Page 438 - Using MIS
P. 438

406       Chapter 10  Information Systems Security

                                                        1.  Your computer obtains public key of Web site.
                                                                  Web Site Public Key

                                                      2. Your computer generates key for
                                                           symmetric encryption.
                                          You         3. Your computer encrypts symmetric             Web Site
                                                        key using Web site’s public key.
                                                     Symmetric Key Encrypted Using Web Site’s Public  Key

                                                                 4. Web site decodes your message using its
                                                                      private key.  Obtains key for symmetric encryption.

        Figure 10-10                                    Communications Using Symmetric Encryption
        The Essence of https (SSL or
        TLS)                                  5.  All communications between you and Web site use symmetric encryption.



                                    Firewalls

                                    A  firewall is a computing device that prevents unauthorized network access. A firewall can
                                    be a special-purpose computer, or it can be a program on a general-purpose computer or on
                                    a router. In essence, a firewall is simply a filter. It can filter traffic in a variety of ways including
                                    where network traffic is coming from, what types of packets are being sent, the contents of the
                                    packets, and if the packets are part of an authorized connection.
                                       Organizations normally use multiple firewalls. A perimeter firewall sits outside the orga-
                                    nizational network; it is the first device that Internet traffic encounters. In addition to perim-
                                    eter firewalls, some organizations employ internal firewalls inside the organizational network.
                                    Figure 10-11 shows the use of a perimeter firewall that protects all of an organization’s comput-
                                    ers and a second internal firewall that protects a LAN.
                                       A  packet-filtering firewall examines each part of a message and determines whether
                                    to let that part pass. To make this decision, it examines the source address, the destination
                                    address(es), and other data.
                                       Packet-filtering firewalls can prohibit outsiders from starting a session with any user behind
                                    the firewall. They can also disallow traffic from particular sites, such as known hacker addresses.
                                    They can prohibit traffic from legitimate, but unwanted, addresses, such as competitors’ com-
                                    puters, and filter outbound traffic as well. They can keep employees from accessing specific
                                    sites, such as competitors’ sites, sites with pornographic material, or popular news sites. As a
                                    future manager, if you have particular sites with which you do not want your employees to com-
                                    municate, you can ask your IS department to enforce that limit via the firewall.



                                                Personal
                                               Computer 1
                                                                   Internal                   Perimeter
                                                                   Firewall                    Firewall
                                                Personal
                                               Computer 2

                                                Personal
                                               Computer 3
                                                                     Mail     Web
                                                Personal            Server    Server           Internet
                                               Computer 4            Server Network
        Figure 10-11
        Use of Multiple Firewalls             Local Area Network
   433   434   435   436   437   438   439   440   441   442   443