CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication E-Mail Security E-Mail Security Secure Sockets Layer Secure.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Encrypting Wireless Data with VPN Techniques
Internet Protocol Security (IP Sec)
IPSec.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
SCSC 455 Computer Security Virtual Private Network (VPN)
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Principles of Information Security, 2nd edition1 Cryptography.
Lecture 22 Internet Security Protocols and Standards
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Secure connections.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chapter 13 – Network Security
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
TCP/IP Protocols Contains Five Layers
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Security in many layers  Application Layer –  Transport Layer - Secure Socket Layer  Network Layer – IPsec (VPN)  Link Layer – Wireless Communication.
Understand Internet Security LESSON Security Fundamentals.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
IPSec Detailed Description and VPN
Security Protocols in the Internet
Cryptographic Protocols
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Unit 8 Network Security.
Lecture 36.
Lecture 36.
Presentation transcript:

CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure Sockets Layer IP Security IP Security Wireless Security Wireless Security

ENCRYPTION Page 193Chapter 8CS 447 The ease of access provided by most Medium Access Control protocols makes it essential that security measures be taken to protect messages from unauthorized access. The most common security technique in modern network protocols is public key encryption. Each user is provided with two “keys”, complex mathematical algorithms that, when applied individually to a message, will encrypt the message and that, when applied together (in either order) to a message, will restore the original message. Each user makes one of the keys publicly available for anyone to use, and the other is kept private by the user. To ensure that only the receiver can read a message, the sender encrypts that message with the receiver’s public key, which only the receiver’s private key can decrypt.

AUTHENTICATION Page 194Chapter 8CS 447 Another aspect of security that concerns network users is authentication, ensuring that the sender of a received message is actually correctly identified. Public and private keys may be used to implement this, too. The sender applies his own private key to the outgoing message and the receiver applies the sender’s public key to the message to restore it. Since only a message that was encoded with the sender’s private key (which only the sender possesses) could be decoded with the sender’s public key, the receiver is assured that the appropriate sender transmitted the message.

DOUBLE PROTECTION Page 195Chapter 8CS 447 To implement both security and authentication, the sender may apply his own private key and then the receiver’s public key. The receiver will take the received message and apply his private key to it, knowing that his unique ability to do so is what guarantees security. The receiver will apply the sender’s public key to what’s left, knowing that the resulting mesage will only make sense if it actually came from the designated sender.

PRIVACY Page 196Chapter 8CS 447 Applying cryptographic algorithms to electronic mail, systems like PGP (Pretty Good Privacy) have been developed to improve security.

SECURE SOCKETS LAYER (SSL) Page 197Chapter 8CS 447 SSL (like its successor, TLS - Transport Layer Security) combines encryption and authentication to provide secure communication for IP data transfers (e.g., Web browsing, e- mail, instant messaging, IP fax)

IP SECURITY (IPSEC) Page 198Chapter 8CS 447 IPv4 uses the Encapsulating Security Payload (ESP) technique to add encryption and authentication to its datagrams via its optional header approach (IPv6 requires its use).

WI-FI PROTECTED ACCESS (WPA) Page 199Chapter 8CS 447 The IEEE i standard was developed to address the various threats against wireless LAN security.

ESTABLISHING SECURE WPA CONNECTIONS Page 200Chapter 8CS The access point periodically transmits a beacon through which it is located and identified by the wireless station. 2.Using an authentication key stored in the station and the authentication server, the station proves its identity. 3.Once authenticated, the station and the authentication server derive cryptographic keys to enable secure communication. 4.Using negotiated encryption/ authentication techniques, data is transferred to the access point, decrypted, and then forwarded to the destination station. 5.Deauthentication and key destruction occur when the wireless connection ends.