A Model For Network Security

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
PART THREE E-commerce in Action Norton University E-commerce in Action.
Secure Electronic Transaction (SET)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Chap1: Is there a Security Problem in Computing?.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Electronic Commerce Semester 1 Term 1 Lecture 14.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Network Security Overview
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
By Marwan Al-Namari Author: William Stallings
Cryptography and Network Security
Cryptography and Network Security
Information Security.
Cryptographic Hash Function
Web Services Security.
Information and Network Security
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Pooja programmer,cse department
Confidentiality and Privacy Controls
Cryptography and Network Security Chapter 1
Qishi Wu University of Memphis
INFORMATION SYSTEMS SECURITY and CONTROL
Cryptography and Network Security
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Cryptography and Network Security Chapter 1
Security in SDR & cognitive radio
Cryptography and Network Security Chapter 1
Information and Network Security
Cryptography and Network Security
One-way Hash Function Network Security.
Cryptography and Network Security
Security Mechanisms Network Security.
Symmetric Key Distribution
Digital Signatures Network Security.
Key Exchange, Man-in-the-Middle Attack
Challenges Of Network Security
Diffie-Hellman Algorithm
Security Attacks Network Security.
Message Authentication
Cryptography and Network Security Chapter 1
Presentation transcript:

A Model For Network Security

A Model For Network Security Objectives of the Topic After completing this topic, a student will be able to describe a model for network security.

A Model For Network Security Figures and material in this topic have been adapted from “Network Security Essentials: Applications and Standards”, 2014, by William Stallings.

A Model For Network Security Assume a message is to be transferred from one party to another across some sort of Internet service. The two parties, who are the principals in this transaction, must cooperate for the exchange to take place.

A Model For Network Security A logical information channel is established by defining a route through the Internet from source to destination and by the cooperative use of communication protocols (e.g., TCP/IP) by the two principals.

A Model For Network Security To protect the information from an opponent who may present a threat to confidentiality, authenticity, and so on, security comes into play. All of the security techniques have two components:

A Model For Network Security 1. A security-related transformation on the information to be sent. Example1: encryption of the message, which scrambles the message so that it is unreadable by the opponent.

A Model For Network Security Example2: the addition of a code based on the contents of the message, which can be used to verify the identity of the sender.

A Model For Network Security 2. Some secret information shared by the two principals and unknown to the opponent. E.g. encryption key used with the transformation to scramble the message before transmission and unscramble it on reception.

A Model For Network Security A trusted third party (TTP) may be needed to achieve secure transmission. E.g. a TTP may be responsible for distributing the secret information to the two principals while keeping it from any opponent.

A Model For Network Security This general model shows that there are four basic tasks in designing a particular security service:

A Model For Network Security 1. Design an algorithm for the security-related transformation. An opponent should not be able to defeat purpose of the algorithm. 2. Generate the secret information used by the algorithm.

A Model For Network Security 3. Develop methods for the distribution and sharing of the secret information. 4. Specify a protocol enabling the principals to use the security algorithm and the secret information for a particular security service.

A Model For Network Security A Generic Model For Network Security

A Model For Network Security Next, we describe a general model which reflects a concern for protecting an information system from unwanted access. E.g. A hacker who attempts to penetrate system that can be accessed over a net.

A Model For Network Security An intruder can be a disgruntled employee who wishes to do damage or a criminal who seeks to exploit computer assets for financial gain (e.g., obtaining credit card numbers or performing illegal money transfers).

A Model For Network Security Using this model requires us to: Select appropriate gatekeeper functions to identify users Implement security controls to ensure only authorized users access designated information or resources.

A Model For Network Security Network Access Security Model

A Model For Network Security Another type of unwanted access is the placement in a computer system of logic that exploits vulnerabilities in the system and that can affect application programs. End