Computer Science and Engineering Computer System Security CSE 5339/7339 Session 23 November 9, 2004.

Slides:



Advertisements
Similar presentations
IP Protocol - Introduction Dr. Farid Farahmand. Introduction TDM transport networks are not sufficient for data communications Low utilization TDM networks.
Advertisements

1 Computer Networks IP: The Internet Protocol. 2 IP is a connection-less, unreliable network layer protocol IP provides best effort services in the sense.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
Review on Networking Technologies Linda Wu (CMPT )
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
COMPUTER NETWORKS.
NETWORKING CONCEPTS. TCP/IP The TCPIIP protocol suite was developed prior to the OSI model TCP/IP protocol suite was defined as having four layers: Host-to-network,
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Internet Vulnerabilities & Criminal Activities 1.2 – 9/12/2011 Structure of Internet Communications 1.2 – 9/12/2011 Structure of Internet Communications.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 24 November 11, 2004.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Chapter 9.
Chapter 2 Network Models
Lect1..ppt - 01/06/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 2 Protocols and the TCP/IP Suite by Zornitza Genova Prodanoff.
1 Review - OSI Model n OSI Reference Model u represents the communications process. u 7 layers: physical, data link, network, transport, session, presentation.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 28 (last) November 30, 2004.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
William Stallings Data and Computer Communications
Communication Networks - Overview CSE 3213 – Fall November 2015.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
Telecommunications Essentials John R. Durrett July 5, 2005.
DIYTP Network Basics  How do computers communicate?  Network Interface Card (NIC)  Media Access Control Address (MAC)  Unique to each NIC 
Network Basics CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Chapter 5 Network and Transport Layers
Computer Networks.
NETWORK Unit 1 Module: 2 Objective: 7.
A quick intro to networking
What the OSI Protocol Layers Do
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
TCP/IP Explored Jun Wu 11/11/2018.
POWERPOINT PRESENTATION ON NETWORKING Presented by Ms
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
Network Model.
TCP/IP Protocol Suite: Review
NETWORK Unit 1 Module: 2 Objective: 7.
NETWORK Unit 1 Module: 2 Objective: 7.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
OSI Reference Model Unit II
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Unit – III Network Essentials
Presentation transcript:

Computer Science and Engineering Computer System Security CSE 5339/7339 Session 23 November 9, 2004

Computer Science and Engineering Contents  A6 Q/A  Database Security (cont.)  Security in Networks  Group Work  Wenyi’s presentation

Computer Science and Engineering Proposal for Multilevel security  Partitioning (Separation)  The database is divided into several databases, each at its own level of security  Encryption (Separation)  Sensitive data are encrypted  Each level of sensitive data can be stored in a table encrypted under a key unique to the level of sensitivity

Computer Science and Engineering Integrity Lock (Spray Paint)  The lock is a way to provide both integrity and limited access for a database  At the US Air Force Summer Study on DB Security Secret Agent10FBTS Data ItemSensitivityChecksum

Computer Science and Engineering Cryptographic Checksum  Data item  plain text  Sensitivity  unforgeable -- unique – concealed  Checksum  record number, attribute name, data item, sensitivity Secret Agent10FBTS Data ItemSensitivityChecksum AssignmentR07 Record numberAttribute name Checksum

Computer Science and Engineering Security Lock  Combination of a unique identifier (record number) and the sensitivity level  Graubert and Kramer Secret AgentTS Data ItemSensitivitySensitivity lock R07 Record number Encryption Function Key

Computer Science and Engineering Short Term Solution Untrusted DB manager Users Trusted Access Controller Sensitive database

Computer Science and Engineering Trusted Front End Untrusted DB manager Users Trusted Access Controller Sensitive databaseTrusted Front End

Computer Science and Engineering Commutative Filters  The filter screens the user’s request, reformats it so that only data of an appropriate sensitivity level are returned. Retrieve NAME where ((OCCUP = engineer) and (CITY = WashDC) retrieve NAME where ((OCCUP = engineer) and (CITY = WashDC) from all records R where (NAME-SEC-LEVEL (R )  USER-SEC-LEVEL) and (OCCUP-SEC-LEVEL (R )  USER-SEC-LEVEL) and (CITY-SEC-LEVEL (R )  USER-SEC-LEVEL)

Computer Science and Engineering Computer Network Basics  Wide Area Networks (WAN)  Metropolitan Area Network (MAN)  Local Area Network (LAN)  System or Storage Area Network (SAN)

Computer Science and Engineering Routing Schemes  Connection-oriented The entire message follows the same path from source to destination.  Connectionless A message is divided into packets. Packets may take different routes from source to destination Serial number

Computer Science and Engineering Network Performance  Gilder’s Law George Gilder projected that the total bandwidth of communication systems triples every twelve months. Ethernet: 10Mbps  10Gbps (1000 times) CPU clock frequency: 25MHz  2.5GHz (100 times)  Metcalfe's Law Robert Metcalfe projected that the value of a network is proportional to the square of the number of nodes Internet

Computer Science and Engineering Internet Internet is the collection of networks and routers that form a single cooperative virtual network, which spans the entire globe. The Internet relies on the combination of the Transmission Control Protocol and the Internet Protocol or TCP/IP. The majority of Internet traffic is carried using TCP/IP packets.

Computer Science and Engineering Country Internet Users Latest Data Population ( 2004 Est. ) % of Population United States209,518,183294,540, % China79,500,0001,327,976, % Japan63,884,205127,944, % Germany45,315,16682,633, % United Kingdom35,089,47059,157, % South Korea29,220,00047,135, % France22,534,96759,494, % Brazil20,551,168183,199, % Italy19,900,00056,153, % Canada16,841,81132,026, %

Computer Science and Engineering ISO OSI Network Model Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical LAN Internet

Computer Science and Engineering Mail ftp Telnet Transmission Control Protocol (TCP) Internet Protocol (IP) Ethernet Token ring TCP/IP

Computer Science and Engineering Addressing  MAC (Media Access Control) address Every host connected to a network has a network interface card (NIC) with a unique physical address.  IP address IPv4  32 bits ( ) IPv6  128 bits

Computer Science and Engineering IP Protocol  Unreliable packet delivery service  Datagram (IPv4) Service TypeVERSHLENTOTAL LENGTH IDENTIFICATIONFLAGSFRAGMENT OFFSET TIME TO LIVEPROTOCOLHEADER CHECKSUM SOURCE ADDRESS DESTINATION ADDRESS PADDINGOPTIONS (IF ANY) DATA

Computer Science and Engineering Group Work  Discuss possible attacks on IP.  IP Spoofing  Teardrop attacks