Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.

Slides:



Advertisements
Similar presentations
Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Lecture 1: Overview modified from slides of Lawrie Brown.
CSA 223 network and web security Chapter one
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Introduction (Pendahuluan)  Information Security.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
APA of Isfahan University of Technology In the name of God.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Dimensions of E – Commerce Security
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
ACM 511 Introduction to Computer Networks. Computer Networks.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Understanding Protocol Security LESSON Security Fundamentals.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
CPT 123 Internet Skills Class Notes Internet Security Session B.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Electronic Commerce Semester 1 Term 1 Lecture 14.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Chapter 40 Internet Security.
Cryptography and Network Security
Network security Vlasov Illia
CS457 Introduction to Information Security Systems
Computer and Network Security
Chapter 5 Electronic Commerce | Security Threats - Solution
Network Security (the Internet Security)
Network Security Basics: Malware and Attacks
Information System and Network Security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Data & Network Security
Chapter 5 Electronic Commerce | Security Threats - Solution
Introduction to Information Security
Chapter 5 Electronic Commerce | Security
Operating system Security
Information and Network Security
Year 10 ICT ECDL/ICDL IT Security.
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 5 Electronic Commerce | Security
INFORMATION SYSTEMS SECURITY and CONTROL
Faculty of Science IT Department By Raz Dara MA.
Security.
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Computer Security By: Muhammed Anwar.
Operating System Concepts
Security in SDR & cognitive radio
Designing IIS Security (IIS – Internet Information Service)
Introduction to Cryptography
Test 3 review FTP & Cybersecurity
Presentation transcript:

Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester

INTRODUCTION - John W. Thompson CEO Symantec “Network security consists of the provisions and policies adopted by network administrators and end users to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network accessible resources” - John W. Thompson CEO Symantec

OBJECTIVES Confidentiality - Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems For example, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system attempts to enforce confidentiality by encrypting the card number during transmission. If an unauthorized party obtains the card number in any way, a breach of confidentiality has occurred. Integrity - In information security, integrity means that data cannot be modified without authorization Integrity is violated when an employee accidentally or with malicious intent deletes important data files or when a computer virus infects a computer which destroys or modifies sensitive data.

Availability - For any information system to serve its purpose, the information must be available when it is needed This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades.

Forms of Network Attacks “Without security measures and controls in place, data might be subjected to an attack. Some attacks are passive, meaning information is monitored; others are active, meaning the information is altered with intent to corrupt or destroy the data or the network itself” – TechNet, Microsoft EAVESDROPPING: Network communications occur in an unsecured or “Clear -text" format, which allows an attacker who has gained access to data paths in your network to interpret or read the traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping. The ability of an eavesdropper to monitor the network is generally the biggest security problem that administrators face in an enterprise. Without strong encryption services that are based on cryptography, data can be read by others as it traverses the network. DATA MODIFICATION: After an attacker has read the data, the next logical step is to alter it. An attacker can modify the data in the packet without the knowledge of the sender or receiver. Even if you do not require confidentiality for all communications, you do not want any of your messages to be modified in transit. For example, if you are exchanging purchase requisitions, you do not want the items, amounts, or billing information to be modified.

IDENTITY SPOOFING (IP ADDRESS SPOOFING): Most networks and operating systems use the IP address of a computer to identify a valid entity. In certain cases, it is possible for an IP address to be falsely assumed— identity spoofing. An attacker might also use special programs to construct IP packets that appear to originate from valid addresses inside the corporate intranet. After gaining access to the network with a valid IP address, the attacker can modify, reroute, or delete your data. PASSWORD-BASED ATTACKS: A common denominator of most operating system and network security plans is password-based access control. This means access rights to a computer and network resources are determined by a user name and password. Older applications do not always protect identity information as it is passed through the network for validation. This might allow an eavesdropper to gain access to the network by posing as a valid user. When an attacker finds a valid user account, the attacker has the same rights as the real user. Therefore, if the user has administrator-level rights, the attacker also can create accounts for subsequent access at a later time.

DENIAL-OF-SERVICE ATTACK: Unlike a password-based attack, the denial-of-service attack prevents normal use of a computer or network by valid users. After gaining access to the network, the attacker can do any of the following: Send invalid data to applications or network services, which causes abnormal termination or behavior of the applications or services Flood a computer or the entire network with traffic until a shutdown occurs because of the overload Block traffic, which results in a loss of access to network resources by authorized user COMPROMISED-KEY ATTACK: ‘A key is a secret code or number necessary to interpret secured information’ After an attacker obtains a key, that key is referred to as a compromised key. An attacker uses the compromised key to gain access to a secured communication without the sender or receiver being aware of the attack. With the compromised key, the attacker can decrypt or modify data, and try to use the compromised key to compute additional keys, which might allow the attacker access to other secured communications.

APPLICATION-LAYER ATTACK: An application-layer attack targets application systems by deliberately causing a fault in a machines operating system or applications. This results in the attacker gaining the ability to bypass normal access controls. The attacker takes advantage of this situation, gaining control of your application, system, or network, and can do any of the following: Read, add, delete, or modify data on the operating system. Introduce a virus program that uses your computers and software applications to copy viruses throughout your network. Abnormally terminate your data applications or operating systems. Disable security controls to enable future attacks.

SECURITY MEASURES INCORPORATE PEOPLE IN NETWORK SECURITY PLANNING: Employing effective processes, such as security policies, security awareness training and policy enforcement, makes Security stronger. Having people who use the network (employees, partners and even customers) understand and adhere to these security policies is critical. DEFINE SECURITY ZONES AND USER ROLES: Use firewalls & access control capabilities to enforce network access policies between these zones using the least privileged concept.. ENSURE NETWORK PREPAREDNESS: The operating system of every network machine should be prepared against attack by disabling unused services. Patches should be applied as soon as they become available, and system software should be regularly tested for viruses, worms and spyware. STRONG DATA & ACCESS ENCRYPTION: Strong passwords to prevent guessing and/or machine cracking attacks, as well as other strong forms of authentication (Encryption/SSL/TLS)

THANK YOU