Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since.

Slides:



Advertisements
Similar presentations
Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Chapter 15 Security Bernard Chen Spring Protection vs. Security Protection (Ch.14) deals with internal problem Security (Ch. 15) Deals with external.
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
Cryptography and Network Security
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
@Yuan Xue CS 285 Network Security Fall 2008.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Security.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
Presented by: Dr. Munam Ali Shah
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Computer threats, Attacks and Assets upasana pandit T.E comp.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Computer Security (CS4800)
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Chapter 14a: Security I.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information System and Network Security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Information Security.
What is network security?
Data & Network Security
Business System Development
Information and Network Security
Computer and Network Security
Operating System Concepts
Cryptography and Network Security
Introduction to Course
Presentation transcript:

Network Security CSC332

Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since July 2004

Some Pictures Park Square Campus, UoB, Luton Putteridge Burry Campus, UoB, Luton New Post Graduate Center, UoB, Luton

About the course  To provide a survey and exposure of both principles and practice of network security.  To determine threats to a network and how to protect organization’s systems and data from attacks.  The course will also help you understand and learn counter measures used to prevent, detect and correct security violations in a computer network.

You will NOT learn.. How to do computer hacking Break in a computer server and gain access to sensitive data

Books and Resources Cryptography and Network Security, 6 th Edition by William Stallings Network Secuirty Private Coomunication in a Public World, 2 nd Edition by Charlie Kaufman, Radia Perlman, and Mike Speciner

How this course will be run The course is comprised of 32 lectures and is divided in following parts: Part - 1: Computer/System Security Part - 2: Network Security Part - 3: Internet Security

Part - 1: Computer/System Security The main concepts that are discussed in this part are: Security concepts, security violation categories, security measure levels, methods to violate security, types of attacks and firewalls. This part will be covered in Lecture 1 to Lecture 4

Part - 2: Network Security This part is will cover most of the contents of the course. It has been further divided in following sub- parts: a) Analysis of network security b) Cryptography as a network security tool c) Symmetric key cryptography d) Asymmetric key cryptography e) Incorporating security in other parts of the network

Part – 2 (a): Analysis of network security Here we will discuss : Network threats (viruses, worms, Trojan horse), countermeasures of the threats, network security model, access control, principles and techniques of network security with examples of how they are applied in practice. The topics will be covered in  Lecture 5 - Lecture 8

Part – 2 (b): Cryptography as a network security tool Topics covered in this part are: Cryptography as a classical security tool, basic terminologies, steganography, substitution and transposition ciphers, Ceaser cipher The topics will be covered in  Lecture 9 - Lecture 10

Part – 2 (c): Symmetric key cryptography Topics covered in this part are: Feistel cipher, Data Encryption Standard (DES), basic rounds, double and triple DES, Advanced Encryption Standard (AES) and limitations of the symmetric key cryptography. The topics will be covered in  Lecture 11 - Lecture 17

Part – 2 (d): Asymmetric key cryptography This part will cover the following topics: Requirements and challenges for asymmetric key, Diffie-Hellman key exchange, Rivest Shamir & Adleman (RSA), attacks against RSA, hybrid cryptosystems and quantum cryptography. The topics will be covered in  Lecture 18 - Lecture 23

Part – 2 (e): Incorporating security in other parts of the network This part will discuss the following topics: Overview of the network security protocols, e.g., Simple Network Management Protocol (SNMP), securing , wireless network security. The topics will be covered in  Lecture 24 - Lecture 26

Part - 3: Internet Security This is the last part of the course. The main concepts that are discussed in this part are: Tools and techniques to protect data during the transmission over the Internet, Sobig F. worm, grappling Hook attack, Morris Internet worm, Overview of the Internet security protocols such as https and ssh. This part will be covered in  Lecture 27 – Lecture 30 The last two lectures, i.e., Lecture 31 and 32 are reserved for the revision of the course.

Are you ready !!!! Lets Begin

Lecture 1: Security Concept

Outlines What is Security Security violation categories Security measure levels

Objectives To describe the basics of a computer/systems security To understand and distinguish between different breaches of security.

The Security Problem “A System is secure if resources are used and accessed as intended under all circumstances” (Silberschatz, Galvin and Gagne) There are four things to notice here 1- resources 2- used and accessed 3- as intended 4- in all circumstances

Some examples A transmit a file (containing sensitive information) to B. C, who is not authorized to read the file, is able monitor the transmission Administrator D sends a message to computer E for updating an authorization file. F intercept the message, alters its content to add or delete entries, and then forwards the message to E. E accept the message and update the authorization file Rather than intercept, F constructs its own message and send it to E

Security Violation Categories Breach of confidentiality Unauthorized reading of data Breach of integrity Unauthorized modification of data Breach of availability Unauthorized destruction of data Theft of service Unauthorized use of resources Denial of service (DOS) Prevention of legitimate use

Security Measure Levels Impossible to have absolute security, but make cost to perpetrator sufficiently high to deter most intruders Security must occur at four levels to be effective: Physical  Data centers, servers, connected terminals Human  Avoid social engineering, phishing, dumpster diving Operating System  Protection mechanisms, debugging Network  Intercepted communications, interruption, DOS Security is as weak as the weakest link in the chain But can too much security be a problem?

Summary of today’s lecture Today we learnt: What is security and how different breaches of security can occur around us. We have discussed how security breaches in a computing environment can occur at different levels.

Next Lecture contents In next lecture we will learn about: methods to violate security types of security attacks and concept of the firewalls

The End