Security Attacks Network Security.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Sixth Edition by William Stallings.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Lecture 1: Overview modified from slides of Lawrie Brown.
Introduction to network security
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Applied Cryptography for Network Security
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Introduction to Computer and Network Security
Network Security Essentials Chapter 1
1 Introduction to Network Security Spring Outline Introduction Attacks, services and mechanisms Security threats and attacks Security services.
1 Introduction to Information Security Spring 2012.
Network security Network security. Look at the surroundings before you leap.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Introduction
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Introduction (Pendahuluan)  Information Security  Criptography.
Network Security Overview
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
CS457 Introduction to Information Security Systems
Cryptography and Network Security
Information System and Network Security
Data & Network Security
Introduction to Information Security
CNET334 - Network Security
BINF 711 Amr El Mougy Sherif Ismail.
Information and Network Security
10CS835 Information Security
Computer Security Security Concepts September 20, 2018
NET 311 Information Security
Computer and Network Security
Introduction to Computer and Network Security
Cryptography and Network Security Chapter 1
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Cryptography and Network Security Chapter 1
Lecture 1: Foundation of Network Security
Cryptography and Network Security
Cryptography : Introduction
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Security Attacks, Mechanisms, and Services
Cryptography and Network Security
Security Mechanisms Network Security.
Confidentiality, Integrity, Nonrepudiation
A Model For Network Security
Message Authentication
Presentation transcript:

Security Attacks Network Security

Objectives of the Topic Security Attacks Objectives of the Topic After completing this topic, a student will be able to describe the security attacks.

Figures and material in this topic have been Security Attacks Figures and material in this topic have been adapted from “Network Security Essentials: Applications and Standards”, 2014, by William Stallings.

Security Attacks According to the OSI Architecture X.800, security attacks can be classified in two categories: passive attacks, and active attacks

Security Attacks A passive attack attempts to learn or make use of information from the system but does not affect system resources. An active attack attempts to alter system resources or affect their operation.

Security Attacks Passive Attacks: Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted.

Security Attacks Passive Attack

Security Attacks There are two types of passive attacks release of message contents, and traffic analysis.

Release of message contents: Security Attacks Release of message contents: A telephone conversation, an e-mail message, and a transferred file may contain confidential info. Prevent an opponent from learning contents of these transmissions.

Security Attacks Traffic Analysis: Even if contents of messages are encrypted, an opponent might still be able to observe the pattern of these messages.

Security Attacks He could determine the location and identity of communicating hosts and could observe the frequency and length of messages being exchanged. He can guess the nature of the communication.

Security Attacks Passive attacks do not alter the data. Neither the sender nor receiver is aware that a third party has observed the traffic pattern. Emphasis is on prevention rather than detection. Use Encryption.

Security Attacks Active Attacks: Active attacks involve some modification of the data stream or the creation of a false stream.

Security Attacks Active Attack

Security Attacks Active attacks can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service.

Security Attacks Masquerade: It takes place when one entity pretends to be a different entity. It usually includes one of the other forms of active attack.

Security Attacks Replay: It involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

Modification of messages: Security Attacks Modification of messages: It simply means that some portion of a legitimate message is altered, or that messages are delayed or reordered, to produce an unauthorized effect.

Security Attacks Denial of Service: It prevents or inhibits the normal use or management of communications facilities. E.g. an entity may suppress all messages directed to a particular destination.

Security Attacks Active Attacks are difficult to prevent because of the wide variety of potential physical, software, and network vulnerabilities. Goal is to detect attacks and to recover from any disruption or delays caused by them. End