Lecture 1: Foundation of Network Security

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Sixth Edition by William Stallings.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Lecture 1: Overview modified from slides of Lawrie Brown.
Introduction to network security
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Prepared by Dr. Samia Chelloug Princess Nora Bint Abdulrahman University College of computer and information sciences Networks.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Prepared by Dr. Samia Chelloug
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Network Security Overview
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
CS457 Introduction to Information Security Systems
Cryptography and Network Security
Information System and Network Security
Data & Network Security
CNET334 - Network Security
Information and Network Security
Computer Security Security Concepts September 20, 2018
NET 311 Information Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Another perspective on Network Security
Cryptography and Network Security
Prepared by Dr. Samia Chelloug
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Security Attacks, Mechanisms, and Services
Cryptography and Network Security
Confidentiality, Integrity, Nonrepudiation
Security Attacks Network Security.
Presentation transcript:

Lecture 1: Foundation of Network Security NET 536 Network Security Networks and Communication Department Lecture 1: Foundation of Network Security

lecture contents: Computer Security vs Network Security Security Attack Passive attack Vs Active attack Why computer and network security is important? Network Security Services Security Trinity Challenges of computer and network security Conclusion 24-Nov-18 Networks and Communication Department

Computer Security vs Network Security Computer security: involves implementing measures to secure a single computer (protecting the ressources stored on that computer). Network security: involves protecting all the ressources on a network. We must consider not only the computers on the network but other network devices and data transmitted across the network. 24-Nov-18 Networks and Communication Department

Security attack Security attack is any action that comprises the security of information owned by an organization. 24-Nov-18 Networks and Communication Department

Passive attack Vs Active attack Attempts to learn or make use of information from the system but does not affect system ressources. The goal is to obtain information that is being transmitted. Telephone converstaion, electronic e-mail message… This type of attack is difficult to detect (it does not involve any alteration in data). Attempts to involve some modification of the data stream or the creation of a false stream. This type of attack is easier to detect than passive attack. 24-Nov-18 Networks and Communication Department

Why computer and network security is important? Protect company assests (hardware and software). Gain competive advantage: developping and maintaing effective security measures can provide an organization with a competive advantage over its competion. Keep your job: to secure one’s position within an organization and to ensure futur career, it is important to put into place measures that protect organizational assests. 24-Nov-18 Networks and Communication Department

Network Security Services Network security: can provide one of the five services: confidentiality, integrity, authentification, nonrepudation, and avaialability. Confidentiality/privacy: the transmitted message must make sense to only the intended receiver. To the others, the message must be garbage. When a costumer communicates with her bank, she expects that her communication is totaly confidential. 24-Nov-18 Networks and Communication Department

Network Security Services 2. Integrity: the data must arrive to the receiver exactly as they were sent. for example: A request for transferring 100$ should not be changed to a request for 1000$. 3. Authentification: the receiver needs to be sure of the sender’s identity. 4.Nonrepudation : a sender must not be able to deny sending a message that he or she , in fact, did send. 5. Avialability: availability to be the property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system. For example: a system is available if it provides services according to the system design whenever users request them 24-Nov-18 Networks and Communication Department

Security Trinity Network security is based on: prevention, detection, and response. Security trinity should be the foundation for all security policies. Security Detection Response Prevention 24-Nov-18 Networks and Communication Department

Security Trinity Prevention: in developping network security schemes, any organization should emphasize preventive measures over detection and response. It is more efficient and much more cost effective to prevent a security attack than to detect or repond to one. -Detection: once the preventive measures fail, procedures need to be put in place to detect immediatly to detect the araised attack. -Response: we need to develop a plan that identifies the appropriate response to a security atatck (who is responsable to execute some actions, what is the appropriate action ?) 24-Nov-18 Networks and Communication Department

Challenges of computer and network security Security is not simple as it might first appear to the novice: we need to consider potential attacks . Security mechanisms typically involve more than a paticular algorithm. Having designed various security mechanisms, it is necessary to decide where to use them (physical and logical sense). What points in a network are certain secured mechanisms needed? What layer or layers of our architecture should mechanisms be placed? 24-Nov-18 Networks and Communication Department

Conclusion ◆ The Open Systems Interconnection (OSI) security architecture provides a systematic framework for defining security attacks, mechanisms, and services. ◆ Security attacks are classified as either passive attacks, which include unauthorized reading of a message of file and traffic analysis or active attacks, such as modification of messages or files, and denial of service. ◆ A security mechanism is any process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. Examples of mechanisms are encryption algorithms, digital signatures, and authentication protocols. ◆ Security services include authentication, access control, data confidentiality,data integrity, nonrepudiation, and availability. 24-Nov-18 Networks and Communication Department

References William Stallings, ”Cryptography and Network Security”, Prentice Hall, 5th edition ( chapter #1 ) 24-Nov-18 Networks and Communication Department