CSCI 4541/6541: NETWORK SECURITY



Similar documents
Cryptography and Network Security

Cryptography and Network Security Chapter 1

Information System Security

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

544 Computer and Network Security

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Chap. 1: Introduction

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

COSC 472 Network Security

Cryptography and Network Security: Overview

Network Security. Introduction. Security services. Players. Conclusions. Distributed information Distributed processing Remote smart systems access

Introduction to Security

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Notes on Network Security - Introduction

CS 203 / NetSys 240. Network Security

Table: Security Services (X.800)

IY2760/CS3760: Part 6. IY2760: Part 6

CSC 474 Information Systems Security

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Content Teaching Academy at James Madison University

Weighted Total Mark. Weighted Exam Mark

Computer and Network Security

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

CS 450/650 Fundamentals of Integrated Computer Security

Network Security. Network Security Hierarchy. CISCO Security Curriculum

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. March 19, 2015

Lecture II : Communication Security Services

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Network Security Welcome and introduction. T Network security Nov-Dec 2013 Tuomas Aura Aalto University

Network Security Welcome and introduction. T Network security Nov-Dec 2012 Tuomas Aura Aalto University

CPSC 467: Cryptography and Computer Security

Overview of computer and communications security

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

INTERNATIONAL TELECOMMUNICATION UNION $!4! #/--5.)#!4)/..%47/2+3 /0%. 3934%-3 ).4%2#/..%#4)/. /3) 3%#52) #452%!.$!00,)#!4)/.

Boston University MET CS 690. Network Security

INTERNATIONAL TELECOMMUNICATION UNION DATA COMMUNICATION NETWORKS: OPEN SYSTEMS INTERCONNECTION (OSI); SECURITY, STRUCTURE AND APPLICATIONS

Network Security Course Specifications

Chapter 6 Electronic Mail Security

Welcome to Information Systems Security (503009)

Cryptography and network security CNET4523

CSE 5392 Sensor Network Security

Chapter 7 Transport-Level Security

Network Security. Text. Administrative. My Information. Course Focus. Evaluation CEN

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Computer and Network Security

CS 464/564 Networked Systems Security SYLLABUS

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

CRYPTOGRAPHY IN NETWORK SECURITY

MANAGEMENT OF SECURE SYSTEMS AND SECURITY WITHIN OSI 1

Introduction to Internet Security

Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

TELECOMMUNICATION NETWORKS

How To Protect Your Data From Being Hacked On A Network (Kerberos) On A Pc Or Mac Or Ipad (Ipad) On An Ipad Or Ipa (Networking) On Your Computer Or Ipam (Network

CSC574 - Computer and Network Security Module: Introduction

Security and Privacy in Cloud Computing

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Institute of Southern Punjab, Multan

Network Security. Chapter 1 Introduction. Network Security IN2101. Georg Carle. Course organization

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Introduction to Network Security Key Management and Distribution

MSIT-121C (Elective 2): Cryptography and Network Security

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

CSci 4211: Data Communications and Computer Networks. Time: Tuesday and Thursday 8:15 to 9:30 am Location: Phyics 170 Spring 2015, 3 Credits

Information, Network & Cyber Security

CNT4406/5412 Network Security Introduction

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Network Security and Surveillance

Information Security

Basics of Internet Security

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Information Security Course Specifications

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Introduction to Network Security Security Overview

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Compter Networks Chapter 9: Network Security

Computer Science 3CN3 Computer Networks and Security. Software Engineering 4C03 Computer Networks and Computer Security. Winter 2008 Course Outline

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Lecture 1 - Overview

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

SFWR ENG 4C03 - Computer Networks & Computer Security

CIS 253. Network Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Security within a development lifecycle. Enhancing product security through development process improvement

A Framework for Secure and Verifiable Logging in Public Communication Networks

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Network Security Administrator

Using BroadSAFE TM Technology 07/18/05

How To Pass A Credit Course At Florida State College At Jacksonville

Transcription:

