4
Most read
13
Most read
18
Most read
DMZ
Level of defence in private
          network

                   Shaikh Fozia
                  Shahbaz khan
Learning Objectives

   Definition
   Perimeter Security Topologies
   Architecture
   Security Firewalls
   DMZ host
   Services
   Goals
   Tunneling in network security
   Conclusion
DMZ

   Portion of the network between the border
    router and the non-public computing
    services
Contd.

   In computer networks, a DMZ
    (demilitarized zone) is a computer host or
    small network inserted as a "neutral zone"
    between a company's private network and
    the outside public network.
Perimeter Security Topologies

   Any network that is connected (directly or
    indirectly) to your organization, but is not
    controlled by your organization, represents a
    risk..
   Include demilitarized zones (DMZs) extranets,
    and intranets




                                                continued…
Trusted Networks
Semi-Trusted Networks
Untrusted Networks
Unknown Networks
Architecture




Single firewall
Dual firewall
Network Address Translation (NAT)

    Internet standard that enables a LAN to use
     one set of IP addresses for internal traffic
     and a second set for external traffic
    Provides a type of firewall by hiding
     internal IP addresses
    Enables a company to use more internal IP
     addresses.
Creating and Developing Your
           Security Design
   Control secrets - What knowledge would enable someone
    to circumvent your system?
   Know your weaknesses and how it can be exploited
   Limit the scope of access - create appropriate barriers in
    your system so that if intruders access one part of the
    system, they do not automatically have access to the rest
    of the system.
   Understand your environment - Auditing tools can help
    you detect those unusual events.
   Limit your trust: people, software and hardware
DMZ Security Firewalls

   Firewall functions
   Interaction of firewalls
    with data
DMZ host
Services

   Typically contains devices accessible to
    Internet traffic
    
        Web (HTTP) servers
       FTP servers
       SMTP (e-mail) servers
       DNS servers
DMZ Design Goals

   Filtering DMZ traffic would identify
       traffic coming in from the DMZ interface of
        the firewall or
       router that appears to have a source IP address
        on a network other the DMZ network number
        (spoofed traffic).
   the firewall or router should be configured
    to initiate a log message or rule alert to
    notify administrator
Tunneling




   Enables a network to securely send its data through untrusted/shared
    network infrastructure
   Encrypts and encapsulates a network protocol within packets carried
    by second network
   Replacing WAN links because of security and low cost
   An option for most IP connectivity requirements
CONCLUSION

More Related Content

PPTX
Network Security ppt
PDF
Standar Keselamatan Berkendara
PPTX
Osi model vs TCP/IP
PPTX
Hash Function
PDF
Public key Infrastructure (PKI)
PPTX
Zero Trust
PDF
LAPORAN PROJEK AKHIR
PDF
Network Security ppt
Standar Keselamatan Berkendara
Osi model vs TCP/IP
Hash Function
Public key Infrastructure (PKI)
Zero Trust
LAPORAN PROJEK AKHIR

What's hot (20)

PPSX
Security policies
PPT
Basics of Information System Security
PPTX
Network security
PPTX
Firewall DMZ Zone
PDF
Network Security Presentation
PPTX
Intrusion detection and prevention system
PPTX
Denial of service
PPTX
Intrusion prevention system(ips)
PPT
Information Security Policies and Standards
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPTX
Types of attacks
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Cia security model
PPTX
Network security
PPTX
Types of cyber attacks
PPTX
Firewall in Network Security
PPTX
Network security (vulnerabilities, threats, and attacks)
PPT
IDS and IPS
PPT
Introduction to Cyber Security
PPT
Symmetric & Asymmetric Cryptography
Security policies
Basics of Information System Security
Network security
Firewall DMZ Zone
Network Security Presentation
Intrusion detection and prevention system
Denial of service
Intrusion prevention system(ips)
Information Security Policies and Standards
Intrusion Detection Systems and Intrusion Prevention Systems
Types of attacks
Application Security | Application Security Tutorial | Cyber Security Certifi...
Cia security model
Network security
Types of cyber attacks
Firewall in Network Security
Network security (vulnerabilities, threats, and attacks)
IDS and IPS
Introduction to Cyber Security
Symmetric & Asymmetric Cryptography
Ad

Viewers also liked (20)

PPT
ODP
What is a VLAN and DMZ
PPTX
Firewall presentation
PPT
Network Security
PPT
Digital certificates
PPT
PPT
Vpn presentation
PPTX
Masters thesis presentation
PPT
Lecture 6
PDF
Dmz - Hedi Magroun - Nafta - 2009
PDF
How to Build a B2B Website
PPT
Zone Based Policy Firewall
PDF
Dmz aa aioug
PDF
Ethical Hacking & Penetration Testing
PPTX
network security, group policy and firewalls
PPT
Digital Certificate
PDF
Vulnerability Assessment and Penetration Testing Report
PPTX
Introduction to SSH & PGP
PPT
Pretty good privacy
What is a VLAN and DMZ
Firewall presentation
Network Security
Digital certificates
Vpn presentation
Masters thesis presentation
Lecture 6
Dmz - Hedi Magroun - Nafta - 2009
How to Build a B2B Website
Zone Based Policy Firewall
Dmz aa aioug
Ethical Hacking & Penetration Testing
network security, group policy and firewalls
Digital Certificate
Vulnerability Assessment and Penetration Testing Report
Introduction to SSH & PGP
Pretty good privacy
Ad

