Introduction CS-480b Dick Steflik. X.800 – OSI Security Services Security Service – a service provided by a protocol layer of communicating open systems,

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
1 Network Security Ola Flygt Växjö University
Chapter 1 – Introduction
4/16/2017 Network Security Mehrdad Nourani.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Computer and Information Security
Computer and Information Security Jen-Chang Liu, 2004
Applied Cryptography for Network Security
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Introduction to Computer and Network Security
Network Security Essentials Chapter 1
1 Introduction to Network Security Spring Outline Introduction Attacks, services and mechanisms Security threats and attacks Security services.
1 Introduction to Information Security Spring 2012.
Chapter 1 Overview. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Henric Johnson1 Network Security Henric Johnson Blekinge Institute of Technology, Sweden
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.
Network Security Introduction
Network Security and Cryptography
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Network Security Overview
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
Cryptography and Network Security
Information System and Network Security
Information Security.
Introduction Of Information Security
Information and Network Security
10CS835 Information Security
Computer Security Security Concepts September 20, 2018
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Qishi Wu University of Memphis
Cryptography and Network Security
Network Security Ola Flygt Växjö University
Cryptography and Network Security
Security Mechanisms Network Security.
Confidentiality, Integrity, Nonrepudiation
Presentation transcript:

Introduction CS-480b Dick Steflik

X.800 – OSI Security Services Security Service – a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers RFC 2828 – a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented bt security mechanisms.

Security Services Authentication – assurance that the communicating entity is who they say they are Access Control – prevent the unauthorized access to some system resource –Who can access –Under what conditions –What they are allowed to do Data Confidentiality – protection of data from unauthorized disclosure Data Integrity – insure that data received is exactely what was sent Nonrepudiation – protection from denial by one of the entities involved in a communication of having participated in all or part of the communication

Authentication Peer Entity Authentication – in a connection based environment; provide confidence in the identity of a connecting entity –Logging in with a password –Gaining access via biological identity verification DNA identification, retinal scan, finger/hand print identification –Access via audio voice identification Data Origin Authentication – in a connectionless environment; provide assurance that the source of received data is as claimed –Corroborates the source of the data –Does not proved assurance against duplicate or modified data

Access Control This service provides protection against unauthorized use of resources accessible via OSI. These may be OSI or non- OSI resources accessed via OSI protocols. This protection service may be applied to various types of access to a resource or to all accesses to a resource –e.g., the use of a communications resource; the reading, the writing, or the deletion of an information resource; the execution of a processing resource

Data Confidentiality Connection Confidentiality –Protection of all user data on a connection Connectionless Confidentiality –Protection of all data within a single data block Selective-Field Confidentiality –Insure confidentiality of selected fields with within the user data on a connection or in a single data block connection Traffic-Flow Confidentiality –Protection of information that might be derived by observing the traffic flow patterns

Data Integrity Connection Integrity with Recovery –Detect any modification of stream data or replay of data and retry; Connection Integrity without Recovery –Detect any modification and report it, no retry…continue on Selective-Field Connection Integrity –Same except for selected fields Connectionless Integrity –Detect modifications in fixed block connectionless data, may provide replay detection and protection Selective-Field Connectionless Integrity –Same, except for selected fields Total stream protection would encompass all of the above and is probably the best strategy

Nonrepudiation Nonrepudiation, Origin –Proof that the message was sent by the specified party Nonrepudiation, Destination –Proof that the message was received by the specified party

Security Mechanisms (X.800) Encipherment – algorithmic/mathematical conversion Digital Signature – appending a secret signature Access Control - Access Control Data Integrity Authentication Exchange Traffic Padding – appending extra chars to foil traffic analysis techniques Routing Control – selection of secure routeds through the network Notarization – use a trused 3 rd party (like a notary public)

Other Security Mechanisms (non X.800) Trusted Functionality –That which is perceived to be true by some criteria (policy) Security Label –The marking of (bound to) a resource that names or desiginates the security attributes of the resource Event Detection –Intrusion detection –Detection of specific hacks (detector hardware) –Too many log in attempts Security Audit Trail –Logging of all system events Security Recovery –Recovery based on requests from security mechanisms and/or event handling.

Network Security Model MMM’ Info ChannelF(s) ss Opponent Trusted 3 rd Party F(s)-some function that mutates M into M’ based on s F(s) – some function that reverses the mutation of M’ back into M

Internet Organizations Internet Architecture Board (IAB) – responsible for the overall design of the Internet, provides guidance to IETF Internet Engineering Task Force (IETF) – protocol engineering and development of the Internet –Working groups chartered by IETF do actual development work Internet Draft, RFC, Standard 8 areas – General, Applications, Internet, Operations and management, Routing, Security, Transport, User Services –IETF responsible for actual publishing Internet Engineering Steering Group (IESG) – responsible for technical management if IETF activities and the Internet Standards process

RFC Publication Process Internet Draft Proposed Standard Draft Standard Internet Standard Historic Best Current Practice ExperimentalInformational