Want to make creations as awesome as this one?

Transcript

START

Network Security

What is Network Security

Network security is any activity designed to protect the usability and integrity of your network and data. . It includes both hardware and software technologies . It targets a variety of threats . It stops them from entering or spreading on your network . Effective network security manages access to the network

index

Network Security

Objectives

. Confidentiality . Data confidentiality . Privacy . Integrity . Data integrity . System integrity . Availability. Additional concepts . Authenticity . Accountability

+info

Examples of Security Requirements

confidentiality – student grades integrity – patient information availability – authentication service

+info

levels of impact from a security breach.

3 levels of impact from a security breach.Low Moderate High

Requires regular monitoring Too often an after-thought Considered as hindrance to using system

Must decide where to deploy mechanisms Battle of wits between attacker / admin not perceived on benefit until fails

Not simpleMust consider potential attacks Procedures used counter-intuitive Involve algorithms and secret info

Security Challenges

3 aspects of information security: Security attack Security mechanism: detect, prevent, recover Security service

Aspects of Security

Passive Attacks (2)Traffic Analysis

Passive Attacks (1)Release of Message Contents

Active Attacks (3) Modification of Messages

Active Attacks (2) Replay

Active Attacks (1) Masquerade

Security Service

Enhance security of data processing systems and information transfers of an organization Planned to counter security attacks Using one or more security mechanisms

Security Service

X.800: “a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers”

Security Service X.800:

  • Authentication - assurance that communicating entity is the one claimed
  • have both peer-entity & data origin authentication
  • Access Control - prevention of the unauthorized use of a resource
  • Data Confidentiality –protection of data from unauthorized disclosure
  • Data Integrity - assurance that data received is as sent by an authorized entity
  • Availability – resource accessible/usable

Security Mechanism

Security Mechanisms (X.800)

  • specific security mechanisms:
  • encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization
  • pervasive security mechanisms:
  • trusted functionality, security labels, event detection, security audit trails, security recovery

Security Mechanism

  • feature designed to detect, prevent, or recover from a security attack
  • no single mechanism that will support all services required
  • however one particular element underlies many of the security mechanisms in use:
  • cryptographic techniques
  • hence our focus on this topic

Model for Network Security

Using this model requires us to: design a suitable algorithm for the security transformation generate the secret information (keys) used by the algorithm develop methods to distribute and share the secret information specify a protocol enabling the principals to use the transformation and secret information for a security service

Model for Network Security

Using this model requires us to: select appropriate gatekeeper functions to identify users implement security controls to ensure only authorised users access designated information or resources

THANKS