Download presentation
Presentation is loading. Please wait.
1
Networks and Security A Series of Lectures, Outlining: How Networks affect Security of a system Security of System Security of Network Security of Organisation Secure vs Trustworthy Attack Vulnerabilities Web references and Bibliography Eur Ing Brian C Tompsett University of Hull
2
Networking Principles Revision ISO 7 Layer Model Names and function of layers Layer interconnect terminology
3
Internet Basics Revision IP Addresses (and registrars) 150.237.92.11 192.168.0.1 Domain Names (and registrars) www.dcs.hull.ac.uk on.to / i.am / name.is Services/Sockets http port 80
4
ISO 7 Layer Model Network Datalink Physical Application Presentation Session Transport Network Datalink Physical Application Presentation Session Transport Hub/Repeater Gateway Proxy/Relay NAT/ICS/ Proxy Router Switch/Bridge PTU Frame Datagram Packet Datagram Segment Message IP TCP/UDP HTTP/FTP SMTP PPP/SLIP Ethernet 10BaseT ADSL
5
Internet The Movie Animation covering salient points It has some factual error Can you spot them? First Mention of Firewalls Covered later
7
Summary Overall Networking Architecture Role of Layers & Layer Interface Internet Protocols Network Interconnections Any further revision?
8
2
9
What is it for? What is the purpose of Trustworthy Computing? Computer Security? Information Security?
10
Entities Environment Organisation Infrastructure Activity
11
Data Procedures Activities Infrastructure Organisation
12
Entities Environment Organisation Infrastructure Activities Procedures Data
13
Information Security Model Entities Protection Environment Protection Organisation Protection Infrastructure Protection Activity Protection Procedure level Protection Data Protection
14
Security 7 Layer Model Activity Procedures Data Entities Environment Organisation Infrastructure Activity Procedures Data Entities Environment Organisation Infrastructure Translation Relationship Contract Language Protocol Packet Document Business Contact Information Connection Exchange Gateway Exchange
15
Entities Objects being manipulated by the system Entities can be active or passive Data about entities is being protected Entities can be People, Organisations or Objects Entities themselves encompass other entities – Collection or Containment Security involves: Physical Changes – Commissioning Operational Procedure – What they do Structure – Interrelations
16
Environment The restrictions on entities Can act to limit or constrain security or freedom of action Legislation, Regulation, Ethics Technical Capability, Resource Limitation Compatibility, Standards, Procedures Physical Limitation
17
Organisation The Mechanism by which operations a performed The Organisation within the environment
18
Infrastructure That which enables activities The physical components which may or may not be entities in their own right
19
Activity The tasks which process the data Usually a business activity Could be a software Application
20
Procedure The component steps that enable an activity Can be software components or human procedures
21
Data The actual data about entities The goal of a security breach Protected by Cryptography Integrity
22
Security Models ISO 17799 ISO 27001 – ISO 27000 series SABSA Sherwood Applied Business Security Architecture Based on Zachman IS Framework Financial Security Model
23
SABSA Model
24
Financial Security Model Finance Applications for financial users, issuers of digital value, trading and market operations Value Instruments that carry monetary value Governance Protection of the system from non-technical threats Accounting Value within defined places Rights An authentication concept – moving value between identities Software Engineering Tools to move instructions over the net Cryptography Sharing truths between parties
25
ISO 17799 Security Policy Organisation of Information Security Asset Management Human Resources Security Physical and Environmental Security Communications and Operational Management Access Control Systems Development, Acquisition, Maintenance Security Incident Management Business Continuity Management Compliance
26
ISO 17799
27
Network Security Model Personal Protection Organisation Protection Network Protection System Protection Application Protection Code level Protection Data Protection
28
Person Organisation Infrastructure Systems Application
29
Data Procedure Application Systems Infrastructure
30
Person Organisation Infrastructure Systems Applications Procedures Data
31
Security 7 Layer Model Application Procedures Data Person Organisation Infrastructure Systems Application Procedures Data Person Organisation Infrastructure Systems Translation Relationship Contract Language Protocol Packet Document Business Contact Information Connection Exchange Gateway Exchange
32
Static Dynamic ActivityObject
33
Personal Protection Personal Security Locking Doors, Staying Safe Personal Data Protection Giving out DOB, Credit Card, Family info Securing Access to your Computer Personal Security Policy for all Protect others personal security
34
Organisation Protection Organisation / Institution / Company A Holistic View Corporate Image Make public only what required Hide internal structure & information Window & Door into Organisation Manages Input & Output
35
Doors and Windows Decide What Services are available Web servers, ftp, email Which hosts on which networks Which domains used On which IP nets Hosted by whom What registration information Names, addresses phone numbers
36
WWW Internet FTP SMTP Gateway Inside Outside
37
Network Protection Protect Network as entity/resource Manage permitted traffic flow Manage authorised use Architect the Network - zoning Firewalling
38
Network Architecture Proper use of Subnets and domains Limit traffic to local segments Use Bridges/Switches/Routers/Proxies Prevent data and authority leaks
39
What to Firewall? Certain Protocols – netBios Certain Responses – ping/traceroute Certain Applications Real/IRC Certain Systems/Networks Control Port/Host combinations Email Port/25, HTTP Port/80, FTP Port/21 Rate Limit Denial of Service/Scanners
40
System Protection Protect each system from misuse Incoming & Outgoing! Control Which Services Run http://support.microsoft.com/?kbid=832017 Virus checkers
41
Application Protection Specific Application Configuration Parental Controls of Web Browsers Domain/IP blockers Spam filters Control file/device exports
42
Code Level Protection Writing Secure Code Even on secured system Bad Code compromises security Hence software updates
43
Data Protection Hiding the Data Cryptography Data Transience Data Integrity
44
3
45
Forms of Attack Denial of Service Input Data Attack Spoofing Sniffing Social Engineering
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.