Project
mohsin.riaz
Created on January 23, 2021
More creations to inspire you
THE MESOZOIC ERA
Presentation
GROWTH MINDSET
Presentation
VISUAL COMMUNICATION AND STORYTELLING
Presentation
ASTL
Presentation
TOM DOLAN
Presentation
BASIL RESTAURANT PRESENTATION
Presentation
AC/DC
Presentation
Transcript
START
Network Security
What is Network Security
Network security is any activity designed to protect the usability and integrity of your network and data. . It includes both hardware and software technologies . It targets a variety of threats . It stops them from entering or spreading on your network . Effective network security manages access to the network
index
Network Security
Objectives
. Confidentiality . Data confidentiality . Privacy . Integrity . Data integrity . System integrity . Availability. Additional concepts . Authenticity . Accountability
+info
Examples of Security Requirements
confidentiality – student grades integrity – patient information availability – authentication service
+info
levels of impact from a security breach.
3 levels of impact from a security breach.Low Moderate High
Requires regular monitoring Too often an after-thought Considered as hindrance to using system
Must decide where to deploy mechanisms Battle of wits between attacker / admin not perceived on benefit until fails
Not simpleMust consider potential attacks Procedures used counter-intuitive Involve algorithms and secret info
Security Challenges
3 aspects of information security: Security attack Security mechanism: detect, prevent, recover Security service
Aspects of Security
Passive Attacks (2)Traffic Analysis
Passive Attacks (1)Release of Message Contents
Active Attacks (3) Modification of Messages
Active Attacks (2) Replay
Active Attacks (1) Masquerade
Security Service
Enhance security of data processing systems and information transfers of an organization Planned to counter security attacks Using one or more security mechanisms
Security Service
X.800: “a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers”
Security Service X.800:
- Authentication - assurance that communicating entity is the one claimed
- have both peer-entity & data origin authentication
- Access Control - prevention of the unauthorized use of a resource
- Data Confidentiality –protection of data from unauthorized disclosure
- Data Integrity - assurance that data received is as sent by an authorized entity
- Availability – resource accessible/usable
Security Mechanism
Security Mechanisms (X.800)
- specific security mechanisms:
- encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization
- pervasive security mechanisms:
- trusted functionality, security labels, event detection, security audit trails, security recovery
Security Mechanism
- feature designed to detect, prevent, or recover from a security attack
- no single mechanism that will support all services required
- however one particular element underlies many of the security mechanisms in use:
- cryptographic techniques
- hence our focus on this topic
Model for Network Security
Using this model requires us to: design a suitable algorithm for the security transformation generate the secret information (keys) used by the algorithm develop methods to distribute and share the secret information specify a protocol enabling the principals to use the transformation and secret information for a security service
Model for Network Security
Using this model requires us to: select appropriate gatekeeper functions to identify users implement security controls to ensure only authorised users access designated information or resources
THANKS