Challenges Of Network Security

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

Lecture 1: Overview modified from slides of Lawrie Brown.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Applied Cryptography for Network Security
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Computer Security: Principles and Practice
Network security Network security. Look at the surroundings before you leap.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Prepared by Dr. Samia Chelloug Princess Nora Bint Abdulrahman University College of computer and information sciences Networks.
Cryptography and Network Security (CS435) Part One (Introduction)
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
Computer Security By Duncan Hall.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Cryptography and Network Security
CS457 Introduction to Information Security Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
By Marwan Al-Namari Author: William Stallings
Information System and Network Security
Information Security.
Data & Network Security
CNET334 - Network Security
Information and Network Security
Security in Networking
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Qishi Wu University of Memphis
Lecture 1: Foundation of Network Security
Cryptography and Network Security
Faculty of Science IT Department By Raz Dara MA.
Security.
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Introduction to Cryptography
The OSI Security Architecture
One-way Hash Function Network Security.
Cryptography and Network Security
Security Mechanisms Network Security.
Introduction to Course
Confidentiality, Integrity, Nonrepudiation
A Model For Network Security
Key Exchange, Man-in-the-Middle Attack
Security Attacks Network Security.
Message Authentication
Definition Of Computer Security
The Use of Random Numbers
Cryptography and Network Security Chapter 1
Presentation transcript:

Challenges Of Network Security

Challenges Of Network Security Objectives of the Topic After completing this topic, a student will be able to explain challenges of network security.

Challenges Of Network Security Figures and material in this topic have been adapted from “Network Security Essentials: Applications and Standards”, 2014, by William Stallings.

Challenges Of Network Security Computer Security Is the generic name for the collection of tools designed to protect data stored on computers and to thwart hackers.

Challenges Of Network Security The use of networks and communications facilities allows for carrying data from one computer to another. Network or internet security measures are needed to protect data during their transmission.

Challenges Of Network Security Network or internet security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information.

Challenges Of Network Security Deterrence is usually the first line of defense against intruders who may try to gain access. It works by creating an atmosphere intended to frighten intruders.

Challenges Of Network Security Prevention is the process of trying to stop intruders from gaining access to the resources of the system. Barriers include firewalls, demilitalized zones (DMZs).

Challenges Of Network Security Detection occurs when the intruder has succeeded or is in the process of gaining access to the system. Signals from the detection process include alerts to the existence of an intruder.

Challenges Of Network Security Response is an aftereffect mechanism that tries to respond to the failure of the first three mechanisms. It works by trying to stop and/or prevent future damage or access to a facility.

Challenges Of Network Security No clear boundaries between Computer and Network forms of security. E.g., a virus may be introduced into a system physically when it arrives on an optical disk, or arrives over an internet.

Challenges Of Network Security 1) Security is not as simple as it might first appear to the novice. Mechanisms used to provide confidentiality, authentication, nonrepudiation, integrity are quite complex.

Challenges Of Network Security 2) In developing a security mechanism or algorithm, one must always consider potential attacks on security features. Successful attacks are designed by exploiting an unexpected weakness in the mechanism.

Challenges Of Network Security 3) Procedures used to provide particular services are often counterintuitive. It is only when the various aspects of the threat are considered that elaborate security mechanisms make sense.

Challenges Of Network Security 4) At what points in a network, are certain security mechanisms needed and at what layer(s) of an architecture such as TCP/IP should mechanisms be placed.

Challenges Of Network Security 5) Participants of security mechanisms may be in possession of some secret information (e.g., an encryption key), which raises questions about the creation, distribution, and protection of that secret information.

Challenges Of Network Security 6) Security is essentially a battle of wits bet. a perpetrator and the designer. The attacker needs only find a single weakness, while designer must find and eliminate all weaknesses to achieve perfect security.

Challenges Of Network Security 7) Security requires constant monitoring, and this is difficult in today’s overloaded environment. 8) Little benefit from security investment is perceived until a security failure occurs.

Challenges Of Network Security 9) Strong security is often viewed as an impediment to efficient and user-friendly operation. End