Matakuliah : M0284/Teknologi & Infrastruktur E-Business Tahun : 2005

advertisement
Matakuliah
Tahun
Versi
: M0284/Teknologi & Infrastruktur E-Business
: 2005
: <<versi/revisi>>
Pertemuan 10
Network Security and E-Commerce
1
Learning Objectives
• Understand how viruses operate and how to
protect systems from them.
2
Virus Protection
• Virus Categories
– File infectors
– System or boot-record infectors
– Macro viruses
– Worms
3
Virus Protection
• Backup and Recovery
– Organizations need to have clear procedures for
backup and recovery.
• Onsite
• Offsite
• Timed
– Organization must enforce these procedures.
– Take advantage of new technologies
• Compression
• Optical storage
– Clear recovery procedures
4
Firewalls
• Necessary for Enterprise and service providers,
Small offices, and consumers having access to
Internet.
• Design Goals of a Firewall:
– Control the traffic from inside to outside and vice
versa.
– Establish local security policies.
– Avoid penetration through simplicity.
• Clear set of rules
• Easily maintained
• Assigned responsibilities
5
Firewalls
• Firewalls can be Classified in:
– Packet Filtering Router
– Circuit-Level Gateways
– Application-Level Gateways
• Proxy Servers
6
Firewalls
Packet Filtering Router
• Applies a set of rules to all incoming packets
• Filtering rules are based on the fields of the
packet.
7
Firewalls
Circuit-Level Gateway
• Establishes connections between users on
the outside and users on the inside.
• No direct end-to-end links, TCP
redirection.
• Does not provides network-layer services.
8
Firewalls
• Multilevel Firewalls
– Based on fact that intruder can be repelled
by multiple layers of defense or at least
slowed down.
9
Firewalls
Application-Level Gateway
• Establishes connections at the application
level.
• Stricter security than packet filtering.
• Proxy servers are functionally similar.
• Proxy servers also act as cache servers to
enhance performance.
10
Security Audit
• Security audits feature
– Top-Down interviews
– Identification of deviation from existing
policies.
– Analysis using proven security practices
methodology (SPM).
• Many companies outsource audits.
– Based on costs
– Based on skills
11
Security Levels
• Security of the Organization
– Select the right solution
– Intrusion detection
• Security of the Client
– Protection at the browser
– Protection through virtual private network
• Security of the Third Party
– Distributed Denial Of Service Attacks (DDOS)
– Filtering outbound traffic
12
Security Levels - Clients
• Connections to the Internet are not
anonymous.
– Privacy issues
• Transactions may leave residual
information.
– Caching
– Cookies
– Log
13
Security Levels - Clients
• Countermeasures in Netscape & Internet
explorer
14
Directory Services
• Definition
– A network service that identifies all resources on a
network and makes them accessible to users and
applications.
• Standards
– X.500 is an ISO and ITU standard that defines how
global directories should be structured. X.500
directories are hierarchical
– LDAP was conceived of as a way to simplify access
to a directory service that was modeled according to
the X.500 standards. LDAP has emerged as the
solution needed to make global directory services a
reality.
15
Directory Services
• Current products
– Number based on Lightweight Directory
Access Protocol (LDAP)
– CP: Injoin Directory Server v3.X
– NETSCAPE: iPlanet Directory Server 4.11
– NOVELL: NDS eDirectory Version 8.X
– ORACLE: Oracle Internet Directory 2.X
– Microsoft Active Directory Service
16
Directory Services
• Single Sign-On
– A user needs only one user ID and password, which
eliminates the security headaches and vulnerabilities
associated with multiple IDs/passwords.
– Frees security administrators from the mundane task
of assigning passwords
– Single Sign-On should work across all platforms,
databases, and applications and includes out-of-thebox support for third-party technologies such as
Authentication, PKI, and smart cards.
17
Download