm (SHA).
– SHA produces a message digest of 160 bits using the SHA-1 80-bit key
to authenticate the message.
Client makes certain that the SSL server’s
certificate is issued by a trusted CA
Clients are authenticated by SSL servers
Kerberos
• Kerberos is an authentication protocol that is used to
establish trust relationships between domains and verify
the identities of users and network services
• When an entity attempts to access a Kerberos-protected
resource and provides correct authentication information,
Kerberos issues a ticket to it
• The ticket is actually a temporary certificate
• Each process requires a complex mutual authentication,
but this is completely transparent to the user
Kerberos
• Kerberos Trust Relationships
– Kerberos trust relationships
are typically transitive and
bidirectional in nature
– Wherever a Kerberos trust
exists, the users in one
domain will be able to
access resources in the
other domain as long as
the administrator has
granted those users
access
Smart Cards
• A way to ensure secure authentication using a physical
key
• Smart cards contain chips to store a user’s private key
and can also store logon information
• Smart cards require Public Key Infrastructure (PKI), a
method of distributing encryption keys and certificates
Firewall
• Piece of equipment is actually a router with two interfaces—one
leading to the public network and the other to the private network
• One of the methods a firewall uses to secure the network is packet
filtering
• For packets that meet firewall rules, they are either permitted or
blocked, depending on how the rule is implemented
• Firewalls are useful for protecting the network from unauthorized
access to data
• A firewall uses an access control list for all the commands to
execute packet filters
• When implementing a new firewall, you should review every
application that must function across the firewall.
Firewall
Firewall
• Demilitarized Zones
– demilitarized zone (DMZ) is an offshoot from a firewall
– DMZ is a middle area that offers more freedom of access from
the Internet
– DMZ is to provide access to certain servers, such as a Web
server or e-mail server, yet protects your network
Proxy Servers
• For a more sophisticated and secure method of blocking and
permitting traffic, you need to use a proxy server
• A proxy server doesn’t permit traffic to pass through it between
networks
• examine each packet up to the application layer and reassemble a
new packet for the other network
• the proxy server is able to log traffic and perform audits

More Related Content

PPT
PDF
18CS2005 Cryptography and Network Security
PDF
3 palo alto ngfw architecture overview
PDF
CNIT 141 13. TLS
PPT
Secure socket later
PDF
BAIT1103 Chapter 4
PDF
18CS2005 Cryptography and Network Security
PPTX
Encryption
18CS2005 Cryptography and Network Security
3 palo alto ngfw architecture overview
CNIT 141 13. TLS
Secure socket later
BAIT1103 Chapter 4
18CS2005 Cryptography and Network Security
Encryption

What's hot (20)

PDF
CNIT 50: 1. Network Security Monitoring Rationale
PDF
CNIT 123 12: Cryptography
PDF
20 palo alto site to site
PPTX
PKI & SSL
PDF
CNIT 123 8: Desktop and Server OS Vulnerabilities
PDF
CS6004 CYBER FORENSICS
PPTX
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
PPTX
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
PPTX
IWMW 1998: Server Management (3) Controlling access
PPTX
CISSP - Chapter 4 - Intranet and extranets
PPTX
Internet of Things Protocol - Session 2
PDF
CNIT 141: 13. TLS
PPSX
BSET_Lecture_Crypto and SSL_Overview_FINAL
PPTX
Securing TCP connections using SSL
PDF
Firewall traversals
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Cryptography by Afroz haider mir
PPTX
Key management
PDF
CNIT 123: 6: Enumeration
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 123 12: Cryptography
20 palo alto site to site
PKI & SSL
CNIT 123 8: Desktop and Server OS Vulnerabilities
CS6004 CYBER FORENSICS
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
IWMW 1998: Server Management (3) Controlling access
CISSP - Chapter 4 - Intranet and extranets
Internet of Things Protocol - Session 2
CNIT 141: 13. TLS
BSET_Lecture_Crypto and SSL_Overview_FINAL
Securing TCP connections using SSL
Firewall traversals
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography by Afroz haider mir
Key management
CNIT 123: 6: Enumeration
Ad

Viewers also liked (15)

