Henric Johnson1 Network Security Henric Johnson Blekinge Institute of Technology, Sweden +46 708 250375.

Slides:



Advertisements
Similar presentations
Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
Advertisements

Network Security Assigned to: BHARGAVI H. GOSWAMI Assistant Professor Sunshine Group of Institutes Faculty of MCA Rajkot.
Cryptography and Network Security Chapter 1
1 Network Security Ola Flygt Växjö University
Henric Johnson1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
4/16/2017 Network Security Mehrdad Nourani.
Computer and Information Security
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
1 Security Concepts Introduction. 2 Main Themes of the Course Vulnerabilities of networked applications –Worms, denial of service attacks, malicious code.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
Blekinge Institute of Technology, Sweden
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Introduction CS-480b Dick Steflik. X.800 – OSI Security Services Security Service – a service provided by a protocol layer of communicating open systems,
Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Cryptography and Network Security
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden Revised by Andrew.
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
Network Security Essentials Chapter 1
Security in Computer System 491 CS-G(172) By Manesh T
1 Introduction to Network Security Spring Outline Introduction Attacks, services and mechanisms Security threats and attacks Security services.
1 Introduction to Information Security Spring 2012.
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
8/30/2010CS 686 Definition of Security/Privacy EJ Jung CS 686 Special Topics in CS Privacy and Security.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
©Dr. Respickius Casmir IT Security In a Nutshell – Session 1 By Dr. Respickius Casmir.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Pertemuan 03 Ancaman dan Serangan Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Internet and Intranet Fundamentals Class 3 Session B.
Network Security Introduction
Network Security and Cryptography
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Data & Network Security
Introduction to Information Security
CNET334 - Network Security
10CS835 Information Security
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
Cryptography and Network Security Chapter 1
Qishi Wu University of Memphis
Lecture 1: Foundation of Network Security
Another perspective on Network Security
Network Security Ola Flygt Växjö University
Introduction to Cryptography
The OSI Security Architecture
Network Management Security
Presentation transcript:

Henric Johnson1 Network Security Henric Johnson Blekinge Institute of Technology, Sweden

Henric Johnson2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork Security Internet standards and RFCs( In computer network engineering, a Request for Comments (RFC) is a memorandum published by the Internet Engineering Task Force (IETF) describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems).computer network engineering memorandumInternet Engineering Task ForceInternet

Henric Johnson3 Attacks, Services and Mechanisms Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

Henric Johnson4 Security Attacks

Henric Johnson5 Security Attacks Interruption: This is an attack on availability Interception: This is an attack on confidentiality Modification: This is an attack on integrity Fabrication: This is an attack on authenticity

Henric Johnson6 Security Goals Integrity Confidentiality Avalaibility

Henric Johnson7

8 Security Services Confidentiality (privacy) Authentication (who created or sent the data) Integrity (has not been altered) Non-repudiation (the order is final) Access control (prevent misuse of resources) Availability (permanence, non-erasure) – Denial of Service Attacks – Virus that deletes files

Henric Johnson9

10

Henric Johnson11 Methods of Defence Encryption Software Controls (access limitations in a data base, in operating system protect each user from other users) Hardware Controls (smartcard) Policies (frequent changes of passwords) Physical Controls

Henric Johnson12 Internet standards and RFCs The Internet society –Internet Architecture Board (IAB) –Internet Engineering Task Force (IETF) –Internet Engineering Steering Group (IESG)

Henric Johnson13 Internet RFC Publication Process

Henric Johnson14 Recommended Reading Pfleeger, C. Security in Computing. Prentice Hall, Mel, H.X. Baker, D. Cryptography Decrypted. Addison Wesley, 2001.