Introduction Of Information Security

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security Chapter 1
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Prof. Giovambattista Ianni  10 ECTS (5 Theory + 5 Lab.)  Suggested material:  W. Stallings, Cryptography and Network Security  W. Stallings,
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Computer and Information Security
Computer and Information Security Jen-Chang Liu, 2004
Applied Cryptography for Network Security
Introduction CS-480b Dick Steflik. X.800 – OSI Security Services Security Service – a service provided by a protocol layer of communicating open systems,
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Editied by R. Newman.
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Pertemuan 02 Aspek dasar keamanan Jaringan dan ketentuan baku OSI
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Network Security Essentials Chapter 1
Chapter 1 Overview. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on.
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Computer Security (CS4800)
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
By Marwan Al-Namari Author: William Stallings
Data & Network Security
Cryptography and Network Security
Information System and Network Security
Information Security.
Data & Network Security
Introduction Of System Security
Information and Network Security
10CS835 Information Security
Computer Security Security Concepts September 20, 2018
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Information and Network Security
Cryptography and Network Security
Security Mechanisms Network Security.
Cryptography and Network Security Chapter 1
Presentation transcript:

Introduction Of Information Security Slide Prepared and Presented By: Mr. Ankit S. Didwania (RC-1093) Open Education Resource (OER) by Ankit S. Didwania is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This is a Free Culture License! You are free to use, distribute and modify it, including for commercial purposes, provided you acknowledge the source and share-alike.

Learning Outcomes Learner should be able to understand the basic concepts related to information security Learner should be able to detect the three aspects of information security

Evaluation Strategy Sr. No. Question Type Mark 1 Multiple Choice Question (MCQ) 2 Brief Subjective 3 Detailed Subjective 5

LeD 1.0: Learning Dialogues Activity

Security of Information/data Background Security of Information/data Traditionally possible through physical/mechanical means BUT, in today’s computerized world, it requires automated tools!

Definitions Secure – to be free from any unwanted access or damage Computer Security – it consists of various tools used to secure data from unintended users Network Security – it consists of various security measures required while data is in a network Internet Security - it consists of various security measures required while data is in inter-connected networks i.e. internet

Security Trends

Aspects of Security There are three aspects of information security (based on ITU-T X.800 “Security Architecture for OSI”): security attack security mechanism security service

Security Attack It is an event (attack/threat) which puts the organization’s / individual’s information at risk information security is about how to prevent, reduce or detect such attacks There are majorly two types of generic attacks Passive Active

Passive Attacks

Active Attacks

Security Service It provide service / functionality for protection of computerized information, similar to physical documents protection like: having signatures, dates need protection from disclosure, tampering, or destruction be notarized or witnessed be recorded or licensed

Security Services X.800: RFC 2828: “a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers” RFC 2828: “a processing or communication service provided by a system to give a specific kind of protection to system resources”

Security Services (X.800) Authentication – having confidence that only claimed entities are communicating Access Control - avoidance from the unapproved utilization of an asset Data Confidentiality –security of information from unapproved disclosure Data Integrity - confirmation that information got is as sent by the claimed entity Non-Repudiation - confirmation that information got is as sent by an approved entity

It is a way to resist, reduce or recover from a security attack Security Mechanism It is a way to resist, reduce or recover from a security attack There is no one-size-fits-all solution but “cryptographic techniques” is present in many security mechanisms

Security Mechanisms (X.800) specific security mechanisms: encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization pervasive security mechanisms: trusted functionality, security labels, event detection, security audit trails, security recovery

Summary Learner should have understood the following: Meaning of security and computer, network, internet security Understanding of security attacks, services, mechanisms

Acknowledgement Book “Cryptography and Network Security”, 4th edition, by William Stallings, Chapter 1 “Introduction”

LbD 1.0: Learning by Doing Activity

Multiple Choice Questions (1 mark each) 1) _____ is defined as only sender and recipient should be able to class the contents of message Confidentiality b) Integrity c) Availability d) non-repudiation 2) ______ is defined as information should be available to authorized parties at all time

Subjective Questions Brief Subjective (3 marks each) : 1) Security is divided into which three parts 2) list out the various security services Detailed Subjective (5 marks each) : 1) Justify: Information security is a process 2) Give the various similarities and differences between active and passive attack.

THANK YOU 