NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Cryptography The science of writing in secret code.
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Telecommunication and Networks
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
NETWORK SECURITY.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
ACM 511 Introduction to Computer Networks. Computer Networks.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Network Security Celia Li Computer Science and Engineering York University.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Network Security. Introduction to Networking What is Network ? The ISO/OSI Reference Model - The International Standards Organization (ISO) Open Systems.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Security Protecting information data confidentiality
Unit 3 Section 6.4: Internet Security
Security Issues in Information Technology
Chapter 40 Internet Security.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Security Using Armstrong Numbers and Authentication using Colors
Cryptography: an overview
Cryptography: an overview
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Crypto in information security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Network Security Analysis Name : Waleed Al-Rumaih ID :
Information Security.
Security and Authentication
SECURITY in IT ~Shikhar Agarwal.
Digital Signature.
Security in Networking
Computer Security Security Concepts September 20, 2018
NET 311 Information Security
Network Security: IP Spoofing and Firewall
Firewalls Jiang Long Spring 2002.
Cryptography: an overview
Security Risanuri Hidayat 21 February 2019 security.
IS4680 Security Auditing for Compliance
Introduction to Network Security
ONLINE SECURE DATA SERVICE
Public-Key, Digital Signatures, Management, Security
Introduction to Cryptography (1)
Security in SDR & cognitive radio
Electronic Payment Security Technologies
Network Security Mark Creighton GBA 576 6/4/2019.
Operating Systems Concepts
Cryptography and Network Security
Introduction to Encryption Technology
Presentation transcript:

NETWORK SECURITY Cryptography By: Abdulmalik Kohaji

OUTLINE Network Security - Introduction - Networks - Network Security - Firewalls - Cryptography - Conclusion

Introduction Network Security Information Growth Networks Growth Network Security Growth

Networks General Concepts

What is Network? Network Security: Networks Hardware and Devices Software and Systems Mediums Data

Communication Media Network Security: Networks Wired Twisted Pair Coaxial Cable ITU-T G.hn Optical Fiber Wireless Microwaves Radio Waves Spread Spectrum Infrared

Networks Security

Overview Network Security: Network Security Purpose Responsibility Industry Hardware & Software Development Information

Information Security Network Security: Network Security Why do people want to secure networks? Information means power

Rules of Security Network Security: Network Security - Integrity: all of the information stored is always correct and protected against corruption as well as willful alterations. - Confidentiality: the ability to share information on the network with intended people only. - Availability of information

Threats Network Security: Network Security Type Description Example DoS (Denial-of-Service) The nastiest, and most difficult to address. Easy to launch, difficult to track. Send more requests to the machine than it can handle. Unauthorized Access access some restricted resources Access a website database without permission

Sources of Threats Network Security: Network Security Internal Systematic Users External

Lessons Learned Network Security: Network Security Backups Don't put all the data on one place Don’t put the restricted data on the network if not needed Avoid systems with single points of failure Always update the security system and policy Stay current with relevant operating system patches Watch for relevant security advisories

Firewalls

Definition Network Security: Firewalls Control income and outcome Checkpoint Internetworking Internal Network Assumption

Terms Network Security: Firewalls Router Connecting networks together Manage the traffic Access Control List Lists employed to limit the sorts of packets allowed to come in and go out Demilitarized Zone

Types Network Security: Firewalls Application Gateway Run App Layer as Proxy Server The most secure but slowest Packet Filtering ACL turned on in the router Less overhead Hybrid Systems High Security of AG Speed and Flexibility of PF

Cryptography

What ? Network Security: Cryptography Original Word When it was used? How it was used? Why it is used for networks now?

Terms Network Security: Cryptography Cryptology Encoding Decoding Encryption Key Code-Book Cryptanalysis Ciphertext Plaintext

Security Functions Network Security: Cryptography Authentication: The process of proving one's identity Privacy/confidentiality: Ensuring that the message is available only to the intended receiver. Integrity: Assuring the receiver has not been altered in any way from the original message. Non-repudiation: an approval that the message is really sent by the sender

Differences Network Security: Cryptography WHAT IS THE DIFFERENCE BETWEEN NETWORK SECURITY AND CRYPTOGRAPHY? Network Security Firewalls Auditing Intrusion Detection Systems (IDS) Encrypting Messages & Authentication Cryptography

Algorithms Network Security: Cryptography - Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption Public Key Cryptography (PKC): Uses one key for encryption and another for decryption Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information

SKC Network Security: Cryptography A single key is used for both encryption and decryption The key must be known to the sender and the receiver The biggest difficulty is the distribution of the key

PKC Network Security: Cryptography Two parties Secure communication Non-secure communications channel Without having to share a secret key The sender’s key is the public key The receiver key is the private key.

Hash Function Network Security: Cryptography One-way encryption Use no key Generate a digital fingerprint of a plaintext Used to encrypt passwords

Extensions Network Security: Cryptography Fuzzy hashes are an area of intense research and represent hash values that represent two inputs that are similar. Fuzzy hashes are used to detect documents, images, or other files that are close to each other with respect to content

Why Three ! Network Security: Cryptography Hash Function Integrity SKC Privacy & Confidentially PKC Non-repudiation User authentication

Conclusion

Conclusion Network Security: Conclusion Networks Information Internet Tools & Techniques Cryptography

Thank you for Listening