NETE0519 & ITEC4614 Computer Network Security - PowerPoint PPT Presentation

nete0519 itec4614 computer network security n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
NETE0519 & ITEC4614 Computer Network Security PowerPoint Presentation
Download Presentation
NETE0519 & ITEC4614 Computer Network Security

play fullscreen
1 / 32
NETE0519 & ITEC4614 Computer Network Security
199 Views
Download Presentation
zulema
Download Presentation

NETE0519 & ITEC4614 Computer Network Security

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. NETE0519 & ITEC4614Computer Network Security Asst.Prof.Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th

  2. NETE0519-ITEC4614 Supakorn Kungpisdan, Ph.D. • Assistant Professor of Information Technology • Education • PhD (Computer Science and Software Engineering), Monash University, Australia • M.Eng. (Computer Engineering), KMUTT • Specializations • Information and Network Security, Electronic Commerce, Formal Methods, Computer Networking

  3. NETE0519-ITEC4614 Course Descriptions • Textbook • W. Stallings: Cryptography and Network Security, 4th Edition, Pearson Prentice Hall, ISBN 0-13-202322-9 or later • Supplementary materials • M. E. Whitman and H. J. Mattord, Principles of Information Security, 3rd Edition, Thomson, ISBN 1-4239-0177-0 • G. De Laet and G. Schauwers: Network Security Fundamentals, Cisco Press, ISBN 1-58705-167-2 • http://www.msit.mut.ac.th/media

  4. NETE0519-ITEC4614 Evaluation Criteria • Quizzes 10% • Lab 30% • Midterm exam 20% • Final exam 40%

  5. NETE0519-ITEC4614 Course Outlines • Network Security Overview • Information Security • Symmetric Cryptography, Public-key Cryptography, Hash Functions and MAC • Network Security • IP Security, Web Security, Email Security, Firewalls, Intrusion Detection Systems • Security Management • Security Standards and Policy

  6. Lecture 01 Network Security Overview Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th

  7. NETE0519-ITEC4614 What is Security? “The quality or state of being secure—to be free from danger” A successful organization should have multiple layers of security in place: Information Security Systems Security Network Security Security Management Physical security

  8. NETE0519-ITEC4614 Source: http://www.technewsworld.com/story/76109.html

  9. NETE0519-ITEC4614 Source: http://www.networkworld.com/research/2012/100812-security-manager39s-journal-i-hired-263130.html?source=nww_rss

  10. NETE0519-ITEC4614 Security Trends

  11. NETE0519-ITEC4614 C.I.A Triangle • Confidentiality • Integrity • Availability

  12. NETE0519-ITEC4614 Vulnerabilities, Threats, and Attacks • Vulnerability • Threat • Attack

  13. NETE0519-ITEC4614

  14. NETE0519-ITEC4614

  15. NETE0519-ITEC4614 How Hackers Exploit Weaknesses

  16. NETE0519-ITEC4614 Types of Attacks • Interruption • Attack on Availability • Interception • Attack on Confidentiality

  17. NETE0519-ITEC4614 Types of Attacks (cont.) • Modification • Attack on Integrity • Tampering a resource • Fabrication • Attack on Authenticity • Impersonation, masquerading

  18. NETE0519-ITEC4614 Passive VS Active Attacks • Passive Attacks • To obtain information that is being transmitted. • E.g. Release of confidential information and Traffic analysis • Difficult to detect • Initiative to launch an active attack • Interception • Relieved by using encryption • Active Attacks • Involve modification of the data stream or creation of a false stream • E.g. Masquerade, replay, message modification, denial of services • Potentially detected by security mechanisms • Interruption, Modification, Fabrication

  19. NETE0519-ITEC4614 Hackers • White Hat Hackers • Grey Hat Hackers • Script Kiddies • Hacktivists • Crackers or Black Hat Hackers

  20. NETE0519-ITEC4614 Malicious Codes • Viruses • A destructive program code that attaches itself to a host and copies itself and spreads to other hosts • Viruses replicates and remains undetected until being activated. • Worms • Unlike viruses, worms is independent of other programs or files. No trigger is needed. • Trojans • Externally harmless program but contains malicious code • Spyware • Software installed on a target machine sending information back to an owning server

  21. NETE0519-ITEC4614 Security at Each Layer

  22. NETE0519-ITEC4614 A Model for Network Security

  23. NETE0519-ITEC4614 A Model for Network Access Security

  24. NETE0519-ITEC4614 Security Controls

  25. NETE0519-ITEC4614

  26. NETE0519-ITEC4614 NSTISSC Security Model The National Security Telecommunications and Information Systems Security Committee

  27. NETE0519-ITEC4614 Balancing Information Security and Access

  28. NETE0519-ITEC4614 Approaches to Information Security Implementation

  29. NETE0519-ITEC4614 Approaches to Information Security Implementation: Bottom-Up Approach Grassroots effort: systems administrators attempt to improve security of their systems Key advantage: technical expertise of individual administrators Seldom works, as it lacks a number of critical features: Participant support Organizational staying power

  30. NETE0519-ITEC4614 Approaches to Information Security Implementation: Top-Down Approach Initiated by upper management Issue policy, procedures, and processes Dictate goals and expected outcomes of project Determine accountability for each required action The most successful also involve formal development strategy referred to as systems development life cycle

  31. NETE0519-ITEC4614 Security as a Social Science Social science examines the behavior of individuals interacting with systems Security begins and ends with the people that interact with the system Security administrators can greatly reduce levels of risk caused by end users, and create more acceptable and supportable security profiles

  32. Questions? Next week Symmetric Cryptography and Applications