NETWORK SECURITY OVERVIEW

Slides:



Advertisements
Presentasi serupa
Keamanan Data dan Jaringan Komputer
Advertisements

Jaringan komputer Pertemuan 4.
Referensi Model TCP/IP
Pengenalan Jaringan Komputer
Konfigurasi Wireless Network Dg Windows XP Fitri Setyorini.
Transmission Control Protocol/Internet Protocol
Oleh : Saripudin,MT.  After studying this chapter, you will be able to:  Recognize the difficulties in managing information resources.  Understand.
Virtual Private Network
IP Address Dedi Hermanto.
Network Sillabus Konsep Jaringan Administrasi Jaringan
Secure Socket Layer (SSL)
Edi Rosadi, SKom Perancangan Intranet dan Internet.
4/19/20151 Chapter 3 Oktober /19/20152 Objectives Mendefinisikan lapisan Aplikasi sebagai sumber dan tujuan dari data untuk komunikasi melalui.
3 long-distance dial-up connection 4 Figure 7-9 A WAN using frame relay.
Oleh Agus Prihanto, ST, M.Kom
Simple Object Access Protocol
1 Pertemuan 12 Pengkodean & Implementasi Matakuliah: T0234 / Sistem Informasi Geografis Tahun: 2005 Versi: 01/revisi 1.
PROTOKOL LAPISAN APLIKASI
Keamanan lapis jaringan
CARA KERJA WEB Rofilde Hasudungan.
Referensi Model TCP/IP
Pembahasan Pendahuluan HTTP FTP SMTP DNS Telnet.
Wired and Wireless Network
Keamanan Sistem Informasi
Membangun Web Site“Cantik”
Jaringan Komputer: Protokol dan Model Lapisan OSI
Telecommunications, the Internet, and Wireless Technology
Secure Socket Layer (SSL)
Toleransi Kesalahan.
TCP & UDP.
PENGENALAN JARINGAN KOMPUTER
Slide 6 PENGAMAN JARINGAN
KOMUNIKASI DATA S. Indriani L, M.T
TCP / IP Kelompok III.
Keamanan Jaringan Komputer
NETWORK LAYER OSI LAYER 3.
Slide 6 PENGAMAN JARINGAN
Website WEB World Wide Web www W3 A set of interconnected webpages, usually including a homepage, generally located on the same server, and prepared.
William Stallings Data and Computer Communications 7th Edition
SECURITY TOOLS UNTUK PENGAMANAN
Khairil Fakultas Ilmu Komputer Universitas Dehasen
TET 2633 Jaringan Komputer Model Referensi OSI.
SECURITY TOOLS UNTUK PENGAMANAN
Bimbingan Teknis : Web Application : Threats and Countermeasures
Referensi Model TCP/IP
Pengaman Jaringan Agung BP Pertemuan 2.
Protokol Jaringan Pada Sistem Multimedia
Model Referensi OSI TET 2633 Jaringan Komputer Model Referensi OSI
Pengantar Teknologi Informasi Introduction to Computers and Networks
Infrastruktur E-Business
Pengantar Teknologi Informasi
CYBER CRIME Fahrobby adnan S.KOM., MMSI
Model Referensi OSI 14-Sep-18 Jaringan Komputer.
SISTEM JARINGAN KOMPUTER
1 © 2004, Cisco Systems, Inc. All rights reserved. Module 2 Single-Area OSPF.
Security+ Guide to Network Security Fundamentals
Application, Presentation, Session Layer
ARSITEKTUR DAN PROTOKOL
How to Set Up AT&T on MS Outlook ATT is a multinational company headquartered in Texas. ATT services are used by many people widely across.
Keamanan Informasi dan Administrasi Jaringan
Application, Presentation, Session Layer
Application, Presentation, Session Layer
Keamanan Informasi Week 9. Remote connection, SSL.
THE INFORMATION ABOUT HEALTH INSURANCE IN AUSTRALIA.
Jaringan Komputer.
HughesNet was founded in 1971 and it is headquartered in Germantown, Maryland. It is a provider of satellite-based communications services. Hughesnet.
Kasus DDNS Dynamic Domain Name Server
 Zoho Mail offers easy options to migrate data from G Suite or Gmail accounts. All s, contacts, and calendar or other important data can be imported.
In this article, you can learn about how to synchronize AOL Mail with third-party applications like Gmail, Outlook, and Window Live Mail, Thunderbird.
Wednesday/ September,  There are lots of problems with trade ◦ There may be some ways that some governments can make things better by intervening.
Transcript presentasi:

