Security Mechanisms Network Security.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Prof. Giovambattista Ianni  10 ECTS (5 Theory + 5 Lab.)  Suggested material:  W. Stallings, Cryptography and Network Security  W. Stallings,
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Computer and Information Security
Computer and Information Security Jen-Chang Liu, 2004
Applied Cryptography for Network Security
Introduction CS-480b Dick Steflik. X.800 – OSI Security Services Security Service – a service provided by a protocol layer of communicating open systems,
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Editied by R. Newman.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Network Security Essentials Chapter 1
Chapter 1 Overview. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
By Marwan Al-Namari Author: William Stallings
Data & Network Security
Cryptography and Network Security
Information System and Network Security
Information Security.
Introduction Of Information Security
Information and Network Security
10CS835 Information Security
Computer Security Security Concepts September 20, 2018
NET 311 Information Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Cryptography and Network Security Chapter 1
Lecture 1: Foundation of Network Security
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Cryptography and Network Security
Digital Signatures Network Security.
Confidentiality, Integrity, Nonrepudiation
A Model For Network Security
Security Attacks Network Security.
Message Authentication
Definition Of Computer Security
Cryptography and Network Security Chapter 1
Presentation transcript:

Security Mechanisms Network Security

Objectives of the Topic Security Mechanisms Objectives of the Topic After completing this topic, a student will be able to describe security mechanisms.

Figures and material in this topic have been Security Mechanisms Figures and material in this topic have been adapted from “Network Security Essentials: Applications and Standards”, 2014, by William Stallings.

Security Mechanisms Security mechanisms defined by X.800, Security Architecture for OSI can be divided into two broad categories w.r.t their implementation.

A) Specific Security Mechanisms May be incorporated into the appropriate protocol layer in order to provide some of the OSI security services

Security Mechanisms Encipherment Use of mathematical algorithms to transform data into a form that is not readily intelligible. The transformation and subsequent recovery depend on the algorithm and encryption keys.

Security Mechanisms Digital Signature Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.

Security Mechanisms Access Control Data Integrity A variety of mechanisms that enforce access rights to resources. Data Integrity A variety of mechanisms used to assure the integrity of a data unit or stream of data units.

Authentication Exchange Security Mechanisms Authentication Exchange A mechanism intended to ensure the identity of an entity by means of information exchange.

Security Mechanisms Traffic Padding The insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

Security Mechanisms Routing Control Enables selection of particular physically secure routes for certain data and allows routing changes, especially when a breach of security is suspected.

Security Mechanisms Notarization The use of a trusted third party to assure certain properties of a data exchange.

B) Pervasive Security Mechanisms Mechanisms that are not specific to any particular OSI security service or protocol layer.

Trusted Functionality Security Mechanisms Trusted Functionality That which is perceived to be correct with respect to some criteria (e.g., as established by a security policy).

Security Mechanisms Security Label The marking bound to a resource (which may be a data unit) that names or designates the security attributes of that resource.

Security Mechanisms Event Detection Detection of security-relevant events.

Security Mechanisms Security Audit Trail Data collected and potentially used to facilitate a security audit, which is an independent review and examination of system records and activities.

Security Mechanisms Security Recovery Deals with requests from mechanisms, such as event handling and management functions, and takes recovery actions

Security Mechanisms Relationship