Cryptography and Network Security: Overview



Similar documents
Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Cryptography and Network Security Chapter 1

Cryptography and Network Security

CSCI 4541/6541: NETWORK SECURITY

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Information System Security

Chap. 1: Introduction

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Network Security Concepts

COSC 472 Network Security

Introduction to Security

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

544 Computer and Network Security

IY2760/CS3760: Part 6. IY2760: Part 6

Notes on Network Security - Introduction

Table: Security Services (X.800)

Key Management and Distribution

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Network Security. Introduction. Security services. Players. Conclusions. Distributed information Distributed processing Remote smart systems access

Network Access Control and Cloud Security

Network Security Part II: Standards

Transport Level Security

Electronic Mail Security

Digital Signature. Raj Jain. Washington University in St. Louis

Overview of computer and communications security

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Network Security. Network Security Hierarchy. CISCO Security Curriculum

Network Security Administrator

Key Management and Distribution

Network Access Control and Cloud Security

MANAGEMENT OF SECURE SYSTEMS AND SECURITY WITHIN OSI 1

Intrusion Detection Systems

Chapter 7 Transport-Level Security

Content Teaching Academy at James Madison University

CPSC 467: Cryptography and Computer Security

INTERNATIONAL TELECOMMUNICATION UNION $!4! #/--5.)#!4)/..%47/2+3 /0%. 3934%-3 ).4%2#/..%#4)/. /3) 3%#52) #452%!.$!00,)#!4)/.

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

INTERNATIONAL TELECOMMUNICATION UNION DATA COMMUNICATION NETWORKS: OPEN SYSTEMS INTERCONNECTION (OSI); SECURITY, STRUCTURE AND APPLICATIONS

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

CTS2134 Introduction to Networking. Module Network Security

ECE Lecture 1. Security Services. Need for information security. widespread use of data processing equipment: computer security

Compter Networks Chapter 9: Network Security

CS5008: Internet Computing

Data Communications and Networking Overview

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

CSE 571S: Network Security CSE571S

CSE 571S: Network Security CSE571S

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Network Security Essentials Chapter 5

Chapter 10. Network Security

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Introduction to Internet Security

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CS 203 / NetSys 240. Network Security

CSE 5392 Sensor Network Security

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Introduction p. 2. Introduction to Information Security p. 1. Introduction

TELECOMMUNICATION NETWORKS

CSE 473s Introduction to Computer Networks

Information Security. Training

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

IDS and Penetration Testing Lab ISA656 (Attacker)

Basics of Internet Security

CSC 474 Information Systems Security

Lecture 10: Communications Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Computer Security: Principles and Practice

Maintaining Herd Communication - Standards Used In IT And Cyber Security. Laura Kuiper

Bachelor of Information Technology (Network Security)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CRYPTOGRAPHY IN NETWORK SECURITY

CSE 571S: Network Security CSE571S

Chapter 6 Electronic Mail Security

Network Security Fundamentals

United States Trustee Program s Wireless LAN Security Checklist

Cryptography and network security CNET4523

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Securing Distribution Automation

Information Security Basic Concepts

CSE 571S: Network Security CSE571S. Overview. Cyber Security Facts. Cyber Security Opportunities

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Exam 1 - CSIS 3755 Information Assurance

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Network Security Concepts: Review

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Audit/Logging Repudiation. Security Testing: Testing for What It s NOT supposed to do

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Network Security Essentials Chapter 7

INSTANT MESSAGING SECURITY

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Information security versus network security in the Internet as critical infrastructure Security of Internet and Critical Infrastructures: European

Transcription:

Cryptography and Network Security: Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/ 1-1

Overview 1. Computer Security Concepts 2. OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms These slides are based on Lawrie Brown s slides supplied with William Stalling s book Cryptography and Network Security: Principles and Practice, 5 th Ed, 2011. 1-2

Standards Organizations National Institute of Standards & Technology (NIST) http://csrc.nist.gov/ Internet Society (ISOC): Internet Engineering Task Force (IETF), ietf.org Internet Architecture Board (IAB) International Telecommunication Union Telecommunication Standardization Sector (ITU-T) T) http://www.itu.int International Organization for Standardization (ISO) http://www.iso.org 1-3