Similar to Dmz (20)

PDF
Ch18 Internet Security
PDF
ClubHack Magazine issue 26 March 2012
PPTX
Chapter_1_Introduction to Network Security-1.pptx
PPTX
Cyber security tutorial2
PPT
Firewall protection
PPTX
Network security
PPT
Firewall Architecture
PDF
IBM zEnterprise System - Network Security
PDF
IBM zEnterprise System - Network Security
PPTX
UNIT-4 network information security ID system
PDF
Tivoli firewall magic redp0227
PPTX
Ecommerce final ppt
PPTX
Firewall & DMZ.pptx
PPT
Firewall
PPTX
محمد
PPTX
Demilitarized Zone (DMZ) in computer networking
PPT
Day4
DOCX
Firewall configuration
PPSX
Firewall & its Services
PPTX
Section c group2_firewall_ final
Ch18 Internet Security
ClubHack Magazine issue 26 March 2012
Chapter_1_Introduction to Network Security-1.pptx
Cyber security tutorial2
Firewall protection
Network security
Firewall Architecture
IBM zEnterprise System - Network Security
IBM zEnterprise System - Network Security
UNIT-4 network information security ID system
Tivoli firewall magic redp0227
Ecommerce final ppt
Firewall & DMZ.pptx
Firewall
محمد
Demilitarized Zone (DMZ) in computer networking
Day4
Firewall configuration
Firewall & its Services
Section c group2_firewall_ final

More from أحلام انصارى (20)

PPTX
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
PPTX
Intention recognition for dynamic role exchange in haptic
PPT
Noise Adaptive Training for Robust Automatic Speech Recognition
PPTX
Human behaviour analysis based on New motion descriptor
PPTX
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
PDF
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
PPTX
Security issues in cloud database
PPTX
Html5 offers 5 times better ways to hijack the website
PPTX
Honey pot in cloud computing
PPT
grid authentication
PPTX
Security As A Service In Cloud(SECaaS)
PPT
Dos presentation by ahlam shakeel
PPTX
Password craking techniques
PPT
Operating system vulnerability and control
PPT
Network ssecurity toolkit
PPTX
Image forgery and security
PPTX
Image based authentication
PPT
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
Intention recognition for dynamic role exchange in haptic
Noise Adaptive Training for Robust Automatic Speech Recognition
Human behaviour analysis based on New motion descriptor
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Security issues in cloud database
Html5 offers 5 times better ways to hijack the website
Honey pot in cloud computing
grid authentication
Security As A Service In Cloud(SECaaS)
Dos presentation by ahlam shakeel
Password craking techniques
Operating system vulnerability and control
Network ssecurity toolkit
Image forgery and security
Image based authentication

Dmz

  • 1. DMZ Level of defence in private network Shaikh Fozia Shahbaz khan
  • 2. Learning Objectives  Definition  Perimeter Security Topologies  Architecture  Security Firewalls  DMZ host  Services  Goals  Tunneling in network security  Conclusion
  • 3. DMZ  Portion of the network between the border router and the non-public computing services
  • 4. Contd.  In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network.
  • 5. Perimeter Security Topologies  Any network that is connected (directly or indirectly) to your organization, but is not controlled by your organization, represents a risk..  Include demilitarized zones (DMZs) extranets, and intranets continued…
  • 12. Network Address Translation (NAT)  Internet standard that enables a LAN to use one set of IP addresses for internal traffic and a second set for external traffic  Provides a type of firewall by hiding internal IP addresses  Enables a company to use more internal IP addresses.
  • 13. Creating and Developing Your Security Design  Control secrets - What knowledge would enable someone to circumvent your system?  Know your weaknesses and how it can be exploited  Limit the scope of access - create appropriate barriers in your system so that if intruders access one part of the system, they do not automatically have access to the rest of the system.  Understand your environment - Auditing tools can help you detect those unusual events.  Limit your trust: people, software and hardware
  • 14. DMZ Security Firewalls  Firewall functions  Interaction of firewalls with data
  • 16. Services  Typically contains devices accessible to Internet traffic  Web (HTTP) servers  FTP servers  SMTP (e-mail) servers  DNS servers
  • 17. DMZ Design Goals  Filtering DMZ traffic would identify  traffic coming in from the DMZ interface of the firewall or  router that appears to have a source IP address on a network other the DMZ network number (spoofed traffic).  the firewall or router should be configured to initiate a log message or rule alert to notify administrator
  • 18. Tunneling  Enables a network to securely send its data through untrusted/shared network infrastructure  Encrypts and encapsulates a network protocol within packets carried by second network  Replacing WAN links because of security and low cost  An option for most IP connectivity requirements