IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Computer and Information Security Jen-Chang Liu, 2004
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
CPSC 6126 Computer Security Information Assurance.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Network Security Essentials Chapter 1
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Network security Network security. Look at the surroundings before you leap.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
Data & Network Security
Security
Cryptography and Network Security
Information Security.
Data & Network Security
CNET334 - Network Security
Information and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Qishi Wu University of Memphis
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Information and Network Security
Cryptography and Network Security
A Model For Network Security
Security Attacks Network Security.
Cryptography and Network Security Chapter 1
Presentation transcript:

IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002

1 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Chapter 1: Working Definitions of Security IT Security Principles Three Aspects of Security Types of Security Services Types of Security Threats Goals of Security Types of Security Attacks Model for Network Security Model for Network Access Security Chapter Outline

2 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Information Security Defined: “The generic name for the collection of tools designed to protect data and to thwart [break-ins]”. [4] Working Definitions of Security

3 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only IT Security Principles Principle of Easiest Penetration: “An intruder must be expected to use any available means of penetration. This is not the most obvious means, nor is it the one against which the most solid defense has been installed.” (Pflegger) Principle of Adequate Protection: “Computer Items must be protected only until they lose their value. They must be protected to a degree consistent with their value.” (Pflegger)

4 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Security Services fall into one of the following categories: Security Attack: Any Attack that compromises the security of information owned by an organization. Security Mechanism: A mechanism that is designed to detect, prevent or recover from a security attack. Security Service: A service that enhances the security of [information] systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. Three Aspects of Security

5 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Security Services fall into one of the following categories: Confidentiality: Ensures that the info in a system and transmitted info are accessible only for reading by authorized parties. (Data Privacy) Integrity: Ensures that only authorized parties are able to modify computer systems assets and transmitted information. (Data has not been altered) Authentication: Ensures that the origin of a message or electronic doc is correctly identified, with an assurance that the identity is not false. (Who created or sent the data) Types of Security Services

6 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only (a) Normal Flow (b) Interruption: An asset of a system becomes unavailable or unusable. [3] (c) Interception: Some unauthorized party which has gained access to an asset. [3] (d) Modification: Some unauthorized party not only gains access to, but also tampers with, an asset. [3] (e) Fabrication: Some unauthorized party fabricates objects on a system. [3] Types of Security Threats

7 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Goals of Security Integrity Confidentiality Availability

8 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Passive Threats: Release of Message Contents Traffic Analysis Active Threats: Masquerade Replay Modification of Mess. Contents Denial of Service Types of Security Attacks

9 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Model for Network Security (1) A message is transferred from one party (Principal) to another. (2) A logical information channel is established between the two Principals by the cooperative use of some protocol, e.g. TCP/IP. (3) Goal is to provide the secure transmission of information from Opponents. (4) A trusted third-party may be needed for secure transmissions.

10 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Model for Network Access Security (1) Gatekeeper functions include Password-based login authentications. (2) Various internal controls that monitor activity and analyze stored information in an attempt to detect the presence of unwanted intruders.

11 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only [1] Denning, Dorothy E. Cryptography and Data Security, Addison-Wesley, [2] Ghosh, Anup. E-Commerce Security, Weak Links, Best Defenses, Wiley Computer Publishing, [3] Pfleeger, Charles. Security In Computing, Prentice Hall, [4] Stallings, William. Cryptography and Network Security, Prentice Hall, Resources