By: Sambit Pulak XI-IB. Authenticity means establishing a user ’ s identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios,

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
Lecture 23 Internet Authentication Applications
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
January 2011 As a precaution, re-check the exam time in early January. Various rooms are used, your room will be on your personal timetable, available.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Web Services Security. Introduction Developing standards for Web Services security – XML Key Management Specification (XKMS) – XML Signature – XML Encryption.
What does “secure” mean? Protecting Valuables
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
In the web address box enter Enter your user ID (first and last initial 7 digit ID number) Select Log in.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
1.The Nature, Impact and Issues of Information Technology 1.6Strategies used to Prevent Deliberate and Accidental Illegal Actions.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Kerberos. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open source or in supported commercial software.
Karlstad University IP security Ge Zhang
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
TCOM Information Assurance Management Software Hacking.
Module 7: Implementing Security Using Group Policy.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Computer and Network Security - Message Digests, Kerberos, PKI –
Welcome Topic : Security.
The Different Payment Systems Different types of technologies Used for payment transactions on the Internet –SSL –SET –eDankort –MasterCard SecureCode.
Private key
Web Security Introduction (Some of the slides were adapted from Oppliger’s online slides at
Security Issues and Challenges in High Performance Grid Computing SASA SUBOTIC SASA SUBOTIC University of Pretoria.
CSCE 201 Identification and Authentication Fall 2015.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Social and Ethical Issues Overview of strand 1. Topics of strand 1 1. Reliability and integrity 2. Security 3. Privacy and anonymity 4. Intellectual property.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
1 Authentication Celia Li Computer Science and Engineering York University.
Topic 9 Authentication and authorization. Authentication Authentication is the process of determining whether someone or something is, in fact, who or.
Network Security (the Internet Security)
Grid Security.
Configuring Windows Firewall with Advanced Security
Systems Security Keywords Protecting Systems
Web Services Security.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Cryptographic Protocols
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Module 8: Securing Network Traffic by Using IPSec and Certificates
Module 2 OBJECTIVE 14: Compare various security mechanisms.
CDK: Chapter 7 TvS: Chapter 9
Advanced Computer Networks
Electronic Payment Security Technologies
Integrated Security System
A Model For Network Security
Presentation transcript:

By: Sambit Pulak XI-IB

Authenticity means establishing a user ’ s identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is a user login to a network. A more advanced example would be the use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs.

1)Depending on the sensitivity of the resources you wish to protect will govern what level or how many layers of Authentication are/is used. 2)Secret passwords 3)Password policy It is usually a confirmation to the resource provider of the authenticity of the person based on the fact the user/s know the secret password. Used to allow access to computer systems or resources A major weakness with passwords system can be stolen, accidentally revealed, or forgotten. This is an issue when substantial transactions occur, e.g.. money transfers. 4)Personnel history questions: What is your mothers name? or What was your first dogs name? Are often use to verify a user particularity when passwords are forgotten or need to be changed. 5)Software solutions IPSEC, Kerberos, XML Signature 6)Digital signatures