Introduction (Pendahuluan)  Information Security.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Lecture 1: Overview modified from slides of Lawrie Brown.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Computer and Information Security Jen-Chang Liu, 2004
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Introduction to Computer and Network Security
Network Security Essentials Chapter 1
Chapter 1 Overview. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Introduction
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Introduction (Pendahuluan)  Information Security  Criptography.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
By Marwan Al-Namari Author: William Stallings
Cryptography and Network Security
Information System and Network Security
Information Security.
CNET334 - Network Security
Information and Network Security
10CS835 Information Security
Computer and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Cryptography and Network Security
Cryptography : Introduction
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Security Attacks, Mechanisms, and Services
Cryptography and Network Security
Security Attacks Network Security.
Cryptography and Network Security Chapter 1
Presentation transcript:

Introduction (Pendahuluan)  Information Security

2  Information is a strategic resource  Information security requirements have changed in recent decades Traditionally provided by physical & administrative mechanisms Use of computer requires automated tools to protect files and other stored information Use of networks and communication links requires measures to protect data during transmission Information Security – Why?

3  Computer Security : generic name for the collection of tools designed to protect data and to thwart hackers  Network Security : measures to protect data during their transmission  Internet Security : measures to protect data during their transmission over a collection of interconnected networks Definition

4 3 aspects of information security:  Security Attacks  Security Services  Security Mechanisms

5 Security Attacks  Definition: Any action that compromises the security of information owned by an organization  Often threat & attack used to mean same thing  Threat : A potential for violation of security  Attack : An assault on system security that derives from an intelligent threat

6 Classification of security attacks  Passive Attacks: attempt to learn or make use of information from the system but does not affect system resources  Active Attacks: attempt to alter system resource or affect their operation

7 Security Threats  Threats can come from a range of sources  Various surveys, with results of order: 55% human error 10% disgruntled employees 10% dishonest employees 10% outsider access also have "acts of god" (fire, flood etc)  Note that in the end, it always comes back to PEOPLE.  Technology can only assist so much, always need to be concerned about the role of people in the threat equation - who and why.

8 Passive Attacks  Only involve monitoring (interception) of the information, leading to loss of confidentiality or  Traffic analysis (monitoring exchange of information without knowing precise contents),  hard to detect

9  Release of message contents: attacks confidentiality Eavesdropping Learn the content of transmitted messages

10  Traffic Analysis: attacks confidentiality, or anonymity Monitoring the pattern of transmitted messages  Include: the source & destination, frequency, and length of messages Determine the location and identity of communicating hosts

11 Active Attacks  Active attacks involve some modification of the data stream or the creation of a false stream, and  hard to prevent.

12 Masquerade  pretends to be a different entity

13 Replay  passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect

14 Modification of messages  alters some portion of a legitimate message

15 Denial of service  prevents or inhibits the normal use or management of communications facilities

16 Security Services  Enhance security of data processing systems and information transfers of an organization  Intended to counter security attacks using one or more security mechanisms  Security services implement security policies  Often replicate functions normally associated with physical documents have signatures, dates need protection from disclosure, tampering, or destruction; be notarized or witnessed be recorded or licensed

17 Security Services  Authentication - protect info origin (sender)  Access control - control access to info/resources  Data Confidentiality - protect info content/access  Data Integrity - protect info accuracy  Non-repudiation - protect from deniability  Availability - ensure a system (info) is available to authorized entities when needed. One Useful Classification of Security Services:

18 Security Mechanisms  Features designed to detect, prevent, or recover from a security attack Personnel : Access Tokens, Biometrics Physical : Integrated Access Control Managerial : Security Education Data Networking : Encryption, Config. Control S/W & O/S : Testing, Evaluation, Trusted O/S.

19 Facts: security mechanism  No single mechanism can provide all the security services wanted.  But encryption or encryption-like information transformation (and hence the cryptography) is a key enabling technology