You are on page 1of 44

DIGITAL SIGNATURES /

SECURITY TECHNOLOGIES :
FIREWALLS AND VPNS
ICE BREAKER
GUESS THE WORD
ICE BREAKER
GUESS THE WORD

+
ICE BREAKER
GUESS THE WORD

+
F I R E W A L L
ICE BREAKER
GUESS THE WORD

+
ICE BREAKER
GUESS THE WORD

+
A C C E S S C O NT R O L
ICE BREAKER
GUESS THE WORD

+
ICE BREAKER
GUESS THE WORD

+
D I G I T A L S I GNA T UR E
DIGITAL SIGNATURES
WHAT IS A DIGITAL SIGNATURE?

A digital signature is an electronic, encrypted stamp of


authentication on digital information such as messages that used
to validate the authenticity and integrity of a digital document,
message or software.

A digital signature is equivalent to a handwritten signature in


paper. It is an electronic verification of the sender
DIGITAL SIGNATURE IS USED TO
ASSURE:
1. AUTHENTICITY
The identity of the organization that sent the message (the
message signer) is confirmed.

2. INTEGRITY
The message content was not changed or tampered with
since it was digitally signed.
DIGITAL SIGNATURE IS USED TO
ASSURE:

3. NONREPUDIATION
The origin of the signed content is verified to all parties so
the message signer cannot deny association with the signed
content.
THE DIGITAL SIGNATURE PROCESS
BENEFITS OF DIGITAL SIGNATURE
• SECURITY
Security capabilities are embedded in digital signatures to
ensure a legal document isn’t altered and signatures are
legitimate.

• TIMESTAMPING
This provides the date and time of a digital signature and is
useful when timing is critical, such as for stock trades,
lottery ticket issuance and legal proceedings.
BENEFITS OF DIGITAL SIGNATURE
• GLOBALLY ACCEPTED AND LEGALLY COMPLIANT 
The public key infrastructure (PKI) standard ensures vendor-
generated keys are made and stored securely. With digital
signatures becoming an international standard, more
countries are accepting them as legally binding.

• TIME SAVINGS
Digital signatures simplify the time-consuming processes of
physical document signing, storage and exchange, enabling
businesses to quickly access and sign documents.
BENEFITS OF DIGITAL SIGNATURE
• COST SAVINGS
Organizations can go paperless and save money previously
spent on the physical resources, time, personnel and office
space used to manage and transport documents.

• POSITIVE ENVIRONMENTAL EFFECTS


Reducing paper use also cuts down on the physical waste
generated by paper and the negative environmental impact of
transporting paper documents.
BENEFITS OF DIGITAL SIGNATURE
• TRACEABILITY
Digital signatures create an audit trail that makes internal
record-keeping easier for businesses. With everything
recorded and stored digitally, there are fewer opportunities
for a manual signee or record-keeper to make a mistake or
misplace something.
DIGITAL SIGNATURE ATTACKS
• CHOSEN-MESSAGE ATTACK.
The attacker either obtains the victim's public key or tricks
the victim into digitally signing a document they don’t
intend to sign.

• KNOWN-MESSAGE ATTACK
The attacker obtains messages the victim sent and a key that
enables the attacker to forge the victim's signature on
documents.
DIGITAL SIGNATURE ATTACKS
• KEY-ONLY ATTACK
The attacker only has access to the victim's public key and
can re-create the victim's signature to digitally sign
documents or messages that the victim doesn't intend to sign.
SECURITY TECHNOLOGIES :
FIREWALLS AND VPNS
WHAT IS A SECURITY TECHNOLOGY?

Security technology are concepts, policies, and components


designed to minimize risk, identify vulnerabilities, and inform how
and when to respond to potential incidents.

TYPES OF SECURITY TECHNOLOGY


• PHYSICAL SECURITY
• CYBER SECURITY
TYPES OF SECURITY TECHNOLOGY

• PHYSICAL SECURITY

Physical security are methods that protect against physical


intrusions or actions within a space, including tools and
technology used to monitor physical spaces and people’s actions
within that environment. The three main components are access
control, surveillance, and testing.
TYPES OF SECURITY TECHNOLOGY

• CYBER SECURITY

A broad way of speaking about protecting digital assets,


cybersecurity refers to strategies that secure information, data,
and networks. Cybersecurity, as well as its subsets of infosec
and information technology security, are becoming more
prominent among security industry trends.
ACCESS CONTROL

Access control is a data security process that enables


organizations to manage who is authorized to access corporate
data and resources.
3 Access Control Methods

1. MANDATORY ACCESS CONTROL (MAC)


the most restrictive model; the owner defines a security
policy, the custodian implements it, and the end users
cannot change it; this may be implemented by setting a security
level for each asset and granting authorization to users by
assigning them to a level
3 Access Control Methods
2. NONDISCRETIONARY CONTROLS
a. ROLE BASED ACCESS CONTROL (RBAC) - access is
granted to roles (groups) defined on the systems, end
users are assigned to roles so they can access assets
needed for their jobs; the text uses Windows Server
2008 as an example of a system that can use this model
b. TASK BASED ACCESS CONTROL (TBAC) - may be the
most complex model; rules can change which role a
user is assigned to, based on the task the user is
performing, changing the level of access the user has
3 Access Control Methods

