Computer and Network Security

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

Cryptography and Network Security Sixth Edition by William Stallings.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Lecture 1: Overview modified from slides of Lawrie Brown.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Introducing Computer and Network Security
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
C OMPUTER S ECURITY C ONCEPTS By: Qubilah D’souza TE computer.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Network Security Essentials Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Introduction to Computer and Network Security
Network Security Essentials Chapter 1
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
Network Security Introduction
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Copyright © 2013 – Curt Hill Computer Security An Overview.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
COMPUTER SECURITY COMP424 1 ST LECTURE OVERVIEW AND TERMINOLOGIES Dr. Sarah Mustafa Eljack
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Information Management System Ali Saeed Khan 29 th April, 2016.
Network Security Overview
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
CS457 Introduction to Information Security Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Information System and Network Security
COMPUTER SECURITY CONCEPTS
Information Security.
Data & Network Security
Introduction to Information Security
CNET334 - Network Security
BINF 711 Amr El Mougy Sherif Ismail.
Information and Network Security
NET 311 Information Security
Computer and Network Security
Introduction to Computer and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security
Introduction to Cryptography
Security Attacks, Mechanisms, and Services
Cryptography and Network Security
Challenges Of Network Security
Security Attacks Network Security.
Definition Of Computer Security
Presentation transcript:

Computer and Network Security CSEN 1001 Computer and Network Security Amr El Mougy Alaa Gohar Heba Anwar

Course Details

Course Details Text books and lecture slides: Authors: William Stallings and Lawrie Brown Title: Computer Security, Principles and Practice, 2nd Edition Publisher: Pearson Education, Inc., 2012 Author: William Stallings Title: Cryptography and Network Security, 6th Edition Publisher: Pearson Education, Inc., 2014 Note: These slides are not meant to be comprehensive lecture notes! They are only remarks and pointers. The material presented here is not sufficient for studying for the course. Your main sources for studying are the text and your own lecture notes

Course Details Security concepts Classic cryptography Symmetric encryption Public-key cryptography Applications of public-key cryptography Security protocols Security attacks (malware and DOS) Key management Internet security

Introduction and Key Security Concepts Lecture (1) Introduction and Key Security Concepts

Definition (Computer Security) Definitions The US-based National Institute for Standards and Technology (NIST) defines computer security as follows: [Computer security is] the protection afforded to an automated information system in order to attain the applicable objectives of preserving integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications) Definition (Computer Security)

Key Security Concepts CIA Triad

Confidentiality Confidentiality covers two concepts: Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed

Integrity Integrity as a security goal also covers two related concepts: Data integrity: Assures that information and programs are changed only in a specified and authorized manner System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system

Availability Availability ensures that a system works promptly and service is not denied to authorized users. A loss of availability is the disruption of access to or use of information or an information system

Further Considerations Some additional aspects are often mentioned: Authenticity: The property of being genuine and able to be verified Confidence in the validity of a transmission, verifiability of a message originator, inputs arriving from trusted sources Verifiability of a user’s identity Accountability: Actions can be uniquely traced to their originator Essential for nonrepudiation, deterrence, fault isolation, intrusion detection, after action recovery, legal action Truly secure systems are not achievable, so security breaches must be traceable

DAD Triad The complement of CIA Disclosure Unauthorized individuals gain access to confidential information Data is modified or destroyed through some unauthorized mechanism Alternation DAD activities may be malicious or accidental Denial Authorized users can not gain access to a system for legitimate purposes

Layered Security Aspects Security considerations include: Physical security Operating system security Windows, Mac OS, Unix/Linux (Sun OS, Solaris, Open BSD, . . . ) Application layer security Browser, e-mail client, . . . Communication security Encryption Firewalls Intrusion detection systems

Computer Security Challenges not simple must consider potential attacks procedures used counter-intuitive involve algorithms and secret info must decide where to deploy mechanisms battle of wits between attacker / admin not perceived on benefit until fails requires regular monitoring too often an after-thought regarded as impediment to using system

Vulnerabilities and Attacks System resource vulnerabilities may be corrupted (loss of integrity) become leaky (loss of confidentiality) become unavailable (loss of availability) Attacks are threats carried out and may be passive active insider outsider

Typical Threats Hacker Anyone who attempts to penetrate the security of an information system, regardless of intent Early definition included anyone very proficient in computer use Malicious insider Someone from within the organization that attempts to go beyond the rights and permissions that they legitimately hold Security professionals and system administrators are particularly dangerous

Typical Threats Malicious code object Virus: A program that attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels Worm: A program that takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system (e.g., sending itself to all of the e-mail list in your computer) Trojan horse: A program that at first glance will appear to be useful software but will actually do damage once installed or run on your computer. It usually appears that is coming from a trusted source

Attacks on Communication Networks We distinguish: Passive attacks Attempts to learn or make use of information from the system but does not affect system resources Eavesdropping or monitoring of transmissions Active attacks Attempts to alter system resources or affect their operation.

Passive Attacks Release of message contents / snooping Traffic analysis / spoofing Passive attacks are hard to detect!

Active Attacks Masquerade: One entity pretends to be a different entity Replay attack: Passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect

Active Attacks Modification attack: Some portion of a legitimate message is altered or messages are reordered to produce an unauthorized effect Denial of service: Prevents or inhibits the normal use or management of communications facilities

Security Services

Security Mechanisms