CIS 325: Data Communications1 Chapter Seventeen Network Security.

Slides:



Advertisements
Similar presentations
By Md Emran Mazumder Ottawa University Student no:
Advertisements

Sri Lanka Institute of Information Technology
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Thursday 2/24/2011 Agenda: 1) Student security topics 2)Computer / Network security & fraud 3) Quiz 3 4) Last short paper: Cloud Computing 5) Final similar.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 18: Network Security Business Data Communications, 5e.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Encryption Methods By: Michael A. Scott
Network Security Sorina Persa Group 3250 Group 3250.
Chapter 31 Network Security
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
“it is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics.” Bruce Schneier.
Computer Networks with Internet Technology William Stallings Network Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Types of Electronic Infection
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Network Security David Lazăr.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
William Stallings Data and Computer Communications Chapter 18 Network Security.
Chap1: Is there a Security Problem in Computing?.
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
Chapter 2 Symmetric Encryption.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Securing Information Systems
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Securing Information Systems
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Presentation transcript:

CIS 325: Data Communications1 Chapter Seventeen Network Security

CIS 325: Data Communications2 The Need for Security n Increased reliance on data communications results in greater vulnerability of data and systems n Losses associated with computerized fraud and thefts are much larger than non-computerized fraud and theft –Average bank robbery loss: $3000 –Average computer fraud loss: $300,000

CIS 325: Data Communications3 Types of Security Threats n Disruption, Destruction, & Disaster –Viruses –Hardware, software, operator errors –Fires/floods/earthquakes n Unauthorized Access –Hackers –Disgruntled employees

CIS 325: Data Communications4 Passive Attacks n Primarily listening to traffic n Auth. Users can eavesdrop on line n Tap into patch panels n Intercept microwave transmissions n Tap lines to phone co. n Capture electromagnetic emissions n Fiber optic prevents most opportunities

CIS 325: Data Communications5 Active Attacks n Read stored data n Modify data in storage or during transmission n Disrupt service n Computer Emergency Response Team (CERT) n An expensive problem

CIS 325: Data Communications6 Conventional Encryption n 5 ingredients –plain text –encryption algorithm –secret key –ciphertext –decryption algorithm n Needs strong encryption algorithm n Sender and receiver must have same key

CIS 325: Data Communications7 Conventional Encryption n How to attack or de-cipher –cryptanalysis –brute force n Data Encryption Standard (DES) –Symmetric (same key to encrypt and decrypt) –Uses 64-bit key (100 quadrillion possibilities)

CIS 325: Data Communications8 Public Key Encryption n 6 ingredients –plain text –encryption algorithm –public key –private key –ciphertext –decryption algorithm

CIS 325: Data Communications9 Public Key Encryption n Process works regardless of order that keys are used n Many know your public key n Only you know private key n Keys and algorithm designed so they can’t be figured out even with one key known

CIS 325: Data Communications10 Public Key Process n You encode msg using rcvrs PUBLIC key n Only rcvr can decode and read with private key n No one else can read msg n Anyone with public key can send msg to that rcvr

CIS 325: Data Communications11 Public Key Process n Also can be used for authentication of sender –sender send msg using private key –rcvr decodes using public key –since only sender knows private key, that authenticates the sender –however, anyone with public key can read msg, so no good for secrecy

CIS 325: Data Communications12 Encryption Management n Link Encryption –devices to protect path from node to node –all traffic on path is secure –traffic most be decoded at each node for switching –traffic is vulnerable at switch

CIS 325: Data Communications13 Encryption Management n End-to-end Encryption –devices at each work station –traffic secure on path AND switches –But, switch needs to read control bits, so only data encrypted n Solution is to use combination of both

CIS 325: Data Communications14 Key Distribution n How to get keys to all parties –A physically delivers key to B –3rd party delivers to A and B –A transmits key online to B –3rd party transmits to A and B n Key Distribution Center n Session key for a single session

CIS 325: Data Communications15 Digital Signatures n Conventional Key doesn’t support non- repudiation n Authentication does, but very slow for big messages n Digital Signature relies on public-key and ‘secure hash function’

CIS 325: Data Communications16 Digital Signatures n Hash Code created by doing some function on plain text –like a very fancy frame check sequence n Use private key to encrypt hash code only n Prevents anyone from modifying message n Provides authentication of sender

CIS 325: Data Communications17 Web Security n Problems –Alteration of web page –Access to server op sys –Eavesdropping –Impersonation n Solutions –Secure web site server –Secure site access