COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.

Slides:



Advertisements
Similar presentations
IPSec.
Advertisements

BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Network Layer and Transport Layer.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
International Standards Organization Open Systems Interconnect (OSI) Reference Model Advanced Computer Networks.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Protocols and the TCP/IP Suite
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Networks: OSI Reference Model 1 International Standards Organization Open Systems Interconnect (OSI) Reference Model.
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Circuit & Application Level Gateways CS-431 Dick Steflik.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Fundamentals of Computer Networks ECE 478/578 Lecture #2 Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona.
Internet TCP/IP Cameron Schmidt Jordan Gallo. Outline History TCP/IP Layers Applications Transport Internetwork – IPV6 Network Interface and Hardware.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
CSI315 Web Development Technologies Continued. Communication Layer information needs to get from one place to another –Computer- Computer –Software- Software.
Network protocols
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Section 2.31 The TCP/IP reference model the de facto Internet standard demonstrates arbitrary nature of layers –various models are possible –OSI & TCP/IP.
Unit27-networking BTEC NAT – UNIT 27 NETWORKING OSI MODEL Unit Leader:Dave Bell
Human-Computer Interface Course 4. Content History of Internet What is Internet ? Internet Protocols The OSI 7 layers model TCP/IP The World Wide Web.
Introduction to Packet Accelerator (PA). 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link Layer.
1 Review - OSI Model n OSI Reference Model u represents the communications process. u 7 layers: physical, data link, network, transport, session, presentation.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Internetworking – What is internetworking? Connect multiple networks of one or more organizations into a large, uniform communication system. The resulting.
Spring 2006Computer Networks1 Chapter 2 Network Models.
TCP/IP Protocols Contains Five Layers
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
OSI Model Data Communications. 7 layer “research” model ApplicationPresentationSessionTransportNetworkLinkPhysical.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Spring 2006Computer Networks1 Chapter 2 Network Models.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
Data Communications and Networks
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Net 221D:Computer Networks Fundamentals
The OSI Model A Framework for Communications David A. Abarca July 19, 2005.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
Another Model?! The TCP/IP Reference Model By: Allan Johnson.
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 4 : Network Architectures (cont..) 1. 2 Summary of OSI Layers.
Networking Using the OSI Model.
Level 2 Diploma Unit 10 Setting up an IT Network
OSI model vs. TCP/IP MODEL
Internet and Intranet Fundamentals
Understand the OSI Model Part 2
COEN 350 Network Security Introduction.
Working at a Small-to-Medium Business or ISP – Chapter 7
Net 431: ADVANCED COMPUTER NETWORKS
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Find the Critical Path and the Time Required
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Unit 8 Network Security.
OSI Reference Model Unit II
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Presentation transcript:

COEN 350 Network Security Introduction

Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer

OSI Reference Model Useful to establish terminology Not implemented Upper layer implemented in terms of lower layer.

OSI Reference Model Application Layer Locus of applications that use networking P2P HTTP ftp Presentation Layer Encodes application data into a canonical form Decodes it into system-dependent format at the receiving end.

OSI Reference Model Session Layer Extra functions over reliable one-to-one connection RPC Transport Layer Reliable communication stream between a pair of systems. IP, UDP, TCP, ICMP

OSI Reference Model Network Layer Computes paths across an interconnected mesh of links and packet switches Forwards packets over multiple links from source to destination

OSI Reference Model Data Link Layer Organizes physical layer’s bits into packets and controls who on a shared link gets each packet. Physical Layer Delivers an unstructured stream of bits across a single link of some sort.

TCP/IP Suite

Protocol Layers and Security Security measures often layer network protocols. Protect contents of packages is protection at layer 2. Still allows traffic analysis. IPSec protects (encrypts) packages at layer 4 Does not work with NAT.

Goals Authentication Who are you? Authorization Are you allowed to do that? Integrity Is this the real message? Privacy Does anyone else know about it?

Zone of Control The zone that needs to be secured in order to prevent eavesdropping. Physical access needs to be prevented. Tempest program (US military)

Legal Issues Patent Law First inventor has the right to invention. Patents issued based on what inventors present regarding Novelty (  Prior Art) Importance (“Aha” effect) Patent process flawed since Reagan underfunding, but slowly getting better Many cryptography algorithms are moving into the public domain.

Legal Issues Export Control Cryptographic algorithms and tools were considered to be restricted technology. Treated like ammunition. Taking a laptop to Mexico for a week-end could be a violation of export control. Government gave up after PGP fiasco

Legal Issues Key Escrow Cryptography algorithms became unbreakable in the nineties. Prevent wiretaps, computer forensics, etc. National security efforts sponsored Clipper: Encryption chip Two different agencies needed to cooperate to recover secret key. Government gave up.