Lecture I : Internet Security Landscape Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University Fall 2005.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Prof. Giovambattista Ianni  10 ECTS (5 Theory + 5 Lab.)  Suggested material:  W. Stallings, Cryptography and Network Security  W. Stallings,
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Applied Cryptography for Network Security
Introduction CS-480b Dick Steflik. X.800 – OSI Security Services Security Service – a service provided by a protocol layer of communicating open systems,
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Editied by R. Newman.
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 19 Security.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Network Security Essentials Chapter 1
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Chapter 1 Overview. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Computer Security By Duncan Hall.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Computer Security (CS4800)
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Network security 1. Security taxonomy Physical security Resource exhaustion - DDoS system/network vulnerabilities Key-based security.
Cryptography and Network Security
Information System and Network Security
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Information Security.
Introduction Of Information Security
Who Uses Encryption? Module 7 Section 3.
امنیت شبکه علی فانیان
Cryptography and Network Security
Confidentiality, Integrity, Nonrepudiation
Presentation transcript:

Lecture I : Internet Security Landscape Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University Fall 2005

2005/09/20 Internet Security - Introduction 2 The Problem  Internet (Packet Switching) is inherently insecure  Highly Asymmetric Defense  Offenders can use little amount of resources  Defenders must consume large amount of resources  Situation is getting worse, and will not get better  More “Bad Guys”:  Armature Hackers “Ankle Bitters”  Professional Criminals  Corporate Espionage  International Cyber-warfare  More Powerful Attacks :  Public Domain Attack Tools  Automated Attacks  Concealed Tracks  Consequences is becoming more devastating

2005/09/20 Internet Security - Introduction 3 Attack Sophistication vs. Intruder Knowledge

2005/09/20 Internet Security - Introduction 4 The Causes  Our world relies increasingly on a Global Information Infrastructure  Why?  Add Values  Reduce Costs  Increase Productivity  Our industry makes more aggressive tradeoffs and thus more devastating mistakes  Easy to Use vs. Safe to Operate  Mismanagement  Time to Market vs. Perfect in Making  Flaws  Performance vs. Costs  Under-investment  Our community becomes both more diverse and more integrated  Many users  One Network

2005/09/20 Internet Security - Introduction 5 The Solution Space  Type of Protection  Aspects of Enforcement  Procedures of Realization

2005/09/20 Internet Security - Introduction 6 Types of Protection (ISO ) Security Services  Authentication  Data Origin Authentication  Peer Entity Authentication  Confidentiality  Connectionless Confidentiality  Connection Confidentiality  Selective Field Confidentiality  Traffic Flow Confidentiality  Integrity  Connectionless Integrity  Connection Integrity  Selective Field Integrity  Non-Repudiation  Data Origin  Data Reception  Access Control Security Mechanisms  Encipherment  Secret Key Ciphers  Public Key Ciphers  Integrity Checks  Non-keyed Checks  Keyed Checks  Digital Signature  Access Control Mechanisms  Access Control Lists  Capabilities  Traffic Padding  Notarization  Audit

2005/09/20 Internet Security - Introduction 7 Aspects of Enforcement

2005/09/20 Internet Security - Introduction 8 Procedures of Realization