0% found this document useful (0 votes)
12 views21 pages

Firewall Design Principle, Trusted System and Praticle Implementation of Cryptograohic and Security

The document discusses the principles of firewall design, trusted systems, and cryptographic security implementations. It outlines the key characteristics, needs, advantages, limitations of firewalls, and the importance of trusted systems in protecting data and ensuring compliance. Additionally, it covers practical implementations of cryptography, including encryption, authentication, digital signatures, VPNs, and secure storage methods.

Uploaded by

adamsnewera777
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views21 pages

Firewall Design Principle, Trusted System and Praticle Implementation of Cryptograohic and Security

The document discusses the principles of firewall design, trusted systems, and cryptographic security implementations. It outlines the key characteristics, needs, advantages, limitations of firewalls, and the importance of trusted systems in protecting data and ensuring compliance. Additionally, it covers practical implementations of cryptography, including encryption, authentication, digital signatures, VPNs, and secure storage methods.

Uploaded by

adamsnewera777
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

FIREWALL DESIGN PRINCIPLE

,TRUSTED SYSTEM AND


PRATICLE IMPLEMENTATION OF
CRYPTOGRAOHIC AND
SECURITY
What is Fire wall ?
• A Firewall is a hardware or software to prevent a
private computer or a network of computers from
unauthorized access, it acts as a filter to avoid
unauthorized users from accessing private computers
and networks. It is a vital component of network
security. It is the first line of defense for network
security. It filters network packets and stops malware
from entering the user’s computer or network by
blocking access and preventing the user from being
infected.

-Paul Raj
Key Characteristics of Effective
Firewalls
 Rule-Based Filtering: Packet inspection against pre-defined rulesets
o Examples: Permit/Deny based on IP address, port number, protocol. Cisco ACLs allow granular rule definition.
 Stateful Inspection: Tracks active connections, prevents unauthorized traffic
o Maintains connection table; detects out-of-state packets, prevents spoofing attacks.
• Example: TCP handshake tracking.
 Proxy Functionality: Intermediary between internal and external networks
o Hides internal IP addresses, provides content filtering and caching. Example: Application-layer proxies like
Squid.
 Network Address Translation (NAT): Maps internal private IPs to public IPs
o Conserves public IP addresses, enhances security by hiding network topology.
• Example: PAT (Port Address Translation).
 VPN Support: Secure remote access using encrypted tunnels
o IPsec and SSL VPNs encrypt traffic, authenticate users. Example: OpenVPN, Cisco AnyConnect.
 Logging and Monitoring: Records firewall activity for auditing and analysis
o Generates logs for traffic, security events, and rule changes. Example: Syslog, SNMP. SIEM integration for
centralized analysis
- UJIN INNOCENT RAJ
The Needs and Importance of
Firewalls
 Preventing unauthorized access to internal networks

o Data breach costs average $4.45 million in 2023 (IBM Cost of a Data Breach Report).
 Protecting against malware and other cyber threats

o Ransomware attacks increased 13% in 2023 (Verizon DBIR).


 Enforcing security policies and compliance requirements

o PCI DSS, HIPAA, GDPR require robust security controls, including firewalls.
 Monitoring and controlling network traffic

o Detecting and preventing suspicious activity, such as port scanning and DDoS attacks.
 Enabling secure remote access for authorized users

o VPNs provide secure connections for remote workers and branch offices.

- TAMIL SELVAN
Advantages of Implementing
Firewalls
 Enhanced network security and data protection

o Reduces the risk of data breaches and other security incidents.


 Improved compliance with regulatory requirements

o Helps organizations meet PCI DSS, HIPAA, GDPR, and other compliance standards.
 Increased network visibility and control
 Reduced operational costs associated with security incidents

o Prevents costly downtime and data recovery efforts.


o Simplified network management and security administration
o Centralized management of security policies and rules.

-SESHAGIRI
Limitations and Challenges of
Firewalls
 Cannot protect against insider threats

o Malicious or negligent employees can bypass firewall controls.


