Chapter 10 Advanced Topics (2)

Slides:



Advertisements
Similar presentations
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Securing the Borderless Network March 21, 2000 Ted Barlow.
Security+ Guide to Network Security Fundamentals
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Chapter 20: Network Security Business Data Communications, 4e.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Chapter 14: Controlling and Monitoring Access. Comparing Access Control Models Comparing permissions, rights, and privileges Understanding authorization.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Network System Security - Task 2. Russell Johnston.
Chapter 6 Introduction to Digital Security
Information Systems Security
Chapter 40 Internet Security.
Jordan Population and Housing Census 2015
IPsec Problems and Solutions
What is a Firewall?.
Network Security (the Internet Security)
Level 2 Diploma Unit 11 IT Security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Network Security Analysis Name : Waleed Al-Rumaih ID :
TECHNOLOGY GUIDE THREE
Systems Security Keywords Protecting Systems
Practical Questions Theoretical Questions
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
What is network security?
Chapter 6 Introduction to Digital Security
Living in a Network Centric World
CCNA Network Fundamentals
Living in a Network Centric World
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Firewalls.
Unit 1.6 Systems security Lesson 3
Malware, Phishing and Network Policies
Firewalls Routers, Switches, Hubs VPNs
Living in a Network Centric World
Security.
Living in a Network Centric World
Firewall.
Security.
Living in a Network Centric World
Securing Windows 7 Lesson 10.
Living in a Network Centric World
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Introduction to Network Security
Living in a Network Centric World
Living in a Network Centric World
Operating System Concepts
Introduction to Cryptography
Living in a Network Centric World
Computer Security Chapter Two
G061 - Network Security.
Lecture 36.
Living in a Network Centric World
Lecture 36.
Presentation transcript:

Chapter 10 Advanced Topics (2) Chapter Objectives: Communications Security To understand the weaknesses of the Internet/WWW, conventional encryption and public key encryption, the misconception people have of public key encryption To understand what a firewall is, the factors to take into consideration when designing firewalls, and the UNIX/Internet security architecture and password management

Chapter 10 Advanced Topics (2) Chapter Objectives: Project Management To understand the importance and function of a project manager, the different project team structures and the major activities in project management

Communications Security The Internet and WWW vulnerabilities Proliferation and use of Internet Internet & WWW Need for Internet security management Internet worm Breach in credit files Illegal access

Data Encryption Two Techniques: Conventional Encryption 1. Original message is known as plaintext 2. Apply encryption and key to get ciphertext 3. Transmission to the recipient 4. Decryption ciphertext with key IM218

Security of conventional encryption depends on certain factors: Resist brute force Maintain secrecy of the key

Public Key Encryption 1. Generates encryption and decryption keys 2.Public key is made available, companion key is kept private 3.A encrypts plaintext using B’s public key 4.B decrypts message with it’s private key

Conventional Encryption versus Public Key Encryption Public key encryption is NOT more secured than conventional encryption Public key encryption is NOT a general purpose technique Key distribution in public key system is as complicated

Fundamental Encryption Principles Incorporate redundancy in encrypted messages Prevent intruders from playing back old messages

Firewalls A firewall is a mechanism to protect one network from another by preventing unauthorised users from accessing computing resources on a private network Design considerations for firewalls: Trade off between security and ease of use Restating conditions for design Prohibit activities that are not expressly permitted Permit activities that are not expressly prohibited

Internet Security Architecture Layer Name Functional Description 7 Policy Policy definition and directives 6 Personnel People who use the equipment and data 5 Local Area Computer equipment Network and data assets 4 Internal Concentrator-internal demarcation connect 3 Embedded OSI functions- UNIX gateway Layers 7,6,5,4 2 Packet filtering OSI functions- Layers 3,2,1 1 External Public access- demarcation external connect

Layer 7 Layer 6 Defines the entire security program The people in contact with the network

Password Management 1 Try using the user’s name, initials, account names and other relevant personal information as passwords 2 Try using words from various dictionaries, including names of people and places 3 Try using permutations of the words in step 2, including various combinations of cases, reversing the order and embedding numbers into the word 4 Try foreign words that are commonly used. This is especially relevant for foreign users 5 Try word pairs

Approaches to Password Management Using password checker Forcing periodic change of passwords Assign passwords Use physical devices Proactive checking

Project Management The Project Manager Qualities of ideal project manager Technical competency Ability to lead Effective planner Ability to control Sensitivity to the environment

Duties of the project manager Work with the steering committee Communicate with the users Planning and staff the project Monitor & report project progress Adjust to changes

Project management activities Project teams Hierarchical team Chief programmer team Adaptive team Project management activities Estimating Organising Controlling