Unit 4
Unit 4
○ PGP stands for Pretty Good Privacy (PGP) which is invented by Phil
Zimmermann.
○ PGP was designed to provide all four aspects of security, i.e., privacy,
integrity, authentication, and non-repudiation in the sending of email.
○ PGP uses a digital signature (a combination of hashing and public key
encryption) to provide integrity, authentication, and non-repudiation.
PGP uses a combination of secret key encryption and public key
encryption to provide privacy. Therefore, we can say that the digital
signature uses one hash function, one secret key, and two
private-public key pairs.
○ PGP is an open source and freely available software package for email
security.
○ PGP provides authentication through the use of Digital Signature.
○ It provides confidentiality through the use of symmetric block
encryption.
○ It provides compression by using the ZIP algorithm, and EMAIL
compatibility using the radix-64 encoding scheme.
or decrypting digitally signed E-mails. This means that users can digitally
Emails could only be sent in NVT 7-bit format in the past, due to which
Protocol (SMTP) via email. Moreover, many data files are sent, including
music, video, and image files. This data is securely sent using the encryption
method. The data which is encrypted using a public key is then decrypted
using a private key which is only present with the receiver of the E-mail. The
receiver then decrypts the message and then the message is used. In this
Advantages of S/MIME
1. It offers verification.
origin.
secure manner.
Services of S/MIME
3. By using this we can transfer our data using an e-mail without any
problem.
The following are steps to have S/MIME certificates for securing your emails:
● Get or Apply for a Certificate: Log on to the website of the CA, and
select the S/MIME certificate you would like to buy or apply for. You
details.
authentication.
● Download and install the certificate: If your identity can be verified,
use the S/MIME certificate for encrypting and digitally signing all of
test that everything works fine with both encryption and digital
signing.
the way S/MIME certificates are issued during 2024. Many of these changes
result from new S/MIME Baseline Requirements from the CA/Browser Forum.
● Email Address in SAN: Please add the email address in the SAN
● Updated OIDs for certificate policy: The object identifiers for the
vital component of network security. It is the first line of defense for network
security. It filters network packets and stops malware from entering the
user’s computer or network by blocking access and preventing the user from
being infected.
Characteristics of Firewall
creates a choke point for all the external data trying to enter the
queries related to security can be kept under check from one place in
a system or network.
network doesn’t need to be secure. Some new threats can arise and
can be modified again and the network will become more secure.
to get the most use out of it, we need to deploy each of them at the
between the internal network and web server to get the most out of
it.
it. If the solution is easy. then it will be easier to implement it. A simple
according to the new possible threats leaving it with an efficient but more
simple structure. The problem that comes with complex designs is a
Every network security device has its purpose and its way of implementation.
if we use the wrong device for the wrong problem, the network becomes
the network to risk and is almost useless. Firstly the designing part must be
done then the product requirements must be found out, if the product is
already available then it is tried to fit in a design that makes security weak.
4. Layered Defense
Multilayer security design can be set to deal with different levels of threat. It
gives an edge to the security design and finally neutralizes the attack on the
system.
external attacks. The security becomes weak in case of internal attacks and
most of the attacks are done internally as it is easy to access and designed
Advantages of Firewall:
the system.
threat and then stops the possible loophole that can be used to
4. Prevents Email spamming: In this too many emails are sent to the
tracks all the data flowing and later uses it for the wrong purpose. A
firewall keeps track of all the users accessing the system or network
Limitations:
the firewall through a telephone lane that crosses paths with a data
impossible for the firewall to keep a track of all the files flowing
cost of the firewall also increases. Making the overall cost of the
firewall make a network secure but they can make work less
supply leaves very less resources for the rest of the functions or
the other hand hardware firewall does not affect the performance of
resources.
Types of Firewall
There are mainly three types of firewalls, such as software firewalls, hardware
firewalls, or both, depending on their structure. Each type of firewall has different
functionality but the same purpose. However, it is best practice to have both to
achieve maximum possible protection.
