Want to make creations as awesome as this one?

No description


Network Security


What is Network Security

Network Security


Network security is any activity designed to protect the usability and integrity of your network and data.. It includes both hardware and software technologies . It targets a variety of threats . It stops them from entering or spreading on your network . Effective network security manages access to the network


.Confidentiality . Data confidentiality . Privacy .Integrity . Data integrity . System integrity . Availability. Additional concepts . Authenticity . Accountability


Lorem ipsum dolor sit amet consectetur adipiscing elit congue curae ac volutpat, parturient taciti ridiculus varius ad dignissim cursus euismod habitasse himenaeos.


confidentiality – student grades integrity – patient information availability – authentication service

Examples of Security Requirements

Lorem ipsum dolor sit amet consectetur adipiscing elit congue curae ac volutpat, parturient taciti ridiculus varius ad dignissim cursus euismod habitasse himenaeos.

3 levels of impact from a security breach.Low Moderate High

levels of impact from a security breach.

Security Challenges

Not simpleMust consider potential attacks Procedures used counter-intuitive Involve algorithms and secret info

Must decide where to deploy mechanisms Battle of wits between attacker / admin not perceived on benefit until fails

Requires regular monitoring Too often an after-thought Considered as hindrance to using system

Aspects of Security

3 aspects of information security:Security attackSecurity mechanism: detect, prevent, recoverSecurity service

Passive Attacks (1)Release of Message Contents

Passive Attacks (2)Traffic Analysis

Active Attacks (1)Masquerade

Active Attacks (2)Replay

Active Attacks (3)Modification of Messages

Enhance security of data processing systems and information transfers of an organization Planned to counter security attacks Using one or more security mechanisms

Security Service

X.800: “a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers”

Security Service

Authentication - assurance that communicating entity is the one claimed have both peer-entity & data origin authentication Access Control - prevention of the unauthorized use of a resource Data Confidentiality –protection of data from unauthorized disclosure Data Integrity - assurance that data received is as sent by an authorized entity Availability – resource accessible/usable

Security Service X.800:

feature designed to detect, prevent, or recover from a security attack no single mechanism that will support all services required however one particular element underlies many of the security mechanisms in use: cryptographic techniques hence our focus on this topic

Security Mechanism

specific security mechanisms: encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization pervasive security mechanisms: trusted functionality, security labels, event detection, security audit trails, security recovery

Security Mechanisms (X.800)

Security Mechanism

Using this model requires us to:design a suitable algorithm for the security transformation generate the secret information (keys) used by the algorithm develop methods to distribute and share the secret information specify a protocol enabling the principals to use the transformation and secret information for a security service

Model for Network Security

Using this model requires us to: select appropriate gatekeeper functions to identify users implement security controls to ensure only authorised users access designated information or resources

Model for Network Security