Professional Documents
Culture Documents
Introduction to Security
Need of Security
Security Threats and Attacks Security Services
Network security is about balancing the goals of "OPEN" and "SECURE" and "COSTEFFECTIVE
infrastructures in which the possibility of successful yet undetected theft, tampering, and disruption of information and services is kept low or tolerable Security rests on confidentiality authenticity Integrity availability
billion in economic losses in 2003, and went on over $75 billion by 2007
Internet attacks are increasing in frequency, severity and
sophistication
attacks directed to their systems Thousands of attacks per week in 2001 Yahoo, Amazon, eBay, Microsoft, White House, etc., attacked
well-known in network security world Bob, Alice (lovers!) want to communicate securely Trudy (intruder) may intercept, delete, add messages
Bob channel
data, control messages
data
secure receiver
data
Trudy
Eavesdropper
Perpetrator
Masquerader: from A
Destroy hardware (cutting fiber) or software Modify software in a subtle way (alias commands)
Passive Attacks
Active Attacks
the transmissions Goal of opponent is to obtain information that is being transmitted Types :The release of message contents Traffic analysis
Traffic Analysis
Involves some modification of data stream or the creation of a false stream and divided in to four categories
Masquerade of one entity as some other Replay previous messages Modify messages in transit Denial of service
Mosquerade
Replay
Modification of messages
Denial Of Service
providing security requirements. For us it provides a useful, if abstract, overview of concepts of security services.
security of information owned by organization. Security Mechanism: A process that is designed to detect, prevent, or recover from a security attack. Security services : A processing or communication service that enhances the security of the data processing system and information transfer of an organization. These are intended to counter security attacks.
X.800 defines security services in 5 major
categories
Authentication - assurance that the communicating entity is the one claimed Access Control - prevention of the unauthorized use of a resource Data Confidentiality protection of data from unauthorized disclosure Data Integrity - assurance that data received is as sent by an authorized entity Non-Repudiation - protection against denial by one of the parties in a communication
Data Integrity
Assurance that the data that arrives is the same as when it was sent.
Contd
Authentication
The process of verifying the identity of a user Typically based on
Something user knows
Password
Something user is
fingerprint, voice, or retinal scans
Authentication Cont.
Authentication procedure
Two-Party Authentication
One-Way Authentication Two-Way Authentication
Third-Party Authentication
Client
Server
Two-way Authentication
Authenticated
Two-Party Authentications
Security Server
Se
or
er rv
as sw
,P ID
nt ic at ed
ID ,P
sw as
e th Au
Cl ie
nt
Au th e
d or
ed at ic nt
Third-Party Authentications
Access Control
The process of enforcing access right and is based on following three entities
Subject
is entity that can access an object
Object
is entity to which access can be controlled
Access Right
defines the ways in which a subject can access an object.
Confidentiality
Assurance that sensitive information is not visible to an eavesdropper. So it involves the protection of transmitted data from passive attacks This is usually achieved using encryption.
Includes Cryptography
Non-repudiation
Provides protection against denial by one of entities involved in communication of having participated in all or part of the communication
Nonrepudiation, Origin Proof that message was sent by specified party Nonrepudiation,Destination Proof that message was received by specified party
Using this model requires to : Design a suitable algorithm for the security transformation Generate the secret information (keys) used by the algorithm Develop methods to distribute and share the secret information Specify a protocol enabling the principals to use the transformation and secret information for a security service
identify users Implement security controls to ensure only authorised users access the designated information or resources Trusted computer systems can be used to implement this model
of exercising due care and due diligence to protect information, and information systems, from Unauthorized access, Use, Disclosure, Destruction, Modification, or Disruption or Distribution.
The never ending process of information security involves ongoing training, assessment, protection, monitoring & detection, incident response & repair, documentation, and review. ii. This makes information security an indispensable part of all the business operations across different domains.
i.
http://www.robertgraham.com/pubs/network-intrusion
detection.html http://online.securityfocus.com/infocus/1527 http://www.snort.org/ http://www.cert.org/ http://www.nmap.org/ http://grc.com/dos/grcdos.htm http://lcamtuf.coredump.cx/newtcp/ http://www.isfsecuritystandard.com http://security.practitioner.com http://www.security.mtu.edu
Cryptography and network security by Stallings Fourth edition Data cmmunication and Network by Behrouz A forouzan Fourth edition http://lecturesppt.blogspot.in/2011/09/networksecurity-ppt-pdf-slides.html http://www.csl.mtu.edu/cs6461/www/Slide/Chapter8. pdf http://www.authorstream.com/Presentation/aSGuest1 14509-1195743-network-security-model/