Business Data Communications, Fourth Edition Chapter 10: Network Security.

Slides:



Advertisements
Similar presentations
Computer and Network Security Mini Lecture by Milica Barjaktarovic.
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
(4.4) Internet Protocols Layered approach to Internet Software 1.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Computer and Network Security Risanuri Hidayat, Ir., M.Sc.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Securing Information Systems
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Defining Security Issues
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Internet Security facilities for secure communication.
Linux Networking and Security Chapter 8 Making Data Secure.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Public Key Encryption.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Network Security Celia Li Computer Science and Engineering York University.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Information Systems Design and Development Security Precautions Computing Science.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Chapter 40 Internet Security.
Security in Networking
Presentation transcript:

Business Data Communications, Fourth Edition Chapter 10: Network Security

Learning Objectives Describe the security duties of a network administrator List the types of physical security used on a computer network Describe a device that can be used for physical security List three types of software security Describe two types of encryption Chapter 10: Network Security2

Learning Objectives List three encryption standards Describe digital signatures and digital certificates Define the Secure Sockets Layer List the differences between a virus and a worm Describe firewalls Chapter 10: Network Security3

Introduction Security is extremely important in today’s network environment Hackers can be a serious problem for both corporate and private computers Physical and software security are used Network administrator develops and implements security systems Chapter 10: Network Security4

Physical Security Can use a locked room for computers Remote clients not as easily locked up Today’s open environment with PCs everywhere presents a problem Handhelds and laptops connected to corporate networks are of particular concern Chapter 10: Network Security5

Physical Security Measures to Control Physical Access to Networks –Fingerprint device –Video camera –Movement detection devices –Medium Wires are more secure than wireless Fiber optic most secure of wired systems –Encryption used to encode data –Dial-in access is a problem Chapter 10: Network Security6

Physical Security Data/Network Security Equipment –Fingerprint/voiceprint devices to prevent access –Callback unit Blocks unauthorized network access Used with dial-up lines Computer calls user back at predetermined number Will not work with mobile computer that uses different phone number Chapter 10: Network Security7

Software Security IDs and Passwords –Assigned to users, must be protected –Need to use password that is not obvious –Should be changed periodically Some systems force users to change them –Network software monitors use and reports on attempted unauthorized access –Applications can require IDs as well Chapter 10: Network Security8

Software Security Encryption –Scrambling data before transmission –Uses encryption key –Plaintext versus cipher text Chapter 10: Network Security9

Software Security Encryption –Symmetric key encryption One key used by both ends of transmission Data Encryption Standard (DES) (56 bits) Triple DES – more secure (112 bits) Blowfish (32 to 448 bits) International Data Encryption Algorithm (128 bit) Clipper Chip Chapter 10: Network Security10

Chapter 10: Network Security11

Software Security Encryption –Public Key Encryption Two keys are used (public & private keys) RSA is most common form Pretty Good Privacy (shareware) –Elliptic Curve Cryptography (ECC) Uses logarithm to create key Chapter 10: Network Security12

Digital Signatures Used for verification of files transmitted over a network Impossible to counterfeit Digital Certification –E-Signature – Actual handwritten signature attached to a document Makes a document legal Chapter 10: Network Security13

Chapter 10: Network Security14

Chapter 10: Network Security15

Digital Signatures Digital Certification –Digital Certificates – Verifies a persons identity using multiple forms of identification Combined with digital signature –Wireless networks use encryption, digital signatures and digital certificates to secure data Chapter 10: Network Security16

Chapter 10: Network Security17

Secure Sockets Layer (SSL) Allows security of credit card numbers for e-commerce URL starts with Software is on the server and client PC (included with most browsers now) Many sites also encrypt information before it is sent over the Internet Chapter 10: Network Security18

Chapter 10: Network Security19

Security Issues Forms of Computer Attacks –Virus –Worm Internet Worm – 1988 –Antivirus software needed, with updates –Denial of Service (DoS) attacks Chapter 10: Network Security20

Chapter 10: Network Security21

Security Issues Firewalls –Software program –Determines if user/software can access a system –Used in corporate networks and home computers –Trojan Horse – hidden program that executes by a trigger Chapter 10: Network Security22

Chapter 10: Network Security23

Chapter 10: Network Security24

Security Issues Firewalls –Packet-level firewall Determines if packets should pass to the network IP Spoofing – intruder appears to be from a valid address on the network –Application-level firewall Prevents unauthorized access to applications –Proxy Server Creates artificial addresses so to the outside, it looks like only one server exists on the corporate network, rather than several Chapter 10: Network Security25

Chapter 10: Network Security26

Chapter 10: Network Security27

Summary Network security is high priority issue Physical security is one level of defense Software security is used extensively –Several types of encryption are used Digital signatures and digital certificates are used to verify a user’s identity Chapter 10: Network Security28

Summary Viruses and worms are a threat Denial of service attacks have become a problem Firewalls protect a network from outside access Chapter 10: Network Security29

Chapter 10 Complete