Introduction to Course Network Security
Introduction to Course Objectives of the Topic After completing this topic, a student will be able to get motivated, describe learning outcomes and describe the text and references books.
Introduction to Course Motivation Before the widespread use of data processing equipment, security of information was provided primarily by physical and administrative means. E.g. rugged filing cabinets with locks
Introduction to Course Requirements for information security have undergone two major changes: a) As the computers were introduced, a need for protecting information stored on the shared computers was felt – Computer Security.
Introduction to Course b) As networks and communications facilities for carrying data from one computer to another were introduced, a need for protecting data during their transmission was felt – Network or Internet security.
Introduction to Course Stored data: Business data must not be leaked to competitors Personal information Copyrighted software
Introduction to Course Security Violations: Some Examples User A transmits a file to user B. User C, who is not authorized to read the file, is able to capture a copy of the file during its transmission – eavesdropping
Introduction to Course User D transmits a message to a computer E. User F intercepts the message, alters its contents and then forwards the message to E, which accepts the message as coming from D – Man-in-the-middIe Attacks.
Introduction to Course It is also possible that user F constructs its own message and transmits that message to E as if it had come from computer D.
Introduction to Course Some Other Common attacks Cryptanalysis Password Pilfering Intrusion Denial of Service Attacks Malicious software
Introduction to Course Security Breaches can result in Financial loss for corporations Theft of intellectual property Lawsuits Threat to public safety
Introduction to Course The field of network and Internet security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
Introduction to Course Required Books W. Stallings, “Network Security Essentials: Applications and Standards”, Pearson Education, 2014 “CCNA Security 1.1 Student Packet Tracer Manual ” Cisco Networking Academy, 2012
Introduction to Course Reference Books W. Stallings, “Cryptography and Network Security Principles and Practice”, Pearson Education, 2014
Introduction to Course Course Composition: Two parts Part 1 will provide a practical survey of network security applications and standards. It has been sub-divided into 3 subparts.
Introduction to Course Subpart1: Cryptography Symmetric Encryption principles Public-Key Cryptography and message authentication
Introduction to Course Subpart2: Network Security Applications Key distribution and user authentication Network Access Control and cloud Security Transport-level Security Wireless Net. Security
Introduction to Course Subpart2: Network Security Applications Electronic Mail Security IP Security
Introduction to Course Subpart3: System Security Malicious Software Intrusions Firewalls
Introduction to Course In Part 2, we will perform lab experiments to configure networks employing Cisco components for various security aspects. Packet Tracer will be used.
Introduction to Course Grading Policy Assignments + Quizzes = 15% Mid Term Exam = 35% Final Term Exam = 50% End