Security network management

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Database Administration and Security Transparencies 1.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Chapter 1 – Introduction
CSA 223 network and web security Chapter one
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
MJ10/07041 Session 10 Accounting, Security Management Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used.
CPE 5002 Network security. Look at the surroundings before you leap.
Security Chapter 15. Computer and Network Security Requirements Confidentiality –Requires information in a computer system only be accessible for reading.
Applied Cryptography for Network Security
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
What does “secure” mean? Protecting Valuables
Protection & Security Introduction to Operating Systems: Module 16.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Network security Network security. Look at the surroundings before you leap.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
NETWORK CONTROL The Fourth Meeting. 2 Table of Contents  Introduction  Configuration Control  Security Control.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Information Security in Distributed Systems Distributed Systems1.
Chap1: Is there a Security Problem in Computing?.
Ch 13 Trustworthiness Myungchul Kim
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo
Cryptography and Network Security
Securing Network Servers
Information System and Network Security
Secure Software Confidentiality Integrity Data Security Authentication
CS 450/650 Fundamentals of Integrated Computer Security
INFORMATION SYSTEMS SECURITY and CONTROL
Introduction to Cryptography
Mohammad Alauthman Computer Security Mohammad Alauthman
Cyber Security For Civil Engineering
Cryptography and Network Security
Introduction to Course
A Model For Network Security
Presentation transcript:

Security network management Network Management week 12 Security network management Aisyatul Karima,

Outline Security Threats Control Access Security Methode

Security Management What should be secured in networks? information security computer security network security

Security Requirements Secrecy making information accessible to only authorized users includes the hiding of the existence of information Integrity making information modifiable to only authorized users Availability making resources available to only authorized users

Security Threats Interruption destroyed or becomes unavailable or unusable threat to “availability” Interception an unauthorized party gains access threat to “secrecy” Modification an unauthorized party makes modification threat to “integrity” Fabrication an unauthorized party inserts false information Masquerade an entity pretends to be a different entity

Types of Security Threats

Security Threats and Network Assets

Security Management Functions Maintain Security Information event logging, monitoring usage of security-related resources receiving notification and reporting security violations maintaining and examining security logs maintaining backup copies of security-related files Control Resource Access Service use access control (authentication and authorization) security codes (e.g., passwords) routing tables, accounting tables, etc. Control the Encryption Process must be able to encrypt messages between managers & agents specify encryption algorithms

Summary Network control is concerned with setting and changing parameters of various parts of network resources as consequences of network monitoring and analysis Configuration control and security control are two essential aspects of network control

Control Access Using Firewall Using SNMP