Download presentation
Presentation is loading. Please wait.
1
Saad Haj Bakry, PhD, CEng, FIEE 1 Security Challenges and Protection Measures Saad Haj Bakry, PhD, CEng, FIEE P RESENTATIONS IN N ETWORK S ECURITY
2
Saad Haj Bakry, PhD, CEng, FIEE 2 Security Profile Security Problems Security Challenges Security Protection Risk / Cost Balance. Objectives / Contents Security Challenges & Protection Measures
3
Saad Haj Bakry, PhD, CEng, FIEE 3 Security Profile T PO Technology Organization People Environment Challenges Accidental Malicious Protection Technical Administrative Problems Sources of Challenges and Protection Measures Target of Protection Solutions: Cost / Balance Information Security Challenges & Protection Measures
4
Saad Haj Bakry, PhD, CEng, FIEE 4 Security Profile: Basic Levels The Internet Level: World Wide Users The Extranet Level: Partners / Suppliers / Customers The Intranet Level: Intra-organization Uses The Personal Level Security Security Challenges & Protection Measures
5
Saad Haj Bakry, PhD, CEng, FIEE 5 Security Profile: Sublevels System Level: Banking Services Level: Account Management Application Level: Stock Market Transaction Level: Buying Security Security Challenges & Protection Measures
6
Saad Haj Bakry, PhD, CEng, FIEE 6 ProblemDescription Accessibility Who access: system / service. Availability System / service readiness. Reliability Identity / repudiation / legal information Integrity Alteration / loss of information (&SW) Confidentiality Disclosure of private information. Trust Disaster recovery. “Cost” “Challenges” versus “Protection” Security Problems Security Challenges & Protection Measures
7
Saad Haj Bakry, PhD, CEng, FIEE 7 Challenge Generation: : Internal / External Deliberate (Hackers) Non-DeliberateAccidental Financial Gain Espionage: Industrial / Political Anarchy Culture/ Ideology Learning Acceptance / Respect Curiosity / Thrill Ignorance Work (Professional) Environment Challenges: People / Organization (1) Security Challenges & Protection Measures
8
Saad Haj Bakry, PhD, CEng, FIEE 8 ChallengeProblem TheftVarious problems Illegal AccessAccessibility Copy RightsReliability NoiseAvailability / Integrity VirusesAvailability / Reliability / Integrity / Trust Cryptanalysis Confidentiality / Integrity Repudiation / Illegal Information (Webs): Reliability DestructionTrust Challenges: People / Organization (2) Security Challenges & Protection Measures
9
Saad Haj Bakry, PhD, CEng, FIEE 9 Challenges: Environment ChallengeProblem Natural NoiseIntegrity Power FailureAvailability DisasterTrust Work Regulations (Cyber Crimes)Various Problems Management Policy Practice Security Challenges & Protection Measures
10
Saad Haj Bakry, PhD, CEng, FIEE 10 ChallengeProblem Design Logical Deficiencies Availability & other Problems Protocol (SW) Un-robustness: Failure Tolerance ManagementFault / Performance Management Challenges: Technology Security Challenges & Protection Measures
11
Saad Haj Bakry, PhD, CEng, FIEE 11 Protection ToolsProblem Access Systems: System Management User Number (Public) Accessibility: Different Levels Passwords (Private) Biometric Measures Anti-Virus Systems Detecting / Cleaning Viruses Availability / Integrity / Trust Firewalls Illegal Information & Confidential Information Reliability / Confidentiality Traffic Padding Control of Traffic VolumeConfidentiality Quality Systems Design / Fault ToleranceAvailability Standby Systems Disaster RecoveryTrust Protection: Technology (1) Security Challenges & Protection Measures
12
Saad Haj Bakry, PhD, CEng, FIEE 12 CryptographyProblem Symmetric Secrete Key / Public-Private Keys Confidentiality Management: Key Distribution / Key Agreement Hash Function: Message Testing Integrity Digital Signature: Authentication of Identity Reliability Time-Stamping: Non-Repudiation (Proof of Transaction) Public Key Infrastructure: Digital Certificates Security Protocols: Applications Protection: Technology (2) Security Challenges & Protection Measures
13
Saad Haj Bakry, PhD, CEng, FIEE 13 IssueMeasureProblem People Access Rights: Selection Accessibility Availability Reliability Integrity Confidentiality Trust “Cost” Awareness: Users / Staff Practice: Behaviour Environment International / National: Cyber-Crime Rules Private: Regulations Organization Security Policy: Vision Management: Operation Protection: People / Organization / Environment Security Challenges & Protection Measures
14
Saad Haj Bakry, PhD, CEng, FIEE 14 Cost Issues IssueFact Virus Damage The damage of the “I Love Virus” (May 2000) was estimated to be “$ 10-15 billion” with the majority of the damage done in the first few hours. (The virus destroyed files and sent itself to others through MS Outlook Address Book) Spending on Data Security Estimated by “IDC” (International Data Corporation). “$ 6.2 billion” (1999) / “$ 14.8 billion” (2003) Building a “Digital Certificate Infrastructure” Estimated by “Identrus” ( Consortium of Global Financial Companies) for financial organizations to provide trusted B-to-B e-Commerce. “$ 5 – 10 million” Security Challenges & Protection Measures
15
Saad Haj Bakry, PhD, CEng, FIEE 15 Balance: Risk (loss) v. Cost (security) Balance Risk Cost Security Challenges & Protection Measures
16
Saad Haj Bakry, PhD, CEng, FIEE 16 Profile: Basic Factors: Technology / Organization / People / Environment Levels: User / Intranet / Extranet / Internet Sublevels: Application / Service / System Security Problems: Challenges versus Protection Problems: Accessibility / Availability / Reliability / Integrity / Confidentiality / Trust / “Cost” Challenges (Organization / People) : Theft / Illegal Access / Copy Rights / Noise / Viruses / Cryptanalysis / Repudiation / Illegal Information / Destruction Remarks (1) Security Challenges & Protection Measures
17
Saad Haj Bakry, PhD, CEng, FIEE 17 Challenges (Environment) : Natural / Professional Challenges (Technology) : Design / Management Protection (Technology) : Access / Anti-Virus / Firewalls / Traffic Padding / Quality Systems / Standby Systems / Cryptography Services. Protection (People) : Access / Awareness / Practice Protection (Environment) : Cyber crime / Regulations Protection (Organization) : Policy / Management Cost : Risk (Loss) versus Security (Cost. Remarks (2) Security Challenges & Protection Measures
18
Saad Haj Bakry, PhD, CEng, FIEE 18 References L.A. Worbel, Disaster Recovery Planning for Telecommunications, Artech House (US), 1990. Telecommunications Management: Network Security, The National Computing Centre Limited, UK, 1992. D.Minoli, Telecommunications Technology Handbook, Artech House(US), 1991. F. Botto, Dictionary of e-Business, Wiley (UK), 2000. H.M. Deitel, P.J. Deitel, K. Steinbuhler, e-Business and e-Commerce for Managers, Prentice-Hall (USA), 2001 S.H. Bakry, F.H. Bakry, “Identifying information network profiles for planning management”, International Journal of Network Management, Vol. 10, No. 6, Nov. / Dec. 2000, pp.313-322. Security Challenges & Protection Measures
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.