Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Sixth Edition by William Stallings.
Prof. Giovambattista Ianni  10 ECTS (5 Theory + 5 Lab.)  Suggested material:  W. Stallings, Cryptography and Network Security  W. Stallings,
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
1 Network Security Ola Flygt Växjö University
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 1: Overview.
Lecture 1: Overview modified from slides of Lawrie Brown.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Editied by R. Newman.
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Network Security Essentials Chapter 1
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Copyright © 2013 – Curt Hill Computer Security An Overview.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Computer Security (CS4800)
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
COMPUTER SECURITY COMP424 1 ST LECTURE OVERVIEW AND TERMINOLOGIES Dr. Sarah Mustafa Eljack
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Network Security Overview
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
CS457 Introduction to Information Security Systems
Data & Network Security
Information System and Network Security
Network Security Essentials
Introduction The combination of space, time, and strength that must be considered as the basic elements of this theory of defense makes this a fairly complicated.
Data & Network Security
Network Security Overview
CNET334 - Network Security
Network Security Essentials
Cryptography and Network Security Overview & Chapter 1
NET 311 Information Security
Computer and Network Security
Lecture 1: Foundation of Network Security
Cryptography and Network Security Overview & Chapter 1
Another perspective on Network Security
Network Security Ola Flygt Växjö University
Introduction to Cryptography
The OSI Security Architecture
Definition Of Computer Security
Presentation transcript:

Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1

 Computer Security Concepts  The OSI Security Architecture  Security Attacks  Security Services  Security Mechanisms 2

 Open Systems Interconnection (OSI) security architecture: systematic framework defines security attacks, mechanisms, and services  Security attacks: 1. Passive attacks (unauthorized reading of a message of file and traffic analysis) 2. Active attacks (modification of messages or files, and denial of service) 3

 Security mechanism: any process (or a device incorporating such a process) designed to detect, prevent, or recover from a security attack  Examples 1. Encryption Algorithm 2. Digital Signature 4

 Security services: 1. Authentication 2. Access control 3. Data confidentiality 4. Data integrity 5. Nonrepudiation 6. Availability 5

 NIST defines the term computer security Computer Security The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications) 6 NIST: National Institute of Standards and Technology is a U.S. federal agency that deals with measurement science, standards, and technology related to U.S. government

NIST standard FIPS 199 lists:  Confidentiality 1. Data confidentiality 2. Privacy  Integrity 1. Data integrity 2. System integrity  Availability: Assures that service is not denied to authorized users 7 FIPS 199: Standards for Security Categorization of Federal Information and Information Systems

Security Requirements Triad 8

 Authenticity  Accountability 9

10 Confidentiality Authenticity Accountability Integrity Availability

 Low: loss of confidentiality, integrity, or availability might cause i. minor damage to organizational assets ii. minor financial loss iii. minor harm to individuals  Moderate: loss of confidentiality, integrity, or availability might cause i. significant damage to organizational assets ii. significant financial loss iii. significant harm to individuals 11 FIPS PUB 199 standards: Levels of impact on organizations or individuals

 High: loss of confidentiality, integrity, or availability might cause i. major damage to organizational assets ii. major financial loss iii. major harm to individuals 12

OSI Security AttackSecurity MechanismSecurity Service 13 OSI: Open System Interconnection ITU-T: International Telecommunication Union (ITU) Telecommunication Standardization Sector is a United Nations-sponsored agency that develops standards, called Recommendations, relating to telecommunications and to OSI

What is difference between Threat and Attack? 14 RFC 2828: Internet Security Glossary  Threat: A potential for violation of security, is a possible danger that exploit a vulnerability  Attack: An assault on system from an intelligent threat

15