Security in Computing Security in Networks. I.Threats in networks A. Vulnerabilities 1.Anonymity 2.Shared resources 3.Size (many points of attack) 4.Complexity.

Slides:



Advertisements
Similar presentations
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Advertisements

Security and Systems. Three tenets of security Confidentiality Integrity Availability.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
IS Network and Telecommunications Risks
7.3 Network Security Controls 1Network Security / G.Steffen.
Wired Equivalent Privacy (WEP)
Security in Networks— Their design, development, usage… Barbara Endicott-Popovsky CSSE592/491 In collaboration with: Deborah Frincke, Ph.D. Director, Center.
Web server security Dr Jim Briggs WEBP security1.
Chapter Threats in Networks Network Security / G. Steffen.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
G53SEC 1 Network Security Hijacking, flooding, spoofing and some honey.
Week 10 - Wednesday.  What did we talk about last time?  Network basics.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Mobile and Wireless Communication Security By Jason Gratto.
Secure connections.
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software Security Testing Vinay Srinivasan cell:
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Securing Wired Local Area Networks(LANs)
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
ACM 511 Introduction to Computer Networks. Computer Networks.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Security in Networks Single point of failure Resillence or fault tolerance CS model.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
Chapter 14 Network Encryption
Secure  Message interception (confidentiality)  Message interception (blocked delivery)  Message interception and subsequent replay  Message.
CSCE Farkas1 CSCE 522 Network Security. Reading Pfleeger and Pfleeger: Chapter 6 CSCE Farkas2.
Security in many layers  Application Layer –  Transport Layer - Secure Socket Layer  Network Layer – IPsec (VPN)  Link Layer – Wireless Communication.
A Critical Analysis on the Security of IoTs
Security in network Outline Threats in network Network security controls Firewalls Intrusion detection system Secure Networks and Cryptography Example.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
IS3220 Information Technology Infrastructure Security
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
AGENDA:  I.The Basics  II. Threats  III. Controls  IV.Tools Source: Pfleeger & Pfleeger.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Home: Tel: , H.P.: Office: 공) 7710A
Managing Secure Network Systems
CSE 4905 Network Security Overview
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
What Makes a Network Vulnerable?
إعداد : Alberto Escudero Pascual/ IT +46 النسخة العربية: أنس طويلة
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Threats in Networks Jagdish S. Gangolly School of Business
Unit 8 Network Security.
Introduction to Networking Security
Presentation transcript:

Security in Computing Security in Networks

I.Threats in networks A. Vulnerabilities 1.Anonymity 2.Shared resources 3.Size (many points of attack) 4.Complexity 5.Unknown perimeter 6.Unknown path

I.Threats in networks B. Attackers 1.for the challenge 2.for money, reward, espionage; organised crime because of reward 3.for ideology

I.Threats in networks C. Steps in an attack 1.reconnaissance a)port scan b)social engineering 2.attacking the network itself: eavesdropping and active wiretapping 3.attacking the infrastructure: protocol attacks

I.Threats in networks 4.attacking an endpoint a)defeating authentication 1)guessing (spoofing); masquerade, phishing, hijacking; man-in-the middle attack b)defeating confidentiality 1)delivery problems c)defeating integrity 1)message forgery 2)noise

I.Threats in networks d)website attacks 1)defacement 2)buffer overflow on a host of server 3)compromising applications on a host server, e.g.: =459012&p 1 = =459012&p 1 =1599 &i2=365217&p2=1499

I.Threats in networks e)denial of service 1)flooding 2)distributed denial of service

I.Threats in networks f)hostile code 1)active code (or mobile code) 2)bots (or robots) – similar to Distributed denial of Service 3)script kiddies – people who download and run attack scripts – simple scripts for many of the popular attacks

II.Network controls A.Architecture 1)segmented (idea similar to OS) – one server to handle Http, another for application code, another to handle DB request 2)redundant – function to run on more than one node 3)protected against single points of failure – fault tolerance 4)segment controlled by firewall

II.Network controls A.Encryption 1.link – encryption at layer 1 and 2 of the OSI model 2.end-to-end – security from one end of transmission to the other 3.“virtual” private network – a sense of a “private” although part of public network 4.IPSEc (IP Layer) - similar to SSL

II.Network controls C.Content integrity check (detect, not prevent) 1.error codes, checksums, cryptographic checksums D.Authentication E.Wireless security protocols 1.WEP (Wired Equivalent Privacy) 2.WPA - WPA2 extends WPA (WiFi Protected Access) – alternative to WEP

III.Other A.Firewalls B.Intrusion detection systems C.Secure