 Vulnerable to application-layer attacks

o Sophisticated attacks can bypass traditional firewall defenses.


 Requires ongoing maintenance and updates

o Firewall rules must be regularly reviewed and updated to address evolving threats.
 Can impact network performance

o Deep packet inspection and other advanced security features can introduce latency.
 Complex configuration and management

o Requires skilled security professionals to configure and maintain firewalls effectively.

- THIRUPATHI
What is Trusted System?

• Cyber safety educates users on protecting the technology they use


daily. It emphasizes best practices for secure cloud usage and
highlights the importance of network and system security to avoid
risks. Trusted Systems play a key role in security by protecting against
malware and unauthorized access, ensuring only verified users can
access the system, and providing security at multiple levels.

-THIRUMAL
Levels Of Trusted System

1. Physical Security: Protects the hardware and physical components of the system. This involves securing
devices against theft, tampering, or unauthorized physical access.
2. Operating System Security: Ensures the operating system is configured and protected to prevent
unauthorized access and maintain system integrity. This involves
• setting up user permissions, access controls, and system configurations that minimize vulnerabilities.
3. Application Security: Focuses on protecting software applications from threats like bugs, vulnerabilities, or
attacks (such as SQL injection or malware). Trusted systems ensure that applications have secure coding
practices and are regularly updated to patch security holes.
4. Network Security: Safeguards the communication channels between systems and networks. This involves
using firewalls, encryption, intrusion detection/prevention systems (IDS/IPS), and other tools to secure data
transmission and block malicious traffic.
5. User Authentication and Access Control: Ensures that only authorized users can access certain data or
systems. This is done through methods like passwords, biometrics, two-factor authentication, and role-based
access control (RBAC).
6. Data Security: Protects sensitive information from unauthorized access, corruption, or loss. This includes
encryption, data backups, and secure data storage practices.
7. Audit and Monitoring: Trusted systems continuously monitor user activity, system changes, and security
logs to detect potential breaches, intrusions, or policy violations. Regular audits ensure that security measures
are being followed.

- SARAN SACHIN
Importance of Trusted System
1. Protection from Unauthorized Access: Trusted systems limit access to verified users, ensuring that only those with the
proper credentials or permissions can interact with sensitive data or critical system functions. This helps prevent
unauthorized users or attackers from exploiting the system.
2. Prevention of Malicious Software and Attacks: Trusted systems protect against malware, viruses, and other malicious
software by using secure configurations, encryption, and monitoring tools to detect and block harmful activities. This
reduces the risk of data breaches and system compromises.
3. Data Integrity and Confidentiality: Trusted systems ensure that data remains intact,
• unaltered, and confidential. Through encryption and strict access controls, they prevent unauthorized tampering or disclosure
of sensitive information, safeguarding personal, financial, and business data.
4. Compliance and Legal Protection: Many industries require adherence to specific
• security standards and regulations (e.g., GDPR, HIPAA, PCI DSS). Trusted systems help organizations comply with these
regulations by providing a secure framework for managing and protecting data, which in turn reduces the risk of legal and
financial consequences.
5. System Reliability and Availability: By securing the infrastructure and processes of a system, trusted systems contribute to
overall reliability and uptime. Protection against denial-of-service (DoS) attacks and other disruptions ensures that the
system remains available to authorized users when needed.
-SUSAI RAJ
Real Life Examples:
Banking and Financial Systems:

•Online Banking: Trusted systems secure user accounts and transactions with features like multi-factor authentication
(MFA), encryption, and fraud detection.
•ATMs: Trusted systems verify user identity with PINs and biometrics, protecting against fraud and cyber-attacks.

Healthcare Systems:
•Electronic Health Records (EHRs): Trusted systems protect patient data, ensuring only authorized professionals
can access sensitive health information, and comply with regulations like HIPAA.
•Medical Devices: Trusted systems secure communication and data in devices like pacemakers and insulin pumps,
preventing unauthorized access.