1 CSCI 4541/6541: NETWORK SECURITY

COURSE INFO CSci 4541/6541 Tuesdays 6:10pm 8:40pm Bell Hall 108 Office Hours: Tuesdays 2:30pm 4:30pm Dr. Nan Zhang Office: SEH 4590 Phone: (202) 994-5919 Email: nzhang10 at gwu.edu TA: Saad Bin Suhaim Email: ssuhaim at gwmail.gwu.edu Office Hours: Thursdays 2pm 4pm SEH 4900 2

TEXTBOOK William Stallings, Cryptography and Network Security, 6th edition. Prentice Hall, 2006. 4th - 6th editions are fine. 3rd edition is acceptable, but please pay special attention to additional materials in lecture notes 3

OPTIONAL READINGS Goldreich, Foundations of Cryptography: Basic Tools, Cambridge University Press, 2007. Kaufman, Perlman, and Speciner, Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall, 2002. 4

GRADING Homework 25% Project 25% Midterm Exam 25% Final Exam 25% 5

COURSE SCHEDULE 6

7 CHAPTER 1 INTRODUCTION

BACKGROUND Information Security requirements have changed in recent times traditionally provided by physical and administrative mechanisms computer use requires automated tools to protect files and other stored information use of networks and communications links requires measures to protect data during transmission 8

DEFINITIONS Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers Network Security - measures to protect data during their transmission Internet Security - measures to protect data during their transmission over a collection of interconnected networks 9

AIM OF COURSE our focus is on Internet Security which consists of measures to deter, prevent, detect, and correct security violations that involve the transmission & storage of information 10

SECURITY TRENDS 11

OSI SECURITY ARCHITECTURE ITU-T X.800 Security Architecture for OSI defines a systematic way of defining and providing security requirements for us it provides a useful, if abstract, overview of concepts we will study 12

ASPECTS OF SECURITY consider 3 aspects of information security: security attack security mechanism security service 13

SECURITY ATTACK any action that compromises the security of information owned by an organization information security is about how to prevent attacks, or failing that, to detect attacks on information-based systems often threat & attack used to mean same thing have a wide range of attacks can focus of generic types of attacks passive active 14

PASSIVE ATTACKS 15

ACTIVE ATTACKS 16

SECURITY SERVICE enhance security of data processing systems and information transfers of an organization intended to counter security attacks using one or more security mechanisms often replicates functions normally associated with physical documents which, for example, have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded or licensed 17

SECURITY SERVICES X.800: a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers RFC 2828: a processing or communication service provided by a system to give a specific kind of protection to system resources 18

SECURITY SERVICES (X.800) Authentication - assurance that the communicating entity is the one claimed Access Control - prevention of the unauthorized use of a resource Data Confidentiality protection of data from unauthorized disclosure Data Integrity - assurance that data received is as sent by an authorized entity Non-Repudiation - protection against denial by one of the parties in a communication 19

SECURITY MECHANISM feature designed to detect, prevent, or recover from a security attack no single mechanism that will support all services required however one particular element underlies many of the security mechanisms in use: cryptographic techniques hence our focus on this topic 20

SECURITY MECHANISMS (X.800) specific security mechanisms: encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization pervasive security mechanisms: trusted functionality, security labels, event detection, security audit trails, security recovery 21

MODEL FOR NETWORK SECURITY 22

MODEL FOR NETWORK SECURITY using this model requires us to: 1. design a suitable algorithm for the security transformation 2. generate the secret information (keys) used by the algorithm 3. develop methods to distribute and share the secret information 4. specify a protocol enabling the principals to use the transformation and secret information for a security service 23

MODEL FOR NETWORK ACCESS SECURITY 24

MODEL FOR NETWORK ACCESS SECURITY using this model requires us to: 1. select appropriate gatekeeper functions to identify users 2. implement security controls to ensure only authorised users access designated information or resources trusted computer systems may be useful to help implement this model 25

SUMMARY have considered: definitions for: computer, network, internet security X.800 standard security attacks, services, mechanisms models for network (access) security 26