Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

Firewall and PKI

for security
Prepared by
Apoorva Mahajan
&
Jyoti Chugh
Types of outsiders attack

Intrusion
(data compromise like
loss of confidentiality ,
integrity)

Information theft

Denial of service attack


Firewall

A firewall is hardware, software, or a combination of both that is used to


prevent unauthorized programs or Internet users from accessing a private
network and/or a single computer

Device that provides secure connectivity between networks


Need for firewall

Protection from Vulnerable Services


Controlled Access to Site Systems



Concentrated Security


Enhanced Privacy
Hardware vs. Software Firewalls

•Hardware Firewalls
• Protect an entire network
• Implemented on the router level
• Usually more expensive, harder to configure
•Software Firewalls
• Protect a single computer
• Usually less expensive, easier to configure
Firewalls use 3 types of filtering
mechanisms:

•Packet filtering or packet purity


 
Data flow consists of packets of information and firewalls analyze these
packets to sniff out offensive or unwanted packets depending on what you
have defined as unwanted packets.
 
•Proxy
 
Firewalls in this case assume the role of a recipient & in turn sends it to the
node that has requested the information & vice versa.
 
•Inspection
 
In this case Firewalls instead of sifting through all of the information in the
packets, mark key features in all outgoing requests & check for the same
matching characteristics in the inflow to decide if it relevant information
that is coming through.
 
Some examples

Firewalls are a must have for any kind of computer usage that go online.
They protect you from all kinds of abuse & unauthorised access like trojans
that allow taking control of your computers by remote logins or backdoors,
virus or use your resources to launch DOS attacks.

Some of the firewall products that you may want to check out are:
McAfee Internet Security
Microsoft Windows Firewall
Norton Personal Firewall
Trend Micro PC-cillin
ZoneAlarm Security Suit
PKI
Public key infrastructure

Public Key Infrastructure (PKI) is the accepted, global standard for Internet
security. It is a system that uses asymmetric encryption and digital
certificates to achieve secure Internet services
A Public Key Infrastructure generally consists of four parts.

•Certificate Authority (CAs) are organisations that issue electronic


credentials such as digital certificates. The CA is generally known as the
trusted third party.
•A directory service
•Services
•Business users in a client server environment
PKI thus fulfils the four basic principles of a
secure Internet:

Authentication - to identify a user


Verifying that users actually are who they claim they are and have the
authority to access the resource is the process of authentication.

Non-repudiation - to assure the origin of a transaction


Non-repudiation means users are unable to deny that they have sent
a message or participated in a transaction. Non- repudiation, or the
act of guaranteeing the identity of the issuer, is derived from the public
key infrastructure benefits.
Confidentiality - to keep information encrypted and secure
The confidentiality service is more or less a cryptographic issue.
None but the communicating parties are able to se an ongoing
transaction as the session is encrypted.
Integrity
Integrity means to prove that information has not been tampered
with during transmission.
Working of PKI…
A user applies for a certificate with his public key at a registration authority
(RA). The latter confirms the user's identity to the certification authority (CA)
which in turn issues the certificate. The user can then digitally sign a
contract using his new certificate. His identity is then checked by the
contracting party with a validation authority (VA) which again receives
information about issued certificates by the certification authority.
A PKI can be used within almost any networked environment, from
an internal corporate network to the World Wide Web. Implementing
a PKI brings with it an infrastructure that can be leveraged to
achieve secure communication not only across an enterprise but
also outside it. The use of a PKI to create legally binding digital
signatures means online trade and communication with customers,
partners and suppliers can be conducted professionally and safely.

You might also like