Unformatted text preview:

Network SecurityOutlineAttacks, Services and MechanismsSecurity AttacksSlide 5Security GoalsSlide 7Security ServicesSlide 9Slide 10Methods of DefenceInternet standards and RFCsInternet RFC Publication ProcessRecommended ReadingHenric Johnson 1Network Network SecuritySecurityHenric JohnsonBlekinge Institute of Technology, Swedenwww.its.bth.se/staff/hjo/[email protected]+46 708 250375Henric Johnson 2OutlineOutline•Attacks, services and mechanisms•Security attacks•Security services•Methods of Defense•A model for Internetwork Security•Internet standards and RFCsHenric Johnson 3Attacks, Services and Attacks, Services and MechanismsMechanisms•Security Attack: Any action that compromises the security of information.•Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack.•Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.Henric Johnson 4Security AttacksSecurity AttacksHenric Johnson 5Security AttacksSecurity Attacks•Interruption: This is an attack on availability•Interception: This is an attack on confidentiality•Modification: This is an attack on integrity•Fabrication: This is an attack on authenticityHenric Johnson 6Security GoalsSecurity GoalsIntegrityConfidentialityAvalaibilityHenric Johnson 7Henric Johnson 8Security ServicesSecurity Services•Confidentiality (privacy)•Authentication (who created or sent the data)•Integrity (has not been altered)•Non-repudiation (the order is final)•Access control (prevent misuse of resources)•Availability (permanence, non-erasure)– Denial of Service Attacks– Virus that deletes filesHenric Johnson 9Henric Johnson 10Henric Johnson 11Methods of DefenceMethods of Defence•Encryption•Software Controls (access limitations in a data base, in operating system protect each user from other users)•Hardware Controls (smartcard)•Policies (frequent changes of passwords)•Physical ControlsHenric Johnson 12Internet standards and Internet standards and RFCsRFCs•The Internet society–Internet Architecture Board (IAB)–Internet Engineering Task Force (IETF)–Internet Engineering Steering Group (IESG)Henric Johnson 13Internet RFC Internet RFC Publication ProcessPublication ProcessHenric Johnson 14Recommended ReadingRecommended Reading•Pfleeger, C. Security in Computing. Prentice Hall, 1997.•Mel, H.X. Baker, D. Cryptography Decrypted. Addison Wesley,


View Full Document

UD ELEG 867 - Network Security

Documents in this Course
Firewalls

Firewalls

53 pages

Load more
Download Network Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Network Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Network Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?