Network security
Download
1 / 14

Network Security - PowerPoint PPT Presentation


  • 64 Views
  • Uploaded on

Network Security. Henric Johnson Blekinge Institute of Technology, Sweden www.its.bth.se/staff/hjo/ [email protected] +46 708 250375. Outline. Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork Security

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Network Security' - axel-workman


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Network security

Network Security

Henric Johnson

Blekinge Institute of Technology, Sweden

www.its.bth.se/staff/hjo/

[email protected]

+46 708 250375

Henric Johnson


Outline
Outline

  • Attacks, services and mechanisms

  • Security attacks

  • Security services

  • Methods of Defense

  • A model for Internetwork Security

  • Internet standards and RFCs

Henric Johnson


Attacks services and mechanisms
Attacks, Services and Mechanisms

  • Security Attack:Any action that compromises the security of information.

  • Security Mechanism:A mechanism that is designed to detect, prevent, or recover from a security attack.

  • Security Service:A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

Henric Johnson


Security attacks
Security Attacks

Henric Johnson


Security attacks1
Security Attacks

  • Interruption: This is an attack on availability

  • Interception: This is an attack on confidentiality

  • Modfication: This is an attack on integtrity

  • Fabrication: This is an attack on authenticity

Henric Johnson


Security goals
Security Goals

Confidentiality

Integrity

Avaliability

Henric Johnson



Security services
Security Services

  • Confidentiality (privacy)

  • Authentication (who created or sent the data)

  • Integrity (has not been altered)

  • Non-repudiation (the order is final)

  • Access control (prevent misuse of resources)

  • Availability (permanence, non-erasure)

    • Denial of Service Attacks

    • Virus that deletes files

Henric Johnson




Methods of defence
Methods of Defence

  • Encryption

  • Software Controls (access limitations in a data base, in operating system protect each user from other users)

  • Hardware Controls (smartcard)

  • Policies (frequent changes of passwords)

  • Physical Controls

Henric Johnson


Internet standards and rfcs
Internet standards and RFCs

  • The Internet society

    • Internet Architecture Board (IAB)

    • Internet Engineering Task Force (IETF)

    • Internet Engineering Steering Group (IESG)

Henric Johnson



Recommended reading
Recommended Reading

  • Pfleeger, C. Security in Computing. Prentice Hall, 1997.

  • Mel, H.X. Baker, D. Cryptography Decrypted. Addison Wesley, 2001.

Henric Johnson


ad