Chapter 44 - Personal Web Pages

Download Report

Transcript Chapter 44 - Personal Web Pages

ITIS 1210
Introduction to Web-Based
Information Systems
Chapter 44
How Firewalls Work
Introduction
 The Internet is a dangerous place
 Hackers can
 Damage your programs/data
 Steal
 Your identity
 Your credit information
 Use your computer for other purposes
 Distributed attacks on other computers
 Spam
 Illegal activities
Introduction
 Choices are to
 Stay off the Internet
 Protect yourself
 Firewalls are one kind of protection
 Software/hardware
 Monitors the computer-Internet interface
How Corporate Firewalls Work
 The firewall acts as a shield
 Separates the internal environment from the
Wild-Wild-Web
 Inside, normal Internet technologies are
available
 Email
 Databases
 Software
How Corporate Firewalls Work
 Access to the outside is controlled by a
choke router or a screening router
 Examines packets traveling in both
directions and can learn
 Source & destination
 Protocols being used
 Ports being accessed
How Corporate Firewalls Work
 Some packets permitted to continue,
others blocked
 Some services such as logins might be
blocked
 Suspicious locations could be blocked
 System administrators set these rules
How Corporate Firewalls Work
 A bastion host is a heavily protected
server
 Lots of security built in
 Primary point of contact for connections
coming in from the Internet
 Internal computers or hosts inside the firewall
cannot be contacted directly
 Might also be a proxy server
 For WWW requests from inside the firewall
How Corporate Firewalls Work
 Bastion host is part of a perimeter network
in the firewall
 Not on the corporate network itself
 Adds another layer of security
 One more element the bad guys have to
break down to get into the corporate network
How Corporate Firewalls Work
 An exterior screening router or access
router screens packets between the
Internet and the perimeter network
 Again,
 Adds another layer of protection
 Can implement the same rules as the choke
router
 If the choke router fails the screening router
may still be able to block unauthorized access
How Personal Firewalls Work
 What personal resources are attractive to
hackers?
 High-speed connections
 “Always on” network connections like
Roadrunner
 Poorly protected computers that are
vulnerable to exploits
How Personal Firewalls Work
 Remember ports?
 Virtual connections between your computer
and the Internet
 Each port has a specific purpose
 Personal firewalls work by examining
packets for information including
 Source and destination IP address
 Port numbers
How Personal Firewalls Work
 Firewalls can be configured to block
packets address to specific ports
 Block port 21 and FTP can’t be used to attack
your PC
 Trojan horse software can permit a hacker
access to your PC
 Firewalls can detect when software attempts
to send packets
 If you don’t approve, the packets are blocked
How Personal Firewalls Work
 Firewalls can block specific IP addresses
as well
 Your personal history might be a source of UP
addresses to be blocked
 NAT (Network Address Translation) is a
technique whereby your true IP address is
shielded from the Internet
 It can’t be seen by anyone outside your home
network so you become invisible
How Personal Firewalls Work
 Firewalls can log probes or just plain traffic
 These logs can be examined for clues
about hacker’s efforts
How Proxy Servers Work
 A proxy server is one that acts as an
intermediary between its clients and
external services
 System administrators can establish many
types of services
 They decide which will go through proxy
servers
 Many types of proxy servers are available
How Proxy Servers Work
 A Web proxy handles Web traffic
 Commonly serves as a Web cache
 Could also provide content filtering by denying
access to specific URLs
 Some reformat Web pages for a certain
audience (e.g., for cell phones)
 To the internal user the use of the proxy is
transparent
 But it controls the interaction
How Proxy Servers Work
 A proxy server can be used to log Internet
traffic for analysis purposes
 Could record keystrokes
 Also how the external server reacted to those
keystrokes
 Could log
 IP addresses
 Date and time of access
 URLS
 Number of bytes downloaded
How Proxy Servers Work
 Could be used to implement security
schemes
 Permits files to be transferred internally
 But blocks access to external sites
 Common use is caching
 Speeds up performance by keeping copies of
frequently-requested Web pages
 Requests fulfilled by proxy eliminating need to
contact an external server
How Proxy Servers Work
 Other types of proxy servers
 An anonymizing proxy server
 Protects your identity by making you seem
anonymous to servers
 Vulnerable to man-in-the-middle attack
 Since they can read and modify messages
 Could intercept your credit card or logon
information
How Proxy Servers Work
 Circumventor – Method of defeating
blocking policies implemented using proxy
servers
 Web-based page that allows access to
blocked sites by routing it through an
unblocked site
 Famous example was elgooG, a mirror of
Google
 Search engine that only recognized search
terms entered backwards