Review Slides, Security +

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Chapter 16
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
Application Layer. This graphic is taken from The Abdus Salam International Centre for Theoretical Physics.
Web services security I
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
Forensic and Investigative Accounting
Internet-Based Client Access
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Web Server Administration Chapter 10 Securing the Web Environment.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
CCNA1 v3 Module 11 v3 CCNA 1 Module 11 JEOPARDY S Dow.
SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
TCP/IP fundamentals Unit objectives Discuss the evolution of TCP/IP Discuss TCP/IP fundamentals.
Network Security Essentials Chapter 5
TCP/IP Transport and Application (Topic 6)
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Cisco 1 - Networking Basics Perrine. J Page 16/5/2016 Chapter 11 At which layer of the TCP/IP model does Telnet operate? 1.application 2.presentation 3.session.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Potential vulnerabilities of IPsec-based VPN
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
TCP/IP Protocol Suite ©Richard L. Goldman September 25, 2002.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
TLS/SSL Protocol Presented by: Vivek Nelamangala Includes slides presented by Miao Zhang on April Course: CISC856 - TCP/IP and Upper Layer Protocols.
Security Protecting information data confidentiality
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Web Security CS-431.
CompTIA Security+ Study Guide (SY0-401)
Web Applications Security Cryptography 1
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
IT443 – Network Security Administration Instructor: Bo Sheng
Tutorial on Creating Certificates SSH Kerberos
Level 2 Diploma Unit 10 Setting up an IT Network
v3 JEOPARDY CCNA 1 Module 11 CCNA1 v3 Module 11 Galo Valencia
Secure Sockets Layer (SSL)
Network Wiring and Reference
Chapter 8 Network Security.
Protocols and networks in the TCP/IP model initially.
Tutorial on Creating Certificates SSH Kerberos
Working at a Small-to-Medium Business or ISP – Chapter 7
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
14-мавзу. Cookie, сеанс, FTP и технологиялари
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 4 Core TCP/IP Protocols
CompTIA Security+ Study Guide (SY0-501)
Topic 5: Communication and the Internet
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Working at a Small-to-Medium Business or ISP – Chapter 7
Cryptography and Network Security
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
TLS and DLP Behind the green lock.
Protocols 2 Key Revision Points.
Advanced Computer Networks
Cryptography and Network Security
….for authentication and confidentiality PGP
Presentation transcript:

Review Slides, Security + Ted Demopoulos ted@demop.com

Risk Management Security is all about Risk Management Risk = Vulnerability x Threat Vulnerability – a weakness in a system. All complex systems have vulnerabilities Threat – an event that can cause an undesirable outcome. Threat implies potential harm

SLE/ALE SLE: Single Loss Expectancy – loss from a single event (how bad can it be?) ALE: Annual Loss Expectancy – loss from a threat over an entire year (can it happen multiple times?)

Quantitative vs. Qualitative Risk assessment can be Quantitative or Qualitative Quantitative -- a quantity or number. e.g. if a Katrina strength hurricane hits again the expected loss is 22 billion dollars Qualitative e.g. if a Katrina strength hurricane hits again it will be extremely bad

Crypto Algorithms Symmetric Asymmetric Hashing Secret Key Public Key Message Digest 1-way Encryption Irreversible Encryption One Key Public, Private Key Pairs No Key DES, 3-DES AES, IDEA, RC4 Diffie-Hellman, RSA, El Gamal, ECC MD2, MD4, MD5, SHA-1, SHA-2

PGP versus PKI PKI – Central authority in change of trust, You MUST trust the central authority PGP – Closer to anarchy. NO central authority. Web of Trust – you trust your friends and many of your friend’s friends.

Access Control Discretionary Access Control (DAC) Users control Mandatory Access Control (MAC) Not controlled by users, requires matching clearance and classification levels (e.g. top secret, secret, classified, etc.) Role Based Access Control (RBAC) Based on group memberships

TCP/IP 3 way Handshake SYN SYN, ACK ACK

Some Common Ports (1) TCP 20, 21 – FTP (file transfer protocol) TCP 22 – SSH (secure shell) TCP 23 – telnet TCP 25 – SMTP (simple mail transfer protocol) TCP and UDP 53 – DNS (domain name system)

Some Common Ports (2) TCP 80 – HTTP (hyper text transfer protocol) TCP 110 POP3 (post office protocol) TCP 143 IMAP (internet message access protocol) TCP 443 SSL, HTTPS (secure sockets layer, HTTP over SSL)

Open Source Tools (not on test) Sniffers: TCPdump, Ethereal (now called Wireshark) 802.11: NetStumbler, Kismet Password Assessment: John the Ripper, Cain and Abel Vulnerability Assessment: Nessus Intrusion Detection: Snort