1 / 32

NETE0519 & ITEC4614 Computer Network Security

NETE0519 & ITEC4614 Computer Network Security. Asst.Prof.Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th. Supakorn Kungpisdan, Ph.D. Assistant Professor of Information Technology Education PhD (Computer Science and Software Engineering), Monash University, Australia

zulema
Download Presentation

NETE0519 & ITEC4614 Computer Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NETE0519 & ITEC4614Computer Network Security Asst.Prof.Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th

  2. NETE0519-ITEC4614 Supakorn Kungpisdan, Ph.D. • Assistant Professor of Information Technology • Education • PhD (Computer Science and Software Engineering), Monash University, Australia • M.Eng. (Computer Engineering), KMUTT • Specializations • Information and Network Security, Electronic Commerce, Formal Methods, Computer Networking

  3. NETE0519-ITEC4614 Course Descriptions • Textbook • W. Stallings: Cryptography and Network Security, 4th Edition, Pearson Prentice Hall, ISBN 0-13-202322-9 or later • Supplementary materials • M. E. Whitman and H. J. Mattord, Principles of Information Security, 3rd Edition, Thomson, ISBN 1-4239-0177-0 • G. De Laet and G. Schauwers: Network Security Fundamentals, Cisco Press, ISBN 1-58705-167-2 • http://www.msit.mut.ac.th/media

  4. NETE0519-ITEC4614 Evaluation Criteria • Quizzes 10% • Lab 30% • Midterm exam 20% • Final exam 40%

  5. NETE0519-ITEC4614 Course Outlines • Network Security Overview • Information Security • Symmetric Cryptography, Public-key Cryptography, Hash Functions and MAC • Network Security • IP Security, Web Security, Email Security, Firewalls, Intrusion Detection Systems • Security Management • Security Standards and Policy

  6. Lecture 01 Network Security Overview Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th

  7. NETE0519-ITEC4614 What is Security? “The quality or state of being secure—to be free from danger” A successful organization should have multiple layers of security in place: Information Security Systems Security Network Security Security Management Physical security

  8. NETE0519-ITEC4614 Source: http://www.technewsworld.com/story/76109.html

  9. NETE0519-ITEC4614 Source: http://www.networkworld.com/research/2012/100812-security-manager39s-journal-i-hired-263130.html?source=nww_rss

  10. NETE0519-ITEC4614 Security Trends

  11. NETE0519-ITEC4614 C.I.A Triangle • Confidentiality • Integrity • Availability

  12. NETE0519-ITEC4614 Vulnerabilities, Threats, and Attacks • Vulnerability • Threat • Attack

  13. NETE0519-ITEC4614

  14. NETE0519-ITEC4614

  15. NETE0519-ITEC4614 How Hackers Exploit Weaknesses

  16. NETE0519-ITEC4614 Types of Attacks • Interruption • Attack on Availability • Interception • Attack on Confidentiality

  17. NETE0519-ITEC4614 Types of Attacks (cont.) • Modification • Attack on Integrity • Tampering a resource • Fabrication • Attack on Authenticity • Impersonation, masquerading

  18. NETE0519-ITEC4614 Passive VS Active Attacks • Passive Attacks • To obtain information that is being transmitted. • E.g. Release of confidential information and Traffic analysis • Difficult to detect • Initiative to launch an active attack • Interception • Relieved by using encryption • Active Attacks • Involve modification of the data stream or creation of a false stream • E.g. Masquerade, replay, message modification, denial of services • Potentially detected by security mechanisms • Interruption, Modification, Fabrication

  19. NETE0519-ITEC4614 Hackers • White Hat Hackers • Grey Hat Hackers • Script Kiddies • Hacktivists • Crackers or Black Hat Hackers

  20. NETE0519-ITEC4614 Malicious Codes • Viruses • A destructive program code that attaches itself to a host and copies itself and spreads to other hosts • Viruses replicates and remains undetected until being activated. • Worms • Unlike viruses, worms is independent of other programs or files. No trigger is needed. • Trojans • Externally harmless program but contains malicious code • Spyware • Software installed on a target machine sending information back to an owning server

  21. NETE0519-ITEC4614 Security at Each Layer

  22. NETE0519-ITEC4614 A Model for Network Security

  23. NETE0519-ITEC4614 A Model for Network Access Security

  24. NETE0519-ITEC4614 Security Controls

  25. NETE0519-ITEC4614

  26. NETE0519-ITEC4614 NSTISSC Security Model The National Security Telecommunications and Information Systems Security Committee

  27. NETE0519-ITEC4614 Balancing Information Security and Access

  28. NETE0519-ITEC4614 Approaches to Information Security Implementation

  29. NETE0519-ITEC4614 Approaches to Information Security Implementation: Bottom-Up Approach Grassroots effort: systems administrators attempt to improve security of their systems Key advantage: technical expertise of individual administrators Seldom works, as it lacks a number of critical features: Participant support Organizational staying power

  30. NETE0519-ITEC4614 Approaches to Information Security Implementation: Top-Down Approach Initiated by upper management Issue policy, procedures, and processes Dictate goals and expected outcomes of project Determine accountability for each required action The most successful also involve formal development strategy referred to as systems development life cycle

  31. NETE0519-ITEC4614 Security as a Social Science Social science examines the behavior of individuals interacting with systems Security begins and ends with the people that interact with the system Security administrators can greatly reduce levels of risk caused by end users, and create more acceptable and supportable security profiles

  32. Questions? Next week Symmetric Cryptography and Applications

More Related