Network Security The Parts of the Sum Stephen T. Walker Overview by Justin Childs.

Slides:



Advertisements
Similar presentations
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

Ch. 2 Protocol Architecture. 2.1 The Need for a Protocol Architecture Same set of layered functions need to exist in the two communicating systems. Key.
Internet Security CSCE 813 IPsec
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
Security at the Network Layer: IPSec
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
INTEGRATING NETWORK CRYPTOGRAPHY INTO THE OPERATING SYSTEM BY ANTHONY GABRIELSON HAIM LEVKOWITZ Mohammed Alali | CS – Dr. RothsteinSummer 2013.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
8/2/ IETF, Pittsburgh Kutscher/Ott/Bormann SDPng Requirements draft-kutscher-mmusic-sdpng-req-00.txt Dirk Jörg
System Architecture  you should list the layered Architecture  Understand the ISO/OSI model used in data communications  Understand the differences.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Analysis of Terminal Server Architectures for Thin Clients in a High Assurance Network Steven R. Balmer & Cynthia E. Irvine Department of Computer Science.
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Module 5: Designing Security for Internal Networks.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Jericho Commandments, Future Trends, & Positioning.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
On Hierarchical Design of Computer Systems for Critical Applications Peter Gabriel Neumann Presented by Bo Cui.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Web Services. Web Service: Simple definition : “ Service Offered On the Web “ Technically : “ A Web Service is a programmable application component that.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Cryptography CSS 329 Lecture 13:SSL.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Virtual Private Networks
Virtual Private Network
Encryption and Network Security
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptographic Protocols
VPN: Virtual Private Network
Cryptography and Network Security
How to Mitigate the Consequences What are the Countermeasures?
Outline Using cryptography in networks IPSec SSL and TLS.
16EC Computer networks unit II Mr.M.Jagadesh
Cryptography and Network Security
Presentation transcript:

Network Security The Parts of the Sum Stephen T. Walker Overview by Justin Childs

Intro Problem - The whole is greater than the sum Three Parts –Encryption –Protocols –Trusted Computer System Principles True Security requires all the parts

What is a Network Don’t Care –Components are important –Their characteristics –System boundaries –“Definition” may be obsolete, inaccurate, limited

Network Security Elements Encryption –Open channels –System Security - limited usefulness –Secrecy of implementation Network Protocols –Standards, secret protocols impair adoption –Security parameters, levels Trusted System Principles –measures that satisfy a security policy

Relationship Between Elements Link Level Encryption Problem - Encrypts everything –At what level do you know what must be encrypted? Trusted Systems isolate secure portions of system –Network level fig. 5 –Transport level fig. 6 Combine encryption with trusted host computer? –Exposure –Allows application level encryption –Isolate but allow control by host TCB

Security Services and Mechanisms Fig. 7 Need to assure performance as well, not just mechanisms used Two misconceptions –TSCEC lacks list of services & mechanisms –adding S & M without level of assurance for each

Example of Problems in Network Security PC Encryption Services - fig. 8 –Encrypt data as it leaves PC –untrusted computer –Trusted systems - fig 10, 11 Ideal System –utilize trusted system - fig 12 –Peripheral encryption –Header & encrypted data combined in PC

Secure Data Network System Issues Protocol extensions –at internet & transport layers –integrate encryption & key mng. Fig 12 –Problem - Transport mechanism above Encryption level –Why not SP4 above transport layer? Requires trusted computer system that’s not available - Fig. 14 –Level of trust not specified.