Lesson 4: Introduction to network security

Similar documents
Information Security

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

COSC 472 Network Security

IY2760/CS3760: Part 6. IY2760: Part 6

Chap. 1: Introduction

Cryptography and Network Security

Information Security Basic Concepts

Introduction to Security

Content Teaching Academy at James Madison University

Cryptography and Network Security Chapter 1

Information System Security

Notes on Network Security - Introduction

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 7: Network security

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Compter Networks Chapter 9: Network Security

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Authentication requirement Authentication function MAC Hash function Security of

ISM/ISC Middleware Module

Cryptography and Network Security Chapter 11. Fourth Edition by William Stallings

Study of Security Issues on Traditional and New Generation of E-commerce Model

Public Key Infrastructure (PKI)

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

E-COMMERCE and SECURITY - 1DL018

Data Storage Security in Cloud Computing

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

CPSC 467: Cryptography and Computer Security

SECURITY IN NETWORKS

Network Security. HIT Shimrit Tzur-David

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

544 Computer and Network Security

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Overview of computer and communications security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Network Security. Network Security Hierarchy. CISCO Security Curriculum

CSE 5392 Sensor Network Security

Is your data safe out there? -A white Paper on Online Security

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Telecommunication security. Framework of security technologies for home network

What is network security?

Network Security - ISA 656 Security

SHORT MESSAGE SERVICE SECURITY

CSCI 4541/6541: NETWORK SECURITY

Cryptography & Network Security

VoteID 2011 Internet Voting System with Cast as Intended Verification

7 Key Management and PKIs

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

Chapter 15: Security

Network Security. A Quick Overview. Joshua Hill josh-web@untruth.org

Brainloop Cloud Security

EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course

Security Goals Services

Principles of Network Security

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. March 19, 2015

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

TELECOMMUNICATION NETWORKS

Künftige Cyber-Attacken: Risiken und Techniken. Future Cyber attacks: Risks and techniques. Prof. Dr. T. Nouri sd&m

Chapter 10. Network Security

Table: Security Services (X.800)

cipher: the algorithm or function used for encryption and decryption

Client Server Registration Protocol

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Third Party Security Requirements Policy

Passing PCI Compliance How to Address the Application Security Mandates

Chapter 18: System Security

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Network Security: Introduction

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

CSE/EE 461 Lecture 23

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Cryptography and network security CNET4523

Why you need secure

TELE 301 Network Management. Lecture 18: Network Security

Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Transcription:

Lesson 4: Introduction to network security Dr. Justo Carracedo Gallardo carracedo@diatel.upm.es Technical University of Madrid University Professor at the Telecommunication School (EUITT)

What is Network Security? (I) A group of techniques that try to minimize the vulnerability of the systems or the information contained within them. The aim is to make it more expensive to break security measures than the value of what is being protected. Total security doesn t exist: any protection measure is subject to being broken. 2

What is Network Security? (II) Today s security technologies offer computer networks a much higher protection than the one available in the real world for the exchange of paper documents. Digital Signature Cipher the hash code with the private key Attach the signature to the data Hash Function 101100110101 111101101110 Hash Code Digital Signature Data Signed Data 3

How to Protect Networks: Mechanisms, Protocols and Security Services (I) Security mechanisms are used to build the security protocols which allow security services to be provided. Security mechanisms are shields that thanks to security services protect the communication between users from the different attacks. 4

How to Protect Networks: Mechanisms, Protocols and Security Services (II) Mechanisms => Protocol => Service Security mechanisms are based mainly on cryptographic techniques. Therefore, most of them are cryptographic mechanisms. The base on which security services are created is cryptography. Security services Protocol services Security mechanisms Cryptographic mechanisms What s important to the end user are the services! 5

How to Protect Networks: Mechanisms, Protocols and Security Services (III) A security protocol is: a group of rules and formats that determine the exchange of pieces of information two or more entities intervene in the process it is designed so that certain Security Services are provided to the users Petition Answer Server 6

How to Protect Networks: Mechanisms, Protocols and Security Services (IV) Security services protect the communication between users from different types of attacks: Attacks to the identity of entities Identity interception Identity theft (masquerade) Attacks to services Denial of service (DoS) Attacks to information Data revelation Data forwarding Data manipulation Repudiation of sent or received data 7

Important Security Services (I) Entity authentication Data confidentiality Data integrity Access control Non-repudiation Availability Anonymity 8

Important Security Services (II) Authentication This service guarantees that the communicating entity is who it claims to be. Data confidentiality Provides data protection to avoid them being revealed accidently or on purpose to an unauthorised person. Data integrity This service guarantees the receiver that the data they receive is exactly the same as the data that was sent. It detects when something has been added, deleted or changed. 9

Important Security Services (III) Access Control To avoid an unauthorised use of the network s resources. Who can do what? Availability The property of a system or resource to be accessible and useable by the authorised entities. Anonymity Hides a person s identity when performing an online operation: Suggestions or claims Polls Electronic vote Electronic money 10

Important Security Services (IV) Non-repudiation With proof of origin The receiver of the message obtains demonstrable proof of the origin of the received data. With proof of sending The receiver or the sender of the message obtains demonstrable proof of the date and time that it is sent. With proof of delivery The sender of the message obtains proof, demonstrable to third parties, of the delivery of the data to the correct receiver. 11

Attackers... Hacker/Cracker Knowing your enemy There are several ways to classify attackers: by their knowledge, by their intentions, by the damage they cause, etc. Definition of hacker and cracker (jargon dictionary) Hacker: a person specialised in a topic who enjoys exploring it for the sake of learning and overcoming barriers. Applied to IT, the term refers to a person whose ability to understand computer systems, their design and programming, allows them to master the systems for a particular use. Cracker: applied to IT, a person who breaks into a computer system changing or damaging some type of information or element. Their motivation is usually a financial gain. 12

Security Policies The best way to protect a computer network is to define clear action policies (security policies) and to raise computer security awareness. Humans are usually the weakest link, so it is important to learn how to avoid failures derived from social engineering: an attacker s ability to manipulate people into performing actions for their gain and, therefore, infringing upon the defined protection measures. 13

Contact: info@intypedia.com