network security
Download
Skip this Video
Download Presentation
Network Security

Loading in 2 Seconds...

play fullscreen
1 / 14

Network Security - PowerPoint PPT Presentation


  • 64 Views
  • Uploaded on

Network Security. Henric Johnson Blekinge Institute of Technology, Sweden www.its.bth.se/staff/hjo/ [email protected] +46 708 250375. Outline. Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork Security

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Network Security' - axel-workman


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
network security

Network Security

Henric Johnson

Blekinge Institute of Technology, Sweden

www.its.bth.se/staff/hjo/

[email protected]

+46 708 250375

Henric Johnson

outline
Outline
  • Attacks, services and mechanisms
  • Security attacks
  • Security services
  • Methods of Defense
  • A model for Internetwork Security
  • Internet standards and RFCs

Henric Johnson

attacks services and mechanisms
Attacks, Services and Mechanisms
  • Security Attack:Any action that compromises the security of information.
  • Security Mechanism:A mechanism that is designed to detect, prevent, or recover from a security attack.
  • Security Service:A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

Henric Johnson

security attacks
Security Attacks

Henric Johnson

security attacks1
Security Attacks
  • Interruption: This is an attack on availability
  • Interception: This is an attack on confidentiality
  • Modfication: This is an attack on integtrity
  • Fabrication: This is an attack on authenticity

Henric Johnson

security goals
Security Goals

Confidentiality

Integrity

Avaliability

Henric Johnson

security services
Security Services
  • Confidentiality (privacy)
  • Authentication (who created or sent the data)
  • Integrity (has not been altered)
  • Non-repudiation (the order is final)
  • Access control (prevent misuse of resources)
  • Availability (permanence, non-erasure)
    • Denial of Service Attacks
    • Virus that deletes files

Henric Johnson

methods of defence
Methods of Defence
  • Encryption
  • Software Controls (access limitations in a data base, in operating system protect each user from other users)
  • Hardware Controls (smartcard)
  • Policies (frequent changes of passwords)
  • Physical Controls

Henric Johnson

internet standards and rfcs
Internet standards and RFCs
  • The Internet society
    • Internet Architecture Board (IAB)
    • Internet Engineering Task Force (IETF)
    • Internet Engineering Steering Group (IESG)

Henric Johnson

recommended reading
Recommended Reading
  • Pfleeger, C. Security in Computing. Prentice Hall, 1997.
  • Mel, H.X. Baker, D. Cryptography Decrypted. Addison Wesley, 2001.

Henric Johnson

ad