Download presentation
Presentation is loading. Please wait.
Published bySamuel Jacobs Modified over 9 years ago
1
1 Network Security Ola Flygt Växjö University http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49
2
2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defence Models for Internetwork Security Internet standards and RFCs
3
3 Security “When we know our surroundings and have tools to protect ourselves, we can feel more secure.” “It makes me feel secure to be around my dog. He will always warn me if something is wrong.” “Knowing someone is looking out for me is what security means to me.” “If we did not have security, our world would be a very bad place.” (“What Security Means To Me” essays at www.panasonic.com/security.)
4
4 Information Security
5
5 The Security Landscape IT realm Physical realm Airport Food security, etc. Political realm International etc. Monetary realm Financial, etc.
6
6 The IT Security Landscape Computing security Data security Application security Information security Network security
7
7 Attacks, Services and Mechanisms Security Attack: Any action that compromises the security of information. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack.
8
8 Security Attacks
9
9 Interruption: This is an attack on availability Interception: This is an attack on confidentiality Modification: This is an attack on integrity Fabrication: This is an attack on authenticity
10
10 Security Goals Integrity Confidentiality Availability
11
11 Threats and Attacks Threat: A potential for violation of security, which exists when there is a circumstance, capability,action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability. Attack: An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system.
12
12
13
13 Security Services (X.800) Confidentiality (privacy) Authentication (who created or sent the data) Integrity (has not been altered) Non-repudiation (you can not deny sending or receiving some information) Access control (prevent misuse of resources) Availability (permanence, non-erasure) Denial of Service Attacks Virus that deletes files
14
14 Security Service vs Attack
15
15 Security Mechanisms (X.800) Encipherment Digital Signature Access Control Authentication Exchange Traffic Padding And more…..
16
16 Service vs Mechanisms
17
17
18
18
19
19 Methods of Defence Encryption Software Controls (access limitations in a data base, in operating system protect each user from other users) Hardware Controls (smartcard) Policies (frequent changes of passwords) Physical Controls
20
20 Internet standards and RFCs The Internet society Internet Architecture Board (IAB) Internet Engineering Task Force (IETF) Internet Engineering Steering Group (IESG)
21
21 Internet RFC Publication Process
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.