Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file



Similar documents
CS 356 Lecture 28 Internet Authentication. Spring 2013

The Security Framework 4.1 Programming and Design

Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications

Network Security Protocols

Software and Cloud Security

Certificate Management in Ad Hoc Networks

Network Security Course Specifications

Module 7 Security CS655! 7-1!

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

Secure web transactions system

Internet Programming. Security

Cornerstones of Security

SETECS, Inc. SETECS, Inc.

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

Chap. 1: Introduction

Security Digital Certificate Manager

Security: Focus of Control. Authentication

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Overview. SSL Cryptography Overview CHAPTER 1

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

The System for Secure Mobile Payment Transactions. Behzad Pouralinazar. Stockholm, Sweden 2013

Lecture 10: 1. Secure E mail E systems. Systems. Page 1

COSC 472 Network Security

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Security Digital Certificate Manager

Server based signature service. Overview

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Authentication Application

Network Security Essentials Chapter 7

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Chapter 7 Transport-Level Security

Mobile Application for Secure Healthcare System

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Cryptography and Network Security

Snow Agent System Pilot Deployment version

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

Information and Communications Technology Courses at a Glance

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Evaluate the Usability of Security Audits in Electronic Commerce

Communication Security for Applications

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Lecture VII : Public Key Infrastructure (PKI)

Chapter 10. Network Security

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Content Teaching Academy at James Madison University

GlobalSign Enterprise Solutions

Secure Mobile POS System

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

[SMO-SFO-ICO-PE-046-GU-

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Cryptography and Network Security Chapter 14

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Security Goals Services

THE SECURITY ISSUE. Chris J Mitchell

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Cryptography and network security CNET4523

Network Security Essentials Chapter 5

Carillon eshop User s Guide

Properties of Secure Network Communication

Chapter 8. Network Security

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Public Key Applications & Usage A Brief Insight

Chapter 6 Electronic Mail Security

ISM/ISC Middleware Module

Security aspects of e-tailing. Chapter 7

What is network security?

Information Security

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

How To Understand And Understand The Security Of A Key Infrastructure

T Cryptography and Data Security

CRYPTOGRAPHY AS A SERVICE

Oracle Database Security

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

12. Firewalls Content

Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012

CRYPTOGRAPHY IN NETWORK SECURITY

Information Security Basic Concepts

Cryptography and Network Security Chapter 1

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Cryptography and Network Security Chapter 15

ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Controller of Certification Authorities of Mauritius

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Secure System Solution and Security Technology

Site to Site Virtual Private Networks (VPNs):

Transcription:

1 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 1: Introduction to Computer s Security Introduction to Computer s Security 4. security services and mechanisms 3 Approach 4 Introduction to Computer s Security 4. security services and mechanisms 1. Based on the textbook 2. Based on Internet standards (RFCs) 3. Mixture of theoretical overview and practical approach (examples) 4. From basic components towards an integrated global network security system 5. Some advanced aspects 5 DES algorithm in Previous Courses DES algorithm in IV2020 6 IV Input file 8 8 8 8 DES DES DES K K K K DES 8 8 8 8 Output file Page 1 1

7 8 Certificate in Previous Courses Certificate in IV2020 Certificate: Serial number Validity period (from, to) Issuer (CA) Subject () Public key Algorithm ID CA signature 30 82 01 F3 30 82 01 9D -- SEQUENCE 02 01 00 -- Serial Number 30 0D -- Signature Algorithm 06 09 2A 86 48 86 F7 0D 01 01 02 05 00 30 64 31 32 -- Issuer s X.500 DN 30 09 06 03 55 04 06 13 02 73 65 30 25 06 03 55 04 0A... 17 0D -- Time Validity 39 34 30 36 32 32 32 31 39 35 30 36 32 32 32 31... 9 Normal flow of messages 10 Introduction to Computer s Security 4. security services and mechanisms Interruption 11 Interception 12 Page 2 2

Modification 13 Fabrication 14 Classification of threats 15 Additional aspects 16 1. Simple client/server model 2. Mainly communication services 3. Static allocation of code Multi party transactions 17 Application requirements 18 1. Simple client/server model 2. Mainly communication services 3. Static allocation 1. of code Multiple senders 2. Multiple recipients 3. Chained transactions 1. Simple client/server model 2. Mainly communication services 3. Static allocation 1. of code Non repudiation 2. e Commerce services 3. Privacy Page 3 3

19 20 Mobile agents security 1. Simple client/server model 2. Mainly communication services 3. Static allocation 1. of code Mobile agents security 2. Applets security 3. Small footprint code Introduction to Computer s Security 4. security services and mechanisms OSI Security Services 21 Additional Services 22 1. Authentication 2. Access control 3. Data confidentiality 4. Data integrity 5. Non - repudiation 1. Availability 2. Authorization 3. Registration (directory) 4. Security management 5. Mobile agents security Security Architecture 23 Not covered 24 1. Key exchange protocols 2. Security platform and APIs 3. Documents encapsulation 4. Integration 5. Smart cards 1. Secure payment transactions 2. Distributed system security 3. Verification and evaluation 4. Java security 5. Generic security objects Page 4 4

25 Simple client/server model 26 Introduction to Computer s Security 4. security services and mechanisms Trusted third party 27 Communication / socket level security 28 Unprotected Protected Unprotected Applications/document level security 29 Smart cards: level security 30 Page 5 5

Additional features 31 Trusted third party 32 1. Non repudiation 2. Storage of secrets 3. mobility 4. Mobile code Functions 33 Security infrastructure 34 TTP TTP TTP TTP A B access security model 35 Firewalls packet filtering 36 Page 6 6

Firewalls application filtering 37 System resources access control 38 39 40 s and application level Reference monitor Application Apache Authorization 41 In closed environments 42 Apache? Security Administration Application Page 7 7

In open networks 43 s security model 44 TCA HCA PCA Certification Infrastructure PCA HCA UCA UCA App client Secure Transactions App server Smart card Crypto modules Certification client Security Platform 45 Questions 46 Introduction to Computer s Security 4. security services and mechanisms? Page 8 8