Download presentation
Presentation is loading. Please wait.
1
Chapter 10 Advanced Topics (2)
Chapter Objectives: Communications Security To understand the weaknesses of the Internet/WWW, conventional encryption and public key encryption, the misconception people have of public key encryption To understand what a firewall is, the factors to take into consideration when designing firewalls, and the UNIX/Internet security architecture and password management
2
Chapter 10 Advanced Topics (2)
Chapter Objectives: Project Management To understand the importance and function of a project manager, the different project team structures and the major activities in project management
3
Communications Security
The Internet and WWW vulnerabilities Proliferation and use of Internet Internet & WWW Need for Internet security management Internet worm Breach in credit files Illegal access
4
Data Encryption Two Techniques: Conventional Encryption
1. Original message is known as plaintext 2. Apply encryption and key to get ciphertext 3. Transmission to the recipient 4. Decryption ciphertext with key IM218
5
Security of conventional encryption depends on certain factors:
Resist brute force Maintain secrecy of the key
6
Public Key Encryption 1. Generates encryption and decryption keys
2.Public key is made available, companion key is kept private 3.A encrypts plaintext using B’s public key 4.B decrypts message with it’s private key
7
Conventional Encryption versus Public Key Encryption
Public key encryption is NOT more secured than conventional encryption Public key encryption is NOT a general purpose technique Key distribution in public key system is as complicated
8
Fundamental Encryption Principles
Incorporate redundancy in encrypted messages Prevent intruders from playing back old messages
9
Firewalls A firewall is a mechanism to protect one network from another by preventing unauthorised users from accessing computing resources on a private network Design considerations for firewalls: Trade off between security and ease of use Restating conditions for design Prohibit activities that are not expressly permitted Permit activities that are not expressly prohibited
10
Internet Security Architecture
Layer Name Functional Description 7 Policy Policy definition and directives 6 Personnel People who use the equipment and data 5 Local Area Computer equipment Network and data assets 4 Internal Concentrator-internal demarcation connect 3 Embedded OSI functions- UNIX gateway Layers 7,6,5,4 2 Packet filtering OSI functions- Layers 3,2,1 1 External Public access- demarcation external connect
11
Layer 7 Layer 6 Defines the entire security program
The people in contact with the network
12
Password Management 1 Try using the user’s name, initials, account names and other relevant personal information as passwords 2 Try using words from various dictionaries, including names of people and places 3 Try using permutations of the words in step 2, including various combinations of cases, reversing the order and embedding numbers into the word 4 Try foreign words that are commonly used. This is especially relevant for foreign users 5 Try word pairs
13
Approaches to Password Management
Using password checker Forcing periodic change of passwords Assign passwords Use physical devices Proactive checking
14
Project Management The Project Manager
Qualities of ideal project manager Technical competency Ability to lead Effective planner Ability to control Sensitivity to the environment
15
Duties of the project manager
Work with the steering committee Communicate with the users Planning and staff the project Monitor & report project progress Adjust to changes
16
Project management activities
Project teams Hierarchical team Chief programmer team Adaptive team Project management activities Estimating Organising Controlling
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.