Security Components Confidentiality: Need access control, Cryptography, Existence of data Integrity: No change, content, source, prevention mechanisms, detection mechanisms Availability: Denial of service attacks, Confidentiality, Integrity and Availability (CIA) 1-4

OSI Security Architecture ITU-T T X.800 Security Architecture for OSI Defines a systematic way of defining and providing security requirements Provides a useful, if abstract, overview of concepts 1-5

Aspects of Security Aspects of information security: Security attack Security mechanism Security service Note: Threat a potential for violation of security Attack an assault on system security, a deliberate attempt to evade security services 1-6

Passive Attacks 1-7

Active Attacks 1-8

Security Services (X.800) Authentication - assurance that communicating entity is the one claimed have both peer-entity entity & data origin authentication Access Control - prevention of the unauthorized use of a resource Data Confidentiality protection of data from unauthorized disclosure Data Integrity - assurance that data received is as sent by an authorized entity Non-Repudiation - protection against denial by one of the parties in a communication Availability resource accessible/usable 1-9

Security Mechanism Feature designed to detect, prevent, or recover from a security attack However one particular element underlies many of the security mechanisms in use: cryptographic techniques 1-10

Security Mechanisms (X.800) Specific security mechanisms: Encipherment,, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization Pervasive security mechanisms: Trusted functionality, security labels, event detection, security audit trails, security recovery 1-11

Services and Mechanisms Relationship 1-12

Model for Network Security 1. Algorithm for Security transformation 2. Secret key generation 3. Distributed and share secret information 4. Protocol for sharing secret information 1-13

Model for Network Access Security 1. Select appropriate gatekeeper functions to identify users 2. Implement security controls to ensure only authorised users access designated information or resources 1-14

Summary NIST, IETF, ITU-T, T, ISO develop standards for network security CIA represents the 3 key components of security ISO X.800 security architecture specifies security attacks, services, mechanisms Active attacks may modify the transmitted information. Security services include authentication, access control, 1-15

Lab Homework 2 Lab Homework 2 1. Read about the following tools a. Wireshark, network protocol analyzer, http://www.wireshark.org/download.html Use ftp client to download in binary mode (do not use browser) b. Advanced Port Scanner, network port scanner, http://www.scanwith.com/advanced_port_scanner_download.htm c. LAN Surveyor, network mapping shareware with 30 day trial, http://www.solarwinds.com/products/lansurveyor/ 2. Use advanced port scanner to scan one to three hosts on your local net (e.g., CSE571XPS and CSE571XPC2 in the security lab) to find their open ports. 3. Use network surveyor to show the map of all hosts on your local net 4. Ping www.google.com to find its address. Start Wireshark. Set capture filter option IP Address to capture all traffic to/from this address. Open a browser window and Open www.google.com. Stop Wireshark. Submit a screen capture showing the packets seen. 1-16

Security URLs Center for Education and Research in Information Assurance and Security, http://www.cerias.purdue.edu/about/history/coast/archive/ IETF Security area, sec.ietf.org Computer and Network Security Reference Index, http://www.vtcif.telstra.com.au/info/security.html The Cryptography FAQ, http://www.faqs.org/faqs/cryptography-faq/ Tom Dunigan's Security page, http://www.csm.ornl.gov/%7edunigan/security.html IEEE Technical Committee on Security and Privacy, http://www.ieee-security.org/index.html Computer Security Resource Center, http://csrc.nist.gov/ 1-17

Security URLs (Cont) Security Focus, http://www.securityfocus.com/ SANS Institute, http://sans.org/ Data Protection resource Directory, http://www.dataprotectionhq.com/cryptographyanddat asecurity/ Helger Lipmaa's Cryptology Pointers, http://www.adastral.ucl.ac.uk/%7ehelger/crypto/ 1-18

Newsgroups and Forums sci.crypt.research, sci.crypt, sci.crypt.random-numbers alt.security comp.security.misc, comp.security.firewalls, comp.security.announce comp.risks comp.virus Security and Cryptography Forum, http://forums.devshed.com/security-and-cryptography-17/ Cryptography Forum, http://www.topix.com/forum/science/cryptography Security Forum, http://www.windowsecurity.com/ Google groups, http://groups.google.com LinkedIn Groups, http://www.linkedin.com 1-19