Institute of Southern Punjab, Multan



Similar documents
CPSC 467: Cryptography and Computer Security

Content Teaching Academy at James Madison University

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

CSCI 4541/6541: NETWORK SECURITY

Information Security

Chap. 1: Introduction

Cryptography and Network Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Security Policy JUNE 1, SalesNOW. Security Policy v v

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

1 Hack-x-crypt UJJWAL SAHAY

Cornerstones of Security

Chapter 23. Database Security. Security Issues. Database Security

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

Hang Seng HSBCnet Security. May 2016

Providing Data Protection as a Service in Cloud Computing

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Cryptography and Network Security Chapter 1

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

VPN Technologies: Definitions and Requirements

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Notes on Network Security - Introduction

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

A simple tscheme guide to securing electronic transactions

Information Technology Acceptable Use Policy

Chapter 1: Introduction

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

CSC 474 Information Systems Security

Privacy Policy Version 1.0, 1 st of May 2016

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Scientific Journal Impact Factor (SJIF): 1.711

Evaluate the Usability of Security Audits in Electronic Commerce

Forrestville Valley School District #221

CSCI 362 Computer and Network Security

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Den Gode Webservice - Security Analysis

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306)

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Minnesota State Colleges and Universities System Guideline Chapter 5 Administration

Acceptable Use Policy

10 Quick Tips to Mobile Security

Data Security Incident Response Plan. [Insert Organization Name]

PRIVACY POLICY. I. Introduction. II. Information We Collect

ISO Information Security Management Systems Professional

REGION 19 HEAD START. Acceptable Use Policy

Cryptography and Network Security: Overview

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Information Security Basic Concepts

Framework of e-commerce

Responsible Access and Use of Information Technology Resources and Services Policy

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Information Security Policy

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

E-BUSINESS THREATS AND SOLUTIONS

Newcastle University Information Security Procedures Version 3

Chapter 23. Database Security. Security Issues. Database Security

Acceptable Use Policy

Information Security Course Specifications

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

SSL, PKI and Secure Communication

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

HIPAA PRIVACY AND SECURITY AWARENESS

VPN. Date: 4/15/2004 By: Heena Patel

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

21 CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES CFR Part 11 Compliance PLA 2.1

Acceptable Use Policy - NBN Services

COSC 472 Network Security

Common Criteria Web Application Security Scoring CCWAPSS

CIS433/533 - Computer and Network Security Introduction

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

Wireless Network Standard and Guidelines

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Weighted Total Mark. Weighted Exam Mark

CS 450/650 Fundamentals of Integrated Computer Security

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Ethical Hacking

Transcription:

Institute of Southern Punjab, Multan Network Security Brief Introduction Lecture#1 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Blog https://mazharhussainatisp.wordpress.com/

Grading Policy Classification Assignments, Quizzes & Class Behavior 15% Attendance 10% Midterm Exams 25% Final Exam 50% Total 100 % 2

Students Agreement The course mission is to educate and provide a solid platform for research and development in the field of Network Security by explaining the related concepts and demonstrating several hacking/security tools. You will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify ISP university or the instructor with respect to the use or misuse of these tools, regardless of ethical intent. All the students who register in the course agree to the above mentioned points. 3

Few things to Remember!! Attendance will be taken with in 15 minutes at the start of class and marked at the end of semester Students are allowed to enter into class with in 30 minutes at the starting of class Zero tolerance policy on attendance, discipline of class during lectures! Assignments must be submitted on time, no late submissions In case of copied assignment both parties will be awarded zero mark! Presentation, Quizzes, Assignments, Class participation are very important. Don t miss your Quizzes, Presentations, Assignments! 4

Reference Books: Books Network Security Bible by Eric Cole, Wiley; 2nd Edition (September 8, 2009) Cryptography and Network Security Principles and Practice (5 th Edition) by William Stallings. Data Communications and Networking written by Behrouz A. Forouzan (4th Edition) Network Security Fundamentals by Gert DeLaet and Gert Schauwers. 5

Lecture 1: Brief Introduction Communication Networks Introduction to Network Security Types of Hacker Classes Cryptology 6

Communication 7

Communication Communication is the exchange of Information from one entity to the other using a Transmission Medium As you can clearly notice, the definition of Data Communication although Simple leaves many questions unanswered:- Exchange?? Information?? Entities?? Medium?? Transmission?? 8

Communication When we communicate, we share information Information can be LOCAL or REMOTE LOCAL communication occurs face to face REMOTE communication occurs over a long distance When we refer to COMPUTER SYSTEMS, Data is represented in the form of Binary Units (Bits) in the form of Zeros (0 s) and One s (1 s) Also the entities can most of the times be considered to be COMPUTERS! 9

