Internetsecurityprotocols
Internetsecurityprotocols
Network security protocols are a type network protocol that ensures the
security and integrity of data in transit over a network connection. Network
security protocols define the processes and methodology to secure network
data from any illegitimate attempt to review or extract the contents of data.
It consists of a set of protocols designed by Internet Engineering Task Force
(IETF). It provides security at network level and helps to create
authenticated and confidential packets for IP layer.
3
Cont..
4
Security: at which layer?
Application layer
closer to user
more sophisticated/granular controls
end-to-end
Lower layer
Application independent –hide traffic data –but vulnerable in middle points
•Combine?
5
Security: at which layer?
Internet security threats impact the network, data security and other internet
connected systems. Cyber criminals have evolved several techniques to
threat privacy and integrity of bank accounts, businesses, and organizations.
6
Common Internet Security Threats
8
Secure Sockets Layer (SSL)
9
SSL Protocol Stack
10
Figure 1: SSL Protocol Stack
SSL Record Protocol Operation
11
Figure 2: SSL Record Protocol Operation
How Does the SSL Certificate Create a Secure Connection?
12
How Does the SSL Certificate Create a Secure Connection?
14
IP Security (IPsec) Architecture
The IPsec is an open standard as a part of the IPv4 suite. IPsec uses the
following protocols to perform various functions:
Authentication Headers (AH) provides connectionless data integrity and
data origin authentication for IP datagrams and provides protection against
replay attacks.
Encapsulating Security Payloads (ESP) provides confidentiality,
connectionless data integrity, data-origin authentication, an anti-replay
service (a form of partial sequence integrity), and limited traffic-flow
confidentiality. 15
IP Security (IPsec) Architecture
Security Associations (SA) provides the bundle of algorithms and data that
provide the parameters necessary for AH and/or ESP operations. The
Internet Security Association and Key Management Protocol (ISAKMP)
provides a framework for authentication and key exchange, with actual
authenticated keying material provided either by manual configuration with
pre-shared keys, Internet Key Exchange (IKE and IKEv2), Kerberized
Internet Negotiation of Keys (KINK), or IPSECKEY DNS records
16
Benefits of IPsec
17
Hypertext Transfer Protocol Secure (HTTPS)
18
How does HTTPS work :SSL Explained
19
Figure 4: HTTPS work :SSL Explained
Kerberos
23
Why should you use TLS?
TLS encryption can help protect web applications from attacks such as data
breaches, and DDoS attacks. Additionally, TLS-protected HTTPS is
quickly becoming a standard practice for websites. For example, the Google
Chrome browser is cracking down on non-HTTPS sites, and everyday
Internet users are starting to become more wary of websites that don’t
feature the HTTPS padlock icon.
24
How does TLS work?
TLS can be used on top of a transport-layer security protocol like TCP. There
are three main components to TLS: Encryption, Authentication, and Integrity.
Encryption: hides the data being transferred from third parties.
Authentication: ensures that the parties exchanging information are who
they claim to be.
Integrity: verifies that the data has not been forged or tampered with.
25
What’s the difference between TLS and SSL?
26
What’s the difference between TLS and HTTPS?
27
Conclusion