Download presentation
Presentation is loading. Please wait.
1
Network Security Introduction
William Stallings Network Security
2
Index Network Security
3
Definitions information security computer security network security
Security of your information or data computer security Protect data in local time-shared computers network security protect data during their transmission Network Security
4
THE OSI Security Architecture
ITU-T2 Recommendation X.800, Security Architecture for OSI Security attack: Any action compromises security of information owned by an organization. Security mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. . Security service: A service that enhances the security of the data processing systems and the information transfers of an organization. they make use of one or more security mechanisms Network Security
5
THE OSI Security Architecture
Vulnerability نقطه ضعف امنیتی Threat تهدید امنیتی Attack حمله Network Security
6
Security Attacks passive attacks active attacks
attempts to learn or make use of information from the system but does not affect system resources. active attacks attempts to alter system resources or affect their operation Network Security
7
Security Attacks Passive Attacks
release of message contents Listening to telephone conversation, sniffing file transferring Traffic analysis Traffics are encrypted , but guess content of message based on identity of peers , frequency of messages or length of messages Passive attacks are very difficult to detect However, it is feasible to prevent the success of these attacks, usually by means of encryption Network Security
8
Security Attacks Passive Attacks
Network Security
9
Security Attacks Passive Attacks
Network Security
10
Security Attacks Active Attacks
Masquerade one entity pretends to be a different entity to escalate privileges Replay passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect Modification of messages some portion of a Legitimate message is altered messages are delayed or reordered, to produce an unauthorized effect denial of service prevents or inhibits the normal use of a service in specific target or communications facilities usually through overloading Active attacks are very difficult to Prevent However, it is feasible to Detect the success of these attacks, usually by means of Monitoring Network Security
11
Security Attacks Active Attacks
Network Security
12
Security Attacks Active Attacks
Network Security
13
Security Attacks Active Attacks
Network Security
14
Security Attacks Active Attacks
Network Security
15
Security Services Authentication Access Control Data Confidentiality
Peer entity authentication Data origin authentication Access Control Data Confidentiality Data Integrity Non repudiation Availability Service Network Security
16
Security Services Authentication
Peer entity authentication: Authenticate identity of a peer entity at the establishment of a connection at times during the data transfer Applicable in connection-oriented services Prevent masquerade and unauthorized replay Data origin authentication: Authenticate the source of a data unit Applicable in connection-less services like does not provide protection against duplication or modification of data units Network Security
17
Security Services Access Control
control the access to host systems and applications via communications links Access is based on Authentication Network Security
18
Security Services Data Confidentiality
protection of transmitted data from passive attacks Protection of service messages protection of traffic flow from analysis Attacker not be able to observe the source and destination, frequency, length, or other characteristics of the traffic Network Security
19
Security Services Data Confidentiality
Network Security
20
Security Services Data Integrity
connection-oriented integrity service: assures that messages are received as sent, with no duplication, insertion, modification, reordering, or replays addresses both message stream modification and denial of service a connectionless integrity service: provides protection against message modification only Network Security
21
Security Services Data Integrity
Network Security
22
Security Services Nonrepudiation
prevents either sender or receiver from denying a transmitted message. receiver can prove that alleged sender sent the message (source Nonrepudation) sender can prove that alleged receiver received the message (destination Nonrepudation) Network Security
23
Security Services Availability Service
system is available if it provides services according to the system design whenever users request them addresses the security concerns raised by denial-of-service attacks Network Security
24
Attacks and Security Services
Network Security
25
Security Mechanism Incorporated in protocol layer
Network Security
26
Security Mechanism not specific to any protocol layer
Network Security
27
Security Mechanism and Services
Network Security
28
Security Models Network Security Model (Part2 of the Book)
Confidentiality, Authentication, Data Integrity, Nonrepudation, Avavilability Services Network Access Security Model (Part3 of the Book) Access Control Service Information access threats Service threats Network Security
29
Network Security Model
Encrypted and signed message is transfered Network Security
30
Network Security Model
1. security-related algorithm (encryption, Authentication and integrity) 2. secret information used with the algorithm 3. methods for distribution of secret information 4. protocol to be used by the two principals (parties) , makes use of the security algorithm and the secret information to achieve a particular security service Network Security
31
Network Access Security Model
Network Security
32
Network Access Security Model
Gatekeeper Function password-based login and Resource Access detect and reject worms, viruses, and other similar attacks. Internal controls monitor activity and analyze stored information in an attempt to detect the presence of unwanted intruders Network Security
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.