Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: 0136108059 ISBN-13: 9780136108054.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Sixth Edition by William Stallings.
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Editied by R. Newman.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
C OMPUTER S ECURITY C ONCEPTS By: Qubilah D’souza TE computer.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Network Security Essentials Chapter 1
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Network Security Overview
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cybersecurity and People: Challenges in Predicting User Actions Joachim Meyer Dept. of Industrial Engineering Fleischman School of Engineering Tel Aviv.
CS457 Introduction to Information Security Systems
Data & Network Security
Information System and Network Security
COMPUTER SECURITY CONCEPTS
Information Security.
Data & Network Security
Chapter 5 Electronic Commerce | Security
CNET334 - Network Security
Information and Network Security
NET 311 Information Security
Computer and Network Security
Chapter 5 Electronic Commerce | Security
Lecture 1: Foundation of Network Security
Another perspective on Network Security
Cryptography and Network Security
Cryptography and Network Security
Confidentiality, Integrity, Nonrepudiation
Definition Of Computer Security
Presentation transcript:

Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13: Publisher: Prentice Hall Copyright: 2011 Format: Paper; 432 pp Published: 03/12/2010

The Security Requirements Triad Computer Security The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications) IPS-PUB-199-final.pdf

Security Requirements Confidentiality – Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. Integrity – Guarding against information modifications or destruction, including ensuring information non- repudiation and authenticity. Availability – Ensuring timely and reliable access to and use of information

Security Attacks, Mechanisms & Services Security Attack – Any action that compromises the security of information Security Mechanism – A process / device that is designed to detect, prevent or recover from a security attack. Security Service – A service intended to counter security attacks, typically by implementing one or more mechanisms.

Threats & Attacks … but threat and attack used nearly interchangeably

Security Threats / Attacks ……

Passive Attacks

Active Attacks (1)

Active Attacks (2)

Security Services (X.800) Authentication – The assurance that the communicating entity is the one it claims to be Access Control – The prevention of unauthorized use of a resource who can have access to a resource, under what conditions access can occur, what those accessing the resource are allowed to do Data Confidentiality – The protection of data from unauthorized disclosure Data Integrity – The assurance that data received are exactly as sent by an authorized entity (i.e., contains no modification, insertion, deletion or replay). Non-Repudiation – Provides protection against denial by one of the entities involved in a communication of having participated in all/part of the communication.

Security Mechanisms (X.800)

Model for Network Security

The Human Element “Humans are incapable of securely storing high-quality cryptographic keys, and they have unacceptable speed and accuracy when performing cryptographic operations. (They are also large, expensive to maintain, difficult to manage, and they pollute the environment. It is astonishing that these devices continue to be manufactured and deployed. But they are sufficiently pervasive that we must design our protocols around their limitations.)” -- C. Kaufman, R. Perlman, and M. Speciner. Network Security: Private Communication in a Public World, 2/E Kaufman, Perlman & Speciner Prentice Hall, 2003

Understanding Opponents Anatomy of an Attack Phase 1: Reconnaissance Phase 2: Scanning Phase 3: Gaining Access Phase 4: Maintaining Access Phase 5: Covering Tracks and Hiding Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2/E Skoudis & Liston Prentice Hall, 2006

Network Security Jobs