3. DISCRETIONARY ACCESS CONTROL (DAC)


least restrictive model; subjects (end users) can own
objects, and have total control over them (like a SharePoint
web server system); end users must set and maintain
security for their assets, which most people will do
badly; processes run by end users inherit their permission
levels
FIREWALL
 a firewall is a tool that monitors, filters and controls the traffic
entering or leaving your network. (These are known as ingress
and egress traffic filtering, respectively.) Its job is to allow good
(trusted) traffic to flow and to keep bad (untrusted) traffic from
accessing or leaving your internal network.
SOME ORGANIZATIONS TRADITIONALLY
CATEGORIZE FIREWALLS IN TERMS OF THEIR :
• PROCESSING MODES — This category refers to the operations
or functionalities of the firewalls.

• DEVELOPMENT ERAS OR GENERATION TYPES — This category


refers to the period of when the firewall was engineered.

• IMPLEMENTATION STRUCTURES — This category refers to the


types of environments that firewalls are implemented in
(residential networks, small/home business, commercial or
enterprise, etc.).
5 Types of Firewalls Categorized by
Processing Mode

1. PACKET FILTERING FIREWALL


a network security technique that regulates data flow to
and from a network. It is a security mechanism that allows
packets to move across networks while controlling their flow
through the use of a set of rules, protocols, IP addresses,
and ports.
5 Types of Firewalls Categorized by
Processing Mode
2. PROXY OR APPLICATION GATEWAY FIREWALLS
a proxy firewall serves as an intermediary that allows two
systems to communicate indirectly via a client. This is
typically done through the use of a proxy device or in the
cloud. Basically, the firewall receives requests from the
client and determines whether to allow or block the
traffic. By preventing direct connections to transfer data,
it offers greater protection to the internal network.
5 Types of Firewalls Categorized by
Processing Mode
3. CIRCUIT-LEVEL GATEWAY FIREWALLS
A circuit-level firewall is responsible for verifying the TCP
handshakes of incoming traffic. It works at the OSI session
layer, which falls between the transport and presentation
layers (both of which are beneath the application layer).
5 Types of Firewalls Categorized by
Processing Mode
4. MAC LAYER FIREWALLS
This type of firewall filters packets based on their ACL
entries, which are tied to the MAC addresses of the
accessing device. This allows the firewall to determine
whether to block or allow the packets to access the
network.
5 Types of Firewalls Categorized by
Processing Mode
5. HYBRID FIREWALLS
hybrid firewall is more comprehensive than other types of
firewalls. This type of firewall performs a combination of
processes and capabilities of its previously mentioned
counterparts, including packet filtering, application layer
proxy services, or even circuit gateways.  
FIREWALLS GENERATION
• FIRST GENERATION - static packet filtering

• SECOND GENERATION - application level

• THIRD GENERATION - stateful inspection

• FOURTH GENERATION - dynamic packet filtering

• FIFTH GENERATION - examines packets at several layers


FIREWALLS BY STRUCTURE

• COMMERCIAL APPLIANCES - runs on a custom operating


system, on a dedicated device

• COMMERCIAL SYSTEMS - a software solution that runs on a


computer that may or may not be dedicated
FIREWALLS BY STRUCTURE

• SMALL OFFICE - Home Office appliances - device may actually


be a cable modem, or DSL modem, may also include router
and WAP services, may include intrusion protection

• RESIDENTIAL (CONSUMER) SOFTWARE - typically a


combination of anti-virus, firewall, intrusion detection
software; should be run on all devices that connect to a home
network
VIRTUAL PRIVATE NETWORK (VPN)
It describes the opportunity to establish a protected network
connection when using public networks. VPNs encrypt your
internet traffic and disguise your online identity. This makes it
more difficult for third parties to track your activities online and
steal data.

HOW DOES A VPN WORK?


A VPN hides your IP address by letting the network redirect it
through a specially configured remote server run by a VPN
host.
BENEFITS OF A VPN CONNECTION

1. SECURE ENCRYPTION
To read the data, you need an encryption key. Without one,
it would take millions of years for a computer to decipher
the code in the event of a brute force attack.
BENEFITS OF A VPN CONNECTION

2. DISGUISING YOUR WHEREABOUTS


VPN servers essentially act as your proxies on the internet.
Because the demographic location data comes from a server
in another country, your actual location cannot be
determined
BENEFITS OF A VPN CONNECTION

3. ACCESS TO REGIONAL CONTENT


Regional web content is not always accessible from
everywhere. Services and websites often contain content
that can only be accessed from certain parts of the world.
BENEFITS OF A VPN CONNECTION
4. SECURE DATA TRANSFER
If you work remotely, you may need to access important files
on your company’s network. For security reasons, this kind
of information requires a secure connection. To gain access
to the network, a VPN connection is often required. VPN
services connect to private servers and use encryption
methods to reduce the risk of data leakage
THANK YOU
FOR LISTENING!
GROUP 2
WEDNESDAY THURSDAY
BONALOS SANTOS
BENAMER SONEJA
BALADJAY SOLTES
BAGUIO TOLENTINO
ALEJANDRO TANDOC

You might also like