○ Packet-filtering Firewalls
○ Circuit-level Gateways
○ Application-level Gateways (Proxy Firewalls)
○ Stateful Multi-layer Inspection (SMLI) Firewalls
○ Next-generation Firewalls (NGFW)
○ Threat-focused NGFW
○ Network Address Translation (NAT) Firewalls
○ Cloud Firewalls
○ Unified Threat Management (UTM) Firewalls
Packet Filters –
● Packet filters consider only the most basic attributes of each packet,
and they don’t need to remember anything about the traffic since
each packet is examined in isolation. For this reason, they can decide
● Example: Filter can be set to block all UDP segments and all Telnet
logging onto internal hosts using Telnet and insider from logging
Application Gateways –
the same host but each gateway is a separate server with its own
processes.
● These firewalls, also known as application proxies, provide the most
● Example: Consider FTP service. The FTP commands like getting the
file, putting the file, listing files, and positioning the process at a
the proxy might accept get commands and reject put commands.
It works as follows:
such as HTTP.
Step-2: The application gateway asks about the remote host with which the
user wants to establish a connection. It also asks for the user id and
Step-3: After verifying the authenticity of the user, the application gateway
accesses the remote host on behalf of the user to deliver the packets.
Difference :
Packet filter Application-level
performance performance
Network topology can hide from
Network topology can not hide
the attacker
protocol type
Circuit-level Gateways
Circuit-level gateways are another simplified type of firewall that can be easily
configured to allow or block traffic without consuming significant computing
resources. These types of firewalls typically operate at the session-level of the OSI
model by verifying TCP (Transmission Control Protocol) connections and sessions.
Circuit-level gateways are designed to ensure that the established sessions are
protected.
In simple words, when a user establishes a connection and requests data, the
SMLI firewall creates a database (state table). The database is used to store
session information such as source IP address, port number, destination IP
address, destination port number, etc. Connection information is stored for each
session in the state table. Using stateful inspection technology, these firewalls
create security rules to allow anticipated traffic.
In most cases, SMLI firewalls are implemented as additional security levels. These
types of firewalls implement more checks and are considered more secure than
stateless firewalls. This is why stateful packet inspection is implemented along
with many other firewalls to track statistics for all internal traffic. Doing so
increases the load and puts more pressure on computing resources. This can give
rise to a slower transfer rate for data packets than other solutions.
Threat-focused NGFW
Threat-focused NGFW includes all the features of a traditional NGFW.
Additionally, they also provide advanced threat detection and remediation. These
types of firewalls are capable of reacting against attacks quickly. With intelligent
security automation, threat-focused NGFW set security rules and policies, further
increasing the security of the overall defense system.
When multiple devices are used to connect to the Internet, NAT firewalls create a
unique IP address and hide individual devices' IP addresses. As a result, a single
IP address is used for all devices. By doing this, NAT firewalls secure independent
network addresses from attackers scanning a network for accessing IP addresses.
This results in enhanced protection against suspicious activities and attacks.
In general, NAT firewalls works similarly to proxy firewalls. Like proxy firewalls, NAT
firewalls also work as an intermediate device between a group of computers and
external traffic.
Cloud Firewalls
Whenever a firewall is designed using a cloud solution, it is known as a cloud
firewall or FaaS (firewall-as-service). Cloud firewalls are typically maintained and
run on the Internet by third-party vendors. This type of firewall is considered
similar to a proxy firewall. The reason for this is the use of cloud firewalls as proxy
servers. However, they are configured based on requirements.
One NIC connects to the untrusted network (e.g., the internet), while the other
connects to the trusted network (e.g., the internal corporate network).
How it Works:
Diagram:
Explanation:
network.
network.
The screening router filters all incoming and outgoing traffic to and from the
screened host. Only authorized traffic is allowed to reach the screened host.
two firewalls, one on the external network side and one on the internal
network side.
Diagram:
Explanation:
2. External Firewall: Filters traffic between the internet and the DMZ.
3. Internal Firewall: Filters traffic between the DMZ and the internal
network.
isolated from both the internet and the internal network, enhancing security.
Bastion Host
Diagram:
The bastion host is a single point of entry for external users. It is configured
● Strong passwords
strong security measures, the bastion host reduces the risk of attack.