NETWORK SECURITY OVERVIEW NETWORK SECURITY TUTORIAL

organizations greatly rely on computer networks to share information throughout the organization in an efficient and productive manner

VULNERABILITY thousands of workstations on company network are directly connected to the Internet. This sort of unsecured network becomes a target for an attack which holds valuable information and displays vulnerabilities

PHYSICAL NETWORK TWO OR MORE COMPUTING DEVICES CONNECTED TOGETHER FOR SHARING RESOURCHES EFFICIENTLY

SHARE BY WIRED/ WIRELESS

SHARE BY WIRED/ WIRELESS wireless network are considered less secure than wired network. wireless network can be easily accessed without any physical connection

TCP/IP two distinct computer network protocols mostly used together. Due to their popularity and wide adoption, they are built in all operating systems of networked devices.

Beberapa kerentanan keamanan umum dari protokol TCP / IP HTTP adalah protokol lapisan aplikasi dalam TCP / IP suite yang digunakan untuk mentransfer file yang membentuk halaman web dari server web. Transfer ini dilakukan dalam plain text dan penyusup dapat dengan mudah membaca paket data yang dipertukarkan antara server dan klien

Beberapa kerentanan keamanan umum dari protokol TCP / IP Kerentanan HTTP lainnya adalah otentikasi lemah antara klien dan server web menyebabkan serangan pembajakan sesi di mana penyerang mencuri sesi HTTP dari pengguna yang sah

Beberapa kerentanan keamanan umum dari protokol TCP / IP otentikasi lemah antara klien -- server web selama inisialisasi sesi. Kerentanan ini dapat menyebabkan serangan pembajakan sesi di mana penyerang mencuri sesi HTTP dari pengguna yang sah.

in TCP/IP based network communication, if one layer is hacked, the other layers do not become aware of the hack and the entire communication gets compromised. Hence, there is need to employ security controls at each layer to ensure foolproof security.

DNS Protocol penyerang adalah untuk mengubah catatan DNS yang sah sehingga diselesaikan ke alamat IP yang salah

DNS cache poisoning menyampaikan informasi IP Address yang salah mengenai sebuah host

Goals of network Confidentiality. The function of confidentiality is to protect precious business data from unauthorized persons. Confidentiality part of network security makes sure that the data is available only to the intended and authorized persons.

Goals of network Integrity. This goal means maintaining and assuring the accuracy and consistency of data. The function of integrity is to make sure that the data is reliable and is not changed by unauthorized persons.

Goals of network Availability The function of availability in Network Security is to make sure that the data, network resources/services are continuously available to the legitimate users, whenever they require it.

Security mechanisms at Networking Layers

Security at Application Layer Multipurpose Internet Mail Extensions (S/MIME), which is commonly used to encrypt e-mail messages.

Security at Transport Layer Security measures at this layer can be used to protect the data in a single communication session between two hosts. The most common use for transport layer security protocols is protecting the HTTP and FTP session traffic. The Transport Layer Security (TLS) and Secure Socket Layer (SSL) are the most common protocols used for this purpose

Security at Transport Layer Bob visits Alice’s website for selling goods. In a form on the website, Bob enters the type of good and quantity desired, his address and payment card details. Bob clicks on Submit and waits for delivery of goods with debit of price amount from his account. All this sounds good, but in absence of network security, Bob could be in for a few surprises

Security at Transport Layer If transactions did not use confidentiality (encryption), an attacker could obtain his payment card information. The attacker can then make purchases at Bob's expense. If no data integrity measure is used, an attacker could modify Bob's order in terms of type or quantity of goods. Lastly, if no server authentication is used, a server could display Alice's famous logo but the site could be a malicious site maintained by an attacker, who is masquerading as Alice. After receiving Bob's order, he could take Bob's money and flee. Or he could carry out an identity theft by collecting Bob's name and credit card details.

Security at Network Layer Setiap skema menyediakan keamanan jaringan perlu diimplementasikan pada beberapa lapisan dalam tumpukan protokol seperti yang digambarkan dalam diagram di bawah ini

Security at Network Layer Internet Protocol Security (IPsec) menyediakan solusi yang jauh lebih baik daripada transportasi atau lapisan aplikasi kontrol karena kesulitan dalam menambahkan kontrol ke aplikasi individu.

Buat kelompok terdiri dari 4 orang (masing-masing memiliki alamat IP dalam 1 kelas) Buat rancangan Access Control List menggunakan Packet Tracer, simulasi usaha penyerangan kepada kelompok lain dan buat pertahanan dari kelompok lain.