Computer Communication Computer Communication is the exchange of data (in the form of 0 s and 1 s) between two devices (computers) via some form of the transmission medium. Computer communication is considered to be Local if the communicating devices are present in the same building or a similarly restricted geographical area. Computer Communication is considered Remote, if the devices are farther apart. 10

Components of Data Communication System Any system is made up of more than one component. Similarly, a data communication system is made up of 5 components as shown in the upcoming figure: 1) Message 2) Sender 3) Receiver 4) Transmission Medium 5) Protocol 11

Components of Data Communication System 12

Components of Data Communication System 1) Message: The message is the information (data) to be communicated. Popular forms of information include text, numbers, pictures, audio, and video. 2) Sender: The sender is the device that sends the data message. It can be a computer, telephone handset, video camera. 3) Receiver: The receiver is the device that receives the message. It can be a computer, telephone handset, television. 13

Components of Data Communication System 4) Transmission Medium: The transmission medium is the physical path by which a message travels from sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves. 5) Protocol: A protocol is a set of rules that govern data communications. It represents an agreement between the communicating devices. Without a protocol, two devices may be connected but not communicating, just as a person speaking French cannot be understood by a person who 14 speaks only Japanese.

Networks 15

Network A network is a set of devices/node two or more than two connected together by communication links. A devices/node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network. Both devices must follow the agreed upon rules Standard to share information between them. 16

Network Criteria A network must be able to meet a certain number of criteria. The most important of these are: 1) Performance: Performance can be measured in many ways, including transmit time and response time. Transmit time is the amount of time required for a message to travel from one device to another device. 2) Reliability: In addition to accuracy of delivery, network reliability is measured by the frequency of failure, the time it takes a link to recover from a failure 17

Network Criteria 3) Security: Network security issues include protecting data from unauthorized access, protecting data from damage and development, and implementing policies and procedures for recovery from breaches and data losses. 18

Introduction to Network Security 19

Introduction to Network Security A Class debate On What is Network Security? 20

Continued Protection of network from unwanted intruders! 21

Continued Importance of Network Security! 22

Continued 1996 Indian hackers attack Pakistan government sites. Vladimir Levin stole US $ 10 million from Citibank. 2006 Muslim hackers attack 598 Danish websites. Yahoo, Google, FBI, CIA, several other well known government websites fall victim. China hacker; 50+ Chinese Gov. websites/day 23

24

Continued For Fun (31.4%) No reason Specified (14.7%) Political Reasons (11.8%) Patriotism (10.9%) As a challenge (10.8%) Revenge (3.3%) 25

Types of Hacker Classes 26

Types of Hacker Classes White Hat Hacker: Good guys, ethical hackers who use their hacking skills for defensive purpose Black Hat Hacker: Bad guys, the malicious hackers or crackers who use their skills for illegal or malicious purposes Grey Hat Hacker: May work offensively or defensively depending on the situation 27

Hackers (Based on Skill Level) Script Kiddies Computer novices using tools Intermediate Hackers Halfway from script kiddies into elite hackers Elite Hackers Highly skilled experts 28

Cryptology 29

Cryptology Cryptology is a Greek word meaning hidden, secret Cryptology consists on two concepts: 1. Cryptography 2. Cryptanalysis 30

1. Cryptography It is the practice and study of techniques for secure communication in the presence of third parties (called adversaries or intruders) More generally, it is about constructing and analyzing protocols that block adversaries Various aspects in information security such as data confidentiality, data integrity, authentication, and nonrepudiation are central to modern cryptography 31

Continued Applications of cryptography include ATM cards, computer passwords, VPN and Secure Shell Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense state. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby stopping unwanted persons from doing the same 32

Continued Confidentiality: This term covers two related concepts 1. Data Confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals 2. Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed 33

Continued Integrity: 1. Data Integrity: Assures that information and programs are changed only in a specified and authorized manner 34

Continued Non -Repudiation: In a general sense non-repudiation involves associating actions or changes to a unique individual. For a secure area, for example, it may be desirable to implement a key card access system Non-repudiation would be violated if it were not also a strictly enforced policy to prohibit sharing of the key cards and also to immediately report lost or stolen cards 35

Continued Authentication: Authentication begins when a user tries to access information. First, the user must prove his access rights and identity. When logging into a computer, users commonly enter usernames and passwords for authentication purposes 36

1. Cryptanalysis Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown 37

Continued Even though the goal has been the same, the methods and techniques of cryptanalysis have changed drastically through the history of cryptography, adapting to increasing cryptographic complexity, ranging from the pen-and-paper methods of the past, to the advanced computerized schemes of the present 38

END OF LECTURE 1 39