Cloud Computing and Services:


•Cloud Storage: Trusted systems ensure data confidentiality and integrity with encryption, secure access, and
monitoring.
•SaaS: Platforms like Salesforce and Microsoft 365 secure user accounts and data while ensuring regulatory
compliance.
Government and National Security:
•National ID Systems: Trusted systems secure national identification databases, using biometrics and encryption for
identity verification.
•Military Systems: Trusted systems protect classified information, secure communication, and guard against
cybersecurity threats.
E-commerce Platforms:
•Payment Gateways: Trusted systems like PayPal and Stripe ensure secure transactions with encryption and fraud
detection.
•Online Retailers: Trusted systems secure customer data during online shopping on platforms like Amazon and eBay.

-VENKATESAN
what is cryptographic ?

• Cryptography is the practice of securing communication and data by


transforming it into an unreadable format, which can only be
deciphered by someone with the appropriate key or method. It is
fundamental in protecting the confidentiality, integrity, and
authenticity of data, especially in network security, where information
is exchanged over potentially insecure channels.

-XAVIER
Practical Implementation Of Cryptographic
security:
• 1. Encryption
• Purpose: Ensures data confidentiality by transforming plaintext into unreadable
ciphertext, making it accessible only to authorized parties.
• Implementation:
• Symmetric Encryption (AES, DES): Used for encrypting large amounts of data. Both the sender
and receiver share the same key.
• Asymmetric Encryption (RSA, ECC): Used for secure key exchange. The sender encrypts the
data with the recipient’s public key, and only the recipient can decrypt it with their private key.
• TLS/SSL Protocols: Used in secure web communication (HTTPS), where asymmetric encryption
secures the exchange of symmetric keys, and symmetric encryption is used for the data
transfer.

-TITUS
• 2. Authentication
• Purpose: Verifies the identity of users, devices, or systems attempting to access a
network or service.
• Implementation:
• Password-based Authentication: Secure systems require strong password policies and can use
hash functions (e.g., SHA-256) to store passwords securely.
• Multi-factor Authentication (MFA): Enhances security by requiring multiple verification
methods, such as a password and a one-time code sent via SMS or email.
• Public Key Infrastructure (PKI): Utilized for authenticating users through certificates, which are
issued by trusted Certificate Authorities (CAs) and can be used for secure login (e.g., smart
cards, digital certificates).

-REEGAN
• 3. Digital Signatures
• Purpose: Ensures data integrity and verifies the authenticity of the
sender.
• Implementation:
• RSA/ECC Digital Signatures: The sender signs the data using their private key,
and the recipient verifies it using the sender’s public key.
• Blockchain: In distributed systems like blockchain, digital signatures are used
to confirm transactions and maintain a transparent, tamper-proof ledger.

-HENDRY SUMAN
• 4. Virtual Private Networks (VPNs)
• Purpose: Secures remote access and ensures that data sent over the
internet is encrypted and private.
• Implementation:
• IPSec and SSL/TLS: Used to create secure tunnels for data transmission
between two endpoints over an insecure network.
• VPN Clients/Servers: Allow users to securely connect to a network by
encrypting all traffic between the client and the server.

-YESUDOSS
• 5. Secure Storage
• Purpose: ensures sensitive data is protected from unauthorized access, even if
the storage medium is physically compromised.
• Techniques for Secure Storage:
• Encryption: Data is encrypted (e.g., AES, RSA) before storage, ensuring only
authorized users can decrypt it.
• Hashing: Used for passwords, where data is converted into a hash that is stored.
Verification is done by comparing hashes.
• Salted Hashing: A random value (salt) is added to prevent rainbow table attacks.
• Secure Key Storage: Cryptographic keys are stored in secure hardware (e.g.,
HSMs, TPMs) to prevent unauthorized access.
• Database Encryption: Encrypts sensitive data at the field or table
level to protect it even if the database is breached.

-NAVEEN

You might also like