McLean 20061 HIGHER COMPUTER NETWORKING Lesson 12 Network Security Requirements Description of computer and network security requirements (confidentiality,

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Security WG Areas of Interest FYI - Strawman Vancouver June 2001 Sprint PCS ®
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Lecture 1: Overview modified from slides of Lawrie Brown.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CPE 5002 Network security. Look at the surroundings before you leap.
Applied Cryptography for Network Security
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Data Security GCSE ICT.
General Purpose Packages
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Section 6 Theory Software Copyright, Viruses and Hacking.
Introduction to Computer and Network Security
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Network security Network security. Look at the surroundings before you leap.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Copyright © 2013 – Curt Hill Computer Security An Overview.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Security Issues in Information Technology
Cryptography and Network Security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptographic Hash Function
Data & Network Security
Information and Network Security
Security network management
Introduction to Cryptography
Mohammad Alauthman Computer Security Mohammad Alauthman
Information and Network Security
WJEC GCSE Computer Science
Security Attacks, Mechanisms, and Services
LO1 - Know about aspects of cyber security
Cryptography and Network Security
Confidentiality, Integrity, Nonrepudiation
Security Attacks Network Security.
Presentation transcript:

McLean HIGHER COMPUTER NETWORKING Lesson 12 Network Security Requirements Description of computer and network security requirements (confidentiality, data integrity and availability). Description of threats to network security in terms of passive (monitoring of transmission) and active (modification of the data stream or the creation of a false stream) attacks.

McLean HIGHER COMPUTER NETWORKING What You Should Know About Security Requirements Computer and Network Security Requirements It is required by law (The Data Protection Act) that all data held about individuals must be protected from unauthorised access. Confidentiality - All network data must be kept confidential. This can be for commercial as well as security reasons. Data Integrity - All network data must be secure from corruption, data loss and has to be correct and up to date. Availability - All network data must be available to authorised users only, but on demand! Network security systems have to be effective but must also allow immediate authorised user access to data.

McLean HIGHER COMPUTER NETWORKING What You Should Know About Passive & Active Attacks Threats to network security are classified as Passive or Active Attacks. 1 Passive Attacks A passive attack is an attempt to intercept and copy network data. Hackers use programs to monitor the transmission of data travelling on the network, thus threatening the confidentiality of the data. Passive attacks often go unnoticed by authorised network users. The best method of defence against passive attacks is encryption.

McLean HIGHER COMPUTER NETWORKING What You Should Know About Passive & Active Attacks 2 Active Attacks An active attack is an attempt to damage or destroy network data. Hackers often modify the data stream of the network by diverting data through a computer system which corrupts the data before sending it on to it’s original destination. A similar method can be used which uses false data streams i.e. the data is diverted to a computer which replaces it with false data which is then sent on to the destination computer.