Cosc 513Presentation, Fall 20001 Network Security Student: Jianping He Student ID: 105592 Instructor: ProfessorAnvari Fall 2000.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
L0. Introduction Rocky K. C. Chang, January 2013.
Cryptography and Network Security Chapter 1
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
Chapter 17 Controls and Security Measures
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
8.1 Learning Objectives To become familiar with the range of security threats faced by networked and distributed systems (DSs); To examine various cryptographic.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Applied Cryptography for Network Security
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Sorina Persa Group 3250 Group 3250.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
ACM 511 Introduction to Computer Networks. Computer Networks.
Network Security Student: Lirong Wang Student ID: Instructor: Professor Anvari Winter 2003.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Ch 13 Trustworthiness Myungchul Kim
Network Security Introduction
Network Security Celia Li Computer Science and Engineering York University.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Securing Access to Data Using IPsec Josh Jones Cosc352.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Network Security.
Information and Network Security
NET 311 Information Security
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Lecture 1: Foundation of Network Security
Presentation transcript:

cosc 513Presentation, Fall Network Security Student: Jianping He Student ID: Instructor: ProfessorAnvari Fall 2000

cosc 513Presentation, Fall Content What is the network security. Encryption Application of Encryption in Network Security Encryption/decryption Digital signature Productivity vs Security Conclusion

cosc 513Presentation, Fall Why network security is important sharing. Because of the resource sharing of networks, more users have the potential to access networked system than single computers. complexity of system. A network combines more operating system, so it more complex than a signal computer. unknown perimeter. In network, a computer on one network can access the resource on the other network many points of attack. In network, the file is stored remote from the computer and may pass through many host computers to get to the user, so the administrator may have no control over other hosts in the network. unknown path. In network, there are more than one path from one host to another. When a user on one host sends a message to a user on another host. It seldom has control over the routing of its message.

cosc 513Presentation, Fall Objectives of Network security Confidentiality Ensure that an unauthorized individual does not gain access to data. Integrity Ensure that data are not altered by unauthorized individuals. Availability Ensure that authorized users are not denied access to the date or resource of the network

cosc 513Presentation, Fall Pattern of Attack to Network Interruption the flow of information is blocked entirely Interception In this attack, the normal flow of information is not affected, but an additional flow, generally to an unauthorized source, is created Modification an unauthorized party not only gains access to but also changes the contents of message before it is received at the destination host Fabrication an unauthorized party inserts counterfeit objects into the network.

cosc 513Presentation, Fall Key Generation select p, q p and q both prime calculate n = p x q select integer d gcd (  (n),d) =1; 1<d<  (n) calculate e e= d -1 mod  (n) public keyKU ={e, n} private keyKR ={d, n}

cosc 513Presentation, Fall Private Key Encryption Plaintext Encryption Algorithm Plaintext Decryption Algorithm CiphertextEncryption Key

cosc 513Presentation, Fall Private key encryption-contd. A key is used to encrypt a message and the same key is used to decrypt the message. Disadvantage: It is difficult to maintain the security of the key.

cosc 513Presentation, Fall Public Key Encryption Plaintext Encryption Algorithm Plaintext Decryption Algorithm Ciphertext Public Encryption Key Private Decryption Key

cosc 513Presentation, Fall Public key encryption-contd. One key for encryption and another key for decryption. Advantage: Solves the problem of maintaining key security Disadvantage Much more complex than private key encryption Two or three orders of magnitude slow than private key encryption

cosc 513Presentation, Fall Encryption/decryption of message

cosc 513Presentation, Fall Encryption points Link encryption Link layer is encrypted Suite for the transmission line is the point of greatest vulnerability Network encryption IP header is clear Load is encrypted Transport encryption TCP load is encrypted

cosc 513Presentation, Fall Digital Signature

cosc 513Presentation, Fall Security vs Productivity

cosc 513Presentation, Fall Conclusion Identify business-related security issues Analyze security risks, threats, and vulnerabilities Design the security architecture and the associated processes Implement security technology and processes Audit impact of security technology and processes Evaluate effectiveness of current architectures and policies

cosc 513Presentation, Fall Reference Niven,I., and Zuckerman, H.S. An Introduction to the Theory of Numbers. Wiley. New York Douglas E. Comer. Computer Networks and Internets. Prentice Hall, 1999, ISBN: Frederic J. Cooper et al. Implementing Internet Security, New Riders, ISBN: Gregory B. White, Computer system and network security. CRC,1996. William Stallings. Network and Internetwork Security. Prentice Hall,1995. ISBN: