Computer and Network Security

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

Cryptography and Network Security Sixth Edition by William Stallings.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Lecture 1: Overview modified from slides of Lawrie Brown.
Introduction to network security
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
C OMPUTER S ECURITY C ONCEPTS By: Qubilah D’souza TE computer.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Network Security Essentials Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Introduction to Computer and Network Security
Network Security Essentials Chapter 1
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Network Security Introduction
Computer threats, Attacks and Assets upasana pandit T.E comp.
Copyright © 2013 – Curt Hill Computer Security An Overview.
Computer Security (CS4800)
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
COMPUTER SECURITY COMP424 1 ST LECTURE OVERVIEW AND TERMINOLOGIES Dr. Sarah Mustafa Eljack
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Information Management System Ali Saeed Khan 29 th April, 2016.
Introduction (Pendahuluan)  Information Security  Criptography.
Network Security Overview
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
CS457 Introduction to Information Security Systems
Computer and Network Security
Information Security, Theory and Practice.
Data & Network Security
Information System and Network Security
COMPUTER SECURITY CONCEPTS
Information Security.
Data & Network Security
Network Security Overview
CNET334 - Network Security
BINF 711 Amr El Mougy Sherif Ismail.
Information and Network Security
NET 311 Information Security
Introduction to Computer and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Another perspective on Network Security
Cryptography and Network Security
IoTSec Taxonomy Proposal
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Security Attacks, Mechanisms, and Services
Cryptography and Network Security
Introduction to Course
Confidentiality, Integrity, Nonrepudiation
Security Attacks Network Security.
Definition Of Computer Security
Presentation transcript:

Computer and Network Security CSEN 1001 Computer and Network Security Amr El Mougy Alaa Gohar

Course Details

Course Details Text books and lecture slides: Authors: William Stallings and Lawrie Brown Title: Computer Security, Principles and Practice, 2nd Edition Publisher: Pearson Education, Inc., 2012 Author: William Stallings Title: Cryptography and Network Security, 6th Edition Publisher: Pearson Education, Inc., 2014 Note: These slides are not meant to be comprehensive lecture notes! They are only remarks and pointers. The material presented here is not sufficient for studying for the course. Your main sources for studying are the text and your own lecture notes

Course Details Week Lectures Tutorials 1 Intro + Classical Crypto 2 Symmetric Encryption AES PA1 Classical Cryptography 3 Modes of Encryption Task 1 Vigenere Cryptanalysis 4 RSA Introduction to Euler Sieve 5 Message Authentication – part 1 PA2 RSA 6 Message Authentication – part 2 Task 2 Breaking RSA using Euler Sieve 7 Blockchains – part 1 PA3 Authentication 8 Blockchains – part 2 Task 3 Intrusion Detection using ML 9 Key Management 1 PA4 Blockchains 10 Key Management 2 Task 4 Certificate Authority 11 Digital Forensics PA5 Key Management 12 Holiday Project Evaluation

Introduction and Key Security Concepts Lecture (1) Introduction and Key Security Concepts

Definition (Computer Security) Definitions The US-based National Institute for Standards and Technology (NIST) defines computer security as follows: [Computer security is] the protection afforded to an automated information system in order to attain the applicable objectives of preserving integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications) Definition (Computer Security)

Key Security Concepts CIA Triad

Confidentiality Confidentiality covers two concepts: Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed

Integrity Integrity as a security goal also covers two related concepts: Data integrity: Assures that information and programs are changed only in a specified and authorized manner System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system

Availability Availability ensures that a system works promptly and service is not denied to authorized users. A loss of availability is the disruption of access to or use of information or an information system

Further Considerations Some additional aspects are often mentioned: Authenticity: The property of being genuine and able to be verified Confidence in the validity of a transmission, verifiability of a message originator, inputs arriving from trusted sources Verifiability of a user’s identity Accountability: Actions can be uniquely traced to their originator Essential for nonrepudiation, deterrence, fault isolation, intrusion detection, after action recovery, legal action Truly secure systems are not achievable, so security breaches must be traceable

Attacks on Communication Networks We distinguish: Passive attacks Attempts to learn or make use of information from the system but does not affect system resources Eavesdropping or monitoring of transmissions Active attacks Attempts to alter system resources or affect their operation.

Passive Attacks Release of message contents / snooping Traffic analysis / spoofing Passive attacks are hard to detect!

Active Attacks Masquerade: One entity pretends to be a different entity Replay attack: Passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect

Active Attacks Modification attack: Some portion of a legitimate message is altered or messages are reordered to produce an unauthorized effect Denial of service: Prevents or inhibits the normal use or management of communications facilities

Security Services

Security Mechanisms