Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Chapters 8 Network Security Professor Rick Han University of Colorado at Boulder
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Chapter 11 E-Commerce Security. Electronic CommercePrentice Hall © Learning Objectives 1.Document the trends in computer and network security attacks.
Chapter 29 Internet Security
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
INE1020: Introduction to Internet Engineering 6: Privacy and Security Issues1 Lecture 9: E-commerce & Business r E-Commerce r Security Issues m Secure.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Types of Electronic Infection
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Csci5233 computer security & integrity 1 Cryptography: an overview.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Chapter 9 Networking & Distributed Security (Part C)
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Network Security Celia Li Computer Science and Engineering York University.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Last time Message Integrity Authentication
IPSec Detailed Description and VPN
Unit 3 Section 6.4: Internet Security
Visit for more Learning Resources
Message Digest Cryptographic checksum One-way function Relevance
Pooja programmer,cse department
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Introduction to Network Security
Unit 8 Network Security.
Advanced Computer Networks
Electronic Payment Security Technologies
Presentation transcript:

Chapter 37 Network Security

Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible when there is a legitimate need. data confidentiality and privacy – data should be protected from unauthorized users – implemented via username/password mechanism,but data traversing network is still susceptible to eavesdropping

Encryption Encrypted message = encrypt (Key, Message) Message = decrypt(Key, Encrypted message) = decrypt(Key, encrypt(Key, Message))

Symmetric Key Encryption Same key used for encrypting and decrypting message Key known only by sender and receiver Eg. DES, RC4

Public Key Encryption Aka Asymmetric encryption uses a pair of keys – a private key known only to a user – a public key that is published along with name of user. message encrypted with private key can only be decrypted with public key and visa versa. Used by SSL protocol to send symmetric key M = decrypt (public key, encrypt(private key, Message)) – good for guarantee authenticity of sender M = decrypt (private key, encrypt(public key, Message)) – good for guarantee privacy of message

Authenticity and Confidentiality of message two levels of encryption is used to guarantee that a message is both authentic and private double encrypted message = encrypt( public key receiver, encrypt (private key sender, Message)) Message = decrypt (public key sender, decrypt(private key receiver, double encrypted message))

Digital Certificates Electronic document used to identify an individual, a server, or a company associated with a public key Analogous to driver’s license or passport Digital certificates are issued by Certificate Authority

Digital Signature Used to sign an electronic document A one-way hash (media digest) of electronic document is encrypted using sender’s private key. Recipient can verify that document has not been tampered by using sender’s public key to recover the media digest and verifying that this value is the same as the one-way hash value calculated.

Packet Filters Implement via Internet firewalls or routers used to prevent certain packets from passing through operates by examining fields in the header of each packet network manager specifies boolean combination of various filter parameters such as source and destination IP address, or specific protocol service such FTP or HTTP

Virtual Private Networks Using pubic network to create “private” network(fig 37.4)(fig 37.4) minimizes network connection costs VPN using routers (fig 37.5)(fig 37.5) IPsec PPTP

Network Attacks denial of service – Deprives network bandwidth or server resource – eg. ping flooding via running multiple “ping –s destIPaddress 12000&” – Exploits vulnerability in operating system or application software – Eg. Viruses and worms, buffer overflow

Good Security Practices comp/videos