Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Sixth Edition by William Stallings.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Lecture 1: Overview modified from slides of Lawrie Brown.
Introduction to network security
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Computer and Information Security
Computer and Information Security Jen-Chang Liu, 2004
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Information Security Principles (ESGD4222)
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Computer Engineering II Computer and Network Security Rabie A. Ramadan
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Network Security Essentials Chapter 1
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Introduction to Computer and Network Security
Network Security Essentials Chapter 1
Chapter 1 Overview. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Introduction
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Introduction to Network Systems Security Mort Anvari.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Introduction (Pendahuluan)  Information Security  Criptography.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Cryptography and Network Security
Computer and Network Security
CS 395: Topics in Computer Security
Data & Network Security
Cryptography and Network Security
Data & Network Security
CNET334 - Network Security
Computer and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Qishi Wu University of Memphis
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Security Attacks, Mechanisms, and Services
Cryptography and Network Security
Security Attacks Network Security.
Cryptography and Network Security Chapter 1
Presentation transcript:

Computer and Network Security Rabie A. Ramadan

Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,” Fourth Edition Behrouz A. Forouzan, “Cryptography and Network Security,” 2008 Edition Charles P. Pfleeger and Shari L. Pfleeger, “Security in Computing,” third addition

Course Contents 3 Introduction to Cryptography Authentication Functions Symmetric Key-Exchange Protocols Asymmetric Key-Distribution and Cryptography Network Layer Security Transport Layer Security Introduction to wireless network security

Exams 4 Do not worry about the exam as long as : You are attending Done with your project Done with your presentation Assignments are delivered

Projects or Term Papers 5 There will be a term project Only 2 persons per project You can select your own project after my approval Project report must follow IEEE format Deadline of the projects proposal is two weeks from today Suggested Projects and Term Papers

Table of Contents 6 Introduction Security Goals Attacks Services and Mechanisms Security mechanisms Techniques

Introduction 7 The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. —The Art of War, Sun Tzu

Introduction 8 In old days, to be secure, Information maintained physically on a secure place Few authorized persons have access to it (confidentiality) Protected from unauthorized change (integrity) Available to authorized entity when is needed (availability) Nowadays, Information are stored on computers Confidentiality are achieved  few authorized persons can access the files. Integrity is achieved  few are allowed to make change Availability is achieved  at least one person has access to the files all the time

Introduction 9 Achieving Confidentiality, Integrity, availability is a challenge: Distributed information Could be captured while it is transmitted Could be altered Could be blocked

Security Goals 10 Confidentiality Ensures that computer-related assets are accessed only by authorized parties. Sometimes called secrecy or privacy. Integrity Assets can be modified only by authorized parties or only in authorized ways. Availability assets are accessible to authorized parties at appropriate times. The opposite is denial of service.

Security Goals 11 Strong protection is based on Goals relations

Goals are Applied to 12 Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers Network Security - measures to protect data during their transmission Internet Security - measures to protect data during their transmission over a collection of interconnected networks

Our Aim of this Part 13 Our main concern is: Network and Internet Security Protecting the information while it is transmitted Will touch the computer security Presentations Assignments Projects

Threats, vulnerability, and Attacks 14 Crossing the water to the right is a Threat to the man. Ex. (Computer) software failures Crossing the water through the wall crack is a Vulnerability. Ex. (Computer) Open ports Somebody or another system destroyed the wall is an Attack Ex. (Computer) sending an overwhelming set of messages to another system to block it.

Attacks 15 Passive Attacks Attempts to learn or make use of information from the system but does not affect system resources. Eavesdropping or monitoring of transmissions Active Attacks Attempts to alter system resources or affect their operation.

Passive Attacks 16 Release of message contents / snooping

Passive Attacks (Cont.) 17 Traffic Analysis/ spoofing Passive Attacks are hard to be detected

Active Attacks 18 Masquerade One entity pretends to be a different entity

Active Attacks (Cont.) 19 Replay Attack Passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

Active Attacks (Cont.) 20 Modification Attack Some portion of a legitimate message is altered, or that messages are reordered, to produce an unauthorized effect

Active Attacks (Cont.) 21 Denial of Service Prevents or inhibits the normal use or management of communications facilities

Group Activities 22 Which of the following attacks is a threat to which of the security goals? AttacksSecurity Goals ModificationConfidentiality MasqueradingIntegrity Traffic AnalysisAvailability Denial of service Replaying Snooping

Answer 23 Security Attacks Snooping Traffic Analysis Modification Masquerading Replaying Denial of Service ConfidentialityIntegrityAvailability