CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Applied Cryptography for Network Security
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security
Information Security Principles (ESGD4222)
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography, Authentication and Digital Signatures
CSCE 715: Network Systems Security
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Csci5233 computer security & integrity 1 Cryptography: an overview.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Ch 13 Trustworthiness Myungchul Kim
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Introduction to Network Systems Security Mort Anvari.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Security Overview
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Cryptography: an overview
Cryptography: an overview
CSCE 715: Network Systems Security
Cryptographic Hash Function
CSCE 715: Network Systems Security
Information and Network Security
مادسیج، شبکه آموزشی پژوهشی دانشجویان ایران
CSCE 715: Network Systems Security
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Lecture 1: Foundation of Network Security
Cryptography: an overview
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
Introduction to Cryptography
Confidentiality, Integrity, Nonrepudiation
Presentation transcript:

CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina

4/27/2004(C) 2004 Chin-Tser Huang2 What Can Go Wrong… …when your computer y receive or is waiting for a message m? m Internet x y ?

4/27/2004(C) 2004 Chin-Tser Huang3 Message Loss Adversary A can discard m in its transit m x y A

4/27/2004(C) 2004 Chin-Tser Huang4 Message Interception Adversary A can get a copy of m when m passes by m x y m m A

4/27/2004(C) 2004 Chin-Tser Huang5 Message Modification Adversary A can arbitrarily modify the content of m to become m’ m x y m’ A

4/27/2004(C) 2004 Chin-Tser Huang6 Message Insertion Adversary A can arbitrarily fabricate a message m, pretending that m was sent by x x y m src: x dst: y A

4/27/2004(C) 2004 Chin-Tser Huang7 Message Replay Adversary A can replay a message m that has been sent earlier by x and received by y x y m m A

4/27/2004(C) 2004 Chin-Tser Huang8 Denial-of-Service Attack Adversary A can send huge amount of messages to y to block m from arriving at y x y m ……………… ????? A

4/27/2004(C) 2004 Chin-Tser Huang9 Type of Attacks Passive attacks Traffic analysis Message interception Active attacks Message loss Message modification Message insertion Message replay Denial-of-Service attack

4/27/2004(C) 2004 Chin-Tser Huang10 Network Security Services Confidentiality Integrity Authentication Anti-replay … Availability Access control Non-repudiation Anonymity

4/27/2004(C) 2004 Chin-Tser Huang11 Confidentiality Keep message known only to the receiver and secret to anyone else Counter message interception

4/27/2004(C) 2004 Chin-Tser Huang12 Integrity When receiver receives message m, receiver can verify m is intact after sent by sender Counter message modification

4/27/2004(C) 2004 Chin-Tser Huang13 Authentication When receiver receives message m, receiver can verify m is indeed sent by the sender recorded in m Counter message insertion

4/27/2004(C) 2004 Chin-Tser Huang14 Anti-replay When receiver receives message m, receiver can verify m is not a message that was sent and received before Counter message replay

4/27/2004(C) 2004 Chin-Tser Huang15 Availability Property of a system or a resource being accessible and usable upon demand by an authorized entity Counter denial-of-service attack

4/27/2004(C) 2004 Chin-Tser Huang16 Access Control Mechanism to enforce access rights to resources and data Users can access resources and data to which they have access rights Users cannot access resources and data to which they don’t have access rights

4/27/2004(C) 2004 Chin-Tser Huang17 Non-repudiation When receiver receives message m, receiver gets proof that sender of m ever sent m Receiver of m can show proof to third- party so that sender of m cannot repudiate

4/27/2004(C) 2004 Chin-Tser Huang18 Anonymity Identity of sender is hidden from receiver When receiver receives message m, receiver has no clue about sender of m

4/27/2004(C) 2004 Chin-Tser Huang19 Network Security Is Great… Prevent messages from being attacked in their transit Detect and discard messages that are modified, inserted, or replayed Disallow unauthorized access to local system resource and sensitive data

4/27/2004(C) 2004 Chin-Tser Huang20 …But Hard To Achieve Many layers in network architecture Many different media of network connection Adversary’s location hard to determine New attacks keep emerging Cryptographic overhead

4/27/2004(C) 2004 Chin-Tser Huang21 Next … Final exam on Tuesday, May 4, 5:30pm- 7:30pm Take CSCE 715 in Fall 2004 if you are interested in network security Have a good summer!