1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Sixth Edition by William Stallings.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Computer and Information Security
Computer and Information Security Jen-Chang Liu, 2004
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography and Network Security Chapter 1
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Cryptography and Network Security
Information Security Principles (ESGD4222)
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Network Security Essentials Chapter 1
Network Security David Lazăr.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Computer Security (CS4800)
1 CSE Cryptography and Security Ten H. Lai Autumn 2009.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
Data & Network Security
Cryptography and Network Security
Information System and Network Security
Information Security.
Data & Network Security
Information and Network Security
Cryptography and Network Security Chapter 1
Lecture 1: Foundation of Network Security
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Cryptography and Network Security
Confidentiality, Integrity, Nonrepudiation
Security Attacks Network Security.
Presentation transcript:

1 CSE 651: Introduction to Network Security Steve Lai Spring 2010

2 Syllabus Instructor: Steve Lai Office: DL 581 Office hours: MWF 2:30-3:30 Home page: state.edu/~laiwww.cse.ohio- state.edu/~lai

3 Text (required) William Stallings Cryptography and Network Security: Principles & Practice (5th edition) Pearson/Prentice Hall, Network-Security-Principles- Practice/dp/ http:// Network-Security-Principles- Practice/dp/

4 Prerequisite CSE 677 Some maturity in mathematical reasoning

Content of Course Will cover the first 17 chapters of Stallings with many sections skipped. 5

6 Topics Introduction (Ch. 1) Symmetric-key encryption –Classical encryption techniques (Ch. 2) –Block ciphers and data encryption standard (Ch. 3) –Advanced encryption standard (Ch. 5) –Block cipher operation (Ch. 6) –Stream ciphers (Ch. 7) Public-key cryptography and RSA (Ch. 9)

7 Topics (cont.) Cryptographic hash functions (Ch. 11) Message Authentication (Ch. 12) Digital Signatures (Ch. 13) Key management and distribution (Ch. 14) User authentication protocols (Ch. 15) Web Security: SSL (Ch 16) IEEE Wireless LAN Security (Ch. 17)

8 Grading plan Assignments: 20% Midterm exam I: 25% (Monday, April 26) Midterm exam II: 25% (Monday, May 17) Final exam: 30% (Wed, June 9, 9:30) Late homework will NOT be accepted.

Three related courses CSE 551: Introduction to Information SecurityCSE 551 CSE 652: Applied Information Security Project CSE 794Q: Introduction to Cryptography 9

Introduction CSE 651: Introduction to Network Security

What is Network Security? Network Security – measures to protect data during their transmission over a network or internet. Internet Security 11

Aspects of Network Security ITU-T Recommendation X.800 “Security Architecture for OSI” describes network security in three aspects: –security attack –security service –security mechanism 12

Security Attack Attack: any action that compromises the security of information Many different types of attacks Can be generally classified as –Passive attacks –Active attacks 13

Passive Attacks Reading contents of messages Also called eavesdropping Difficult to detect passive attacks Defense: to prevent their success 14

15 Active Attacks Modification or creation of messages (by attackers) Four categories: modification of messages, replay, masquerade, denial of service Easy to detect but difficult to prevent Defense: detect attacks and recover from damages

16

17

18

19 Security Services (Goals) Data Confidentiality: protecting data from unauthorized disclosure. Data Integrity: –assuring that data received is as sent (w/o modification) –or detecting its non-integrity.

20 Authentication: –(from dictionary: the action of confirming someone or something as authentic.) –(Peer) entity authentication: When establishing a logical connection, assure that the other party is as claimed. –Data origin authentication: In a connectionless transfer, assure that the source of received data is as claimed.

21 Message Authentication –Data origin authentication –Data integrity Entity Identification –Entity authentication

22 Non-Repudiation: –Origin non-repudiation: preventing sender from denying that he has sent a message –Destination non-repudiation: preventing receiver from denying that she has received a message

23 Access Control: preventing unauthorized use of a resource. Availability: making systems or resources available upon demand by legitimate users.

24 Security Mechanisms Means to implement security services: –Encryption Symmetric-key encryption Public-key encryption Key management –Hash functions –Message authentication codes –Digital signatures –Entity authentication protocols