PPTX
Types of authentication
PPT
I psec
PDF
End-to-End Encryption of Distributed Applications
PDF
Dynamic Spectrum Access and the race for mobile capacity
PPTX
Review on Whatsapp's End to End encryption and Facebook integration
PPSX
Brute force attack
PPT
Vpn site to site
PPT
Module 8 System Hacking
PPTX
Password Attack
PPTX
Kerberos protocol
PPTX
Token Authentication for Java Applications
PPTX
Kerberos
PPTX
Biometrics Technology
PDF
VPN - Virtual Private Network
Types of authentication
I psec
End-to-End Encryption of Distributed Applications
Dynamic Spectrum Access and the race for mobile capacity
Review on Whatsapp's End to End encryption and Facebook integration
Brute force attack
Vpn site to site
Module 8 System Hacking
Password Attack
Kerberos protocol
Token Authentication for Java Applications
Kerberos
Biometrics Technology
VPN - Virtual Private Network
Ad

Similar to Unit08 (20)

PPTX
ebusiness digital,E business signature .
PPTX
Final ppt ecommerce
PDF
Ericas-Security-Plus-Study-Guide
PPTX
Ecommerce final ppt
PPT
Network security and protocols
PPT
Web Security
PPT
Securing E-Commerce Networks Presentation.ppt
PPT
Chapter 9 security
PPT
chapter 4.pptWOLAITA SODO UNIVERSITY SCHOOL OF INFORMATICS DEPARTMENT OF INFO...
PDF
Network Security Applications
PPT
Network security
PPTX
Network security
PPTX
A Guide to Secure Remote Access - Eric Vanderburg
PPT
Ip sec and ssl
PDF
Telecommunications and Network Security Presentation
PPT
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
PPT
Security
PPT
Chapter 08
PPT
Network security
PDF
Ssl tls-beginners-guide
ebusiness digital,E business signature .
Final ppt ecommerce
Ericas-Security-Plus-Study-Guide
Ecommerce final ppt
Network security and protocols
Web Security
Securing E-Commerce Networks Presentation.ppt
Chapter 9 security
chapter 4.pptWOLAITA SODO UNIVERSITY SCHOOL OF INFORMATICS DEPARTMENT OF INFO...
Network Security Applications
Network security
Network security
A Guide to Secure Remote Access - Eric Vanderburg
Ip sec and ssl
Telecommunications and Network Security Presentation
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Security
Chapter 08
Network security
Ssl tls-beginners-guide

More from Nurul Nadirah (11)

PPT
PPT
PPT
PPT
PPT
PPT
PPT
PPT
PPT
PPT
PPT

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
KodekX | Application Modernization Development
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
Building Integrated photovoltaic BIPV_UPV.pdf
KodekX | Application Modernization Development
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Monthly Chronicles - July 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Understanding_Digital_Forensics_Presentation.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
20250228 LYD VKU AI Blended-Learning.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto

Unit08

  • 2. Overview • Network Security • IPSec • VPN Protocol • Kerberos • Smart Cards • Firewalls • Proxy Servers
  • 3. Network Security • Security protocols protect a computer from attacks • Networks and data are vulnerable to both active attacks, in which information is altered or destroyed, and passive attacks, in which information is monitored • Types of Attacks : – Altering data. – Eavesdropping eg:sniffing – IP/mac address spoofing eg:cheating – Password pilfering eg:guessing – Denial of service – Virus
  • 4. IPSec • Based on cryptography /encryption • ensures the privacy of network traffic as well as its authentication. • IPSec functions at the Network layer • The fact that IPSec is a network-layer protocol makes its services transparent to applications • IPSec ensures that data cannot be tampered with while it is traversing any part of the network
  • 5. IPSec • Hands On Lab on Ipsec : gpedit.msc • ICMP – Authentication method: – Keberos – PreShared – Certificates
  • 6. VPN Protocols • Virtual private networking is a system of creating a private network connection that travels through a public network • One of the top considerations for using a VPN is to reduce costs • L2TP – L2TP is a VPN protocol used along with IPSec to ensure confidentiality of the data transmission – PPTP Point-to-Point Tunneling Protocol courtesy of Microsoft and Cisco’s Layer 2 Forwarding (L2F) protocol
  • 7. VPN • Why Use L2TP Instead of PPTP – L2TP client is included in Windows 2000 and later operating systems – L2TP supports both Cisco TACACS+ and Remote Authentication Dial-In User Service (RADIUS) authentication – L2TP was developed to be a standard that is already natively supported by Cisco routers and Windows 2000 servers – offers a much higher level of security than PPTP – L2TP offers a wider variety of protocols than PPTP— supporting not only TCP/IP but also IPX/SPX and Systems Network Architecture (SNA)
  • 8. Secure Sockets Layer (SSL) • SSL is a protocol that uses a public key to encrypt the data transmitted across the Internet • SSL runs transparently to applications, because it sits below upper-layer applications and above the IP • Working on behalf of upper-layer protocols, the SSL server authenticates itself using a certificate and public ID to an SSL-enabled client, which includes both Netscape Navigator and Microsoft Internet Explorer Web browsers, and others
  • 9. SSL
  • 10. SSL • The SSL client ensures that the server’s certificate has been issued by a trusted certificate authority (CA), it authenticates itself back to the server using the same process, and an encrypted link is created between the two • During the ensuing data transmission, SSL enacts a mechanism to ensure that the data is not tampered with before it reaches its destination
  • 11. SSL is able to use several different types of ciphers • Data encryption standard (DES) and Triple DES. – DES is a private key exchange that applies a 56-bit key to each 64-bit block of data. Triple DES is the application of three DES keys in succession. • Key Exchange Algorithm (KEA). – KEA enables the client and server to establish mutual keys to use in encryption. • Message Digest version 5 (MD5). – This cipher creates a 128-bit message digest to validate data. • Rivest-Shamir-Adleman (RSA). – This is the most commonly used key exchange for SSL. It works by multiplying two large prime numbers, and through an algorithm determining both public and private keys. The private key does not need to be transmitted across the Internet but is able to decrypt the data transmitted with the public key. • Secure Hash Algorithm (SHA). – SHA produces a message digest of 160 bits using the SHA-1 80-bit key to authenticate the message.
  • 12. Client makes certain that the SSL server’s certificate is issued by a trusted CA
  • 13. Clients are authenticated by SSL servers
  • 14. Kerberos • Kerberos is an authentication protocol that is used to establish trust relationships between domains and verify the identities of users and network services • When an entity attempts to access a Kerberos-protected resource and provides correct authentication information, Kerberos issues a ticket to it • The ticket is actually a temporary certificate • Each process requires a complex mutual authentication, but this is completely transparent to the user
  • 15. Kerberos • Kerberos Trust Relationships – Kerberos trust relationships are typically transitive and bidirectional in nature – Wherever a Kerberos trust exists, the users in one domain will be able to access resources in the other domain as long as the administrator has granted those users access
  • 16. Smart Cards • A way to ensure secure authentication using a physical key • Smart cards contain chips to store a user’s private key and can also store logon information • Smart cards require Public Key Infrastructure (PKI), a method of distributing encryption keys and certificates
  • 17. Firewall • Piece of equipment is actually a router with two interfaces—one leading to the public network and the other to the private network • One of the methods a firewall uses to secure the network is packet filtering • For packets that meet firewall rules, they are either permitted or blocked, depending on how the rule is implemented • Firewalls are useful for protecting the network from unauthorized access to data • A firewall uses an access control list for all the commands to execute packet filters • When implementing a new firewall, you should review every application that must function across the firewall.
  • 19. Firewall • Demilitarized Zones – demilitarized zone (DMZ) is an offshoot from a firewall – DMZ is a middle area that offers more freedom of access from the Internet – DMZ is to provide access to certain servers, such as a Web server or e-mail server, yet protects your network
  • 20. Proxy Servers • For a more sophisticated and secure method of blocking and permitting traffic, you need to use a proxy server • A proxy server doesn’t permit traffic to pass through it between networks • examine each packet up to the application layer and reassemble a new packet for the other network • the proxy server is able to log traffic and perform audits