Download presentation
Presentation is loading. Please wait.
Published byJoy Alison Lucas Modified over 8 years ago
1
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High
2
2 Outline Background Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork Security Internet standards and RFCs
3
3 Background Information Security requirements have changed in recent times Traditionally provided by physical and administrative mechanisms Many daily activities have been shifted from physical world to cyber space Use of computers Protect files and other stored information Use of networks and communications links Protect data during transmission The focus of many funding agencies in US DOD, NSF, DHS, etc. ONR: game theory for cyber security
4
4 Definitions Computer Security Generic name for the collection of tools designed to protect data and to thwart hackers Network Security Measures to protect data during their transmission Internet Security (our focus!) Measures to protect data during their transmission over a collection of interconnected networks
5
5 Security Trends
6
6 OSI Security Architecture ITU-T X.800 “Security Architecture for OSI” A systematic way of defining and providing security requirements Provides a useful, if abstract, overview of concepts we will study ITU-T: International Telecommunication Union Telecommunication Standardization Sector OSI: Open Systems Interconnection
7
7 3 Aspects of Info Security Security Attack Any action that compromises the security of information. Security Mechanism A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service A service that enhances the security of data processing systems and information transfers. Makes use of one or more security mechanisms.
8
8 Security Attacks Threat & attack Often used equivalently There are a wide range of attacks Two generic types of attacks Passive Active
9
9 Security Attack Classification
10
10 Security Attacks Interruption: This is an attack on availability Interception: This is an attack on confidentiality Modification: This is an attack on integrity Fabrication: This is an attack on authenticity
11
11 3 Primary Security Goals Integrity Confidentiality Availability
12
12
13
13 Security Services X.800 A service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers Confidentiality (privacy) Authentication (who created or sent the data) Integrity (has not been altered) Non-repudiation (the order is final) Access control (prevent misuse of resources) Availability (permanence, non-erasure) Denial of Service Attacks Virus that deletes files
14
14 Security Mechanism Features designed to detect, prevent, or recover from a security attack No single mechanism that will support all services required One particular element underlies many of the security mechanisms in use: Cryptographic techniques Hence we will focus on this topic first
15
15 Security Mechanisms (X.800) Specific security mechanisms: Encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization Pervasive security mechanisms: Trusted functionality, security labels, event detection, security audit trails, security recovery
16
16 Model for Network Security
17
17 Model for Network Security Using this model requires us to: 1. design a suitable algorithm for the security transformation 2. generate the secret information (keys) used by the algorithm 3. develop methods to distribute and share the secret information 4. specify a protocol enabling the principals to use the transformation and secret information for a security service
18
18 Model for Network Access Security
19
19 Model for Network Access Security Using this model requires us to implement: 1. Authentication select appropriate gatekeeper functions to identify users 2. Authorization implement security controls to ensure only authorized users access designated information or resources Trusted computer systems may be useful to help implement this model
20
20 Methods of Defense Encryption Software Controls Access limitations in a data base or in operating system Protect each user from other users Hardware Controls Smartcard (ICC, used for digital signature and secure identification) Policies Frequent changes of passwords Physical Controls
21
21 Internet standards and RFCs Three organizations in the Internet society Internet Architecture Board (IAB) Defining overall Internet architecture Providing guidance to IETF Internet Engineering Task Force (IETF) Actual development of protocols and standards Internet Engineering Steering Group (IESG) Technical management of IETF activities and Internet standards process
22
22 Internet RFC Publication Standardization Process
23
23 Recommended Reading Pfleeger, C. Security in Computing. Prentice Hall, 1997. Mel, H.X. Baker, D. Cryptography Decrypted. Addison Wesley, 2001.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.