KEMBAR78
U1 Intro | PDF | Computer Network | Security
0% found this document useful (0 votes)
46 views81 pages

U1 Intro

The document outlines a course on Network Security, emphasizing the importance of protecting information systems against various threats such as viruses and hackers. It covers key concepts including the CIA triad (Confidentiality, Integrity, Availability), security attacks, services, and mechanisms, as well as the OSI Security Architecture. The course aims to provide practical knowledge and understanding of network security principles and practices over 45 hours of content.

Uploaded by

mdazmanalc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views81 pages

U1 Intro

The document outlines a course on Network Security, emphasizing the importance of protecting information systems against various threats such as viruses and hackers. It covers key concepts including the CIA triad (Confidentiality, Integrity, Availability), security attacks, services, and mechanisms, as well as the OSI Security Architecture. The course aims to provide practical knowledge and understanding of network security principles and practices over 45 hours of content.

Uploaded by

mdazmanalc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 81

Network Security

Network Security 1
Network Security
! keshav.dulal
✉ keshav.dulal@gmail.com

Network Security 2
Course Detail - Network Security (CSC-455)

Network Security 3
Why do we need
Network Security ?

Network Security 4
• Synopsis - Study of different network security concepts and
methods
• Goal - In this age of universal electronic connectivity, viruses
and hackers, electronic eavesdropping and electronic fraud,
security is paramount. This course provides a practical
survey of the principles and practice of network security.

Network Security 5
Course Content
8 Chapters - 45 hrs

Network Security 6
Course Content
1. Introduction
2. Key Management and Distribution
3. User Authentication Protocols
4. Transport Level Security
5. Wireless Network Security
6. Electronic Mail Security

Network Security 7
Unit 1 - Introduction to Network Security

Computer Security Concepts


The OSI Security Architecture
Security Attacks
Security Services
Security Mechanisms
A Model for Network Security

Network Security 8
Computer Security
Concepts

Network Security 9
Computer Security Concepts
A Definition of Computer Security
CIA Triad
The Challenges of Computer Security

Network Security 10
Definition - Computer Security
The protection afforded to an automated information system in
order to attain the applicable objectives of preserving the
integrity, availability, and confidentiality of information system
resources (includes hardware, software, firmware, information
data, and telecommunications).
- The NIST Computer Security Handbook [NIST95]

Network Security 11
CIA TRIAD
It is a model designed to guide policies
for information security within an
organization.

Confidentiality
Integrity
Availability

Network Security 12
1. Confidentiality
Data confidentiality

Assures that private or confidential information is not made available or


disclosed to unauthorized individuals.

Privacy

Assures that individuals control or influence what information related to


them may be collected and stored and by whom and to whom that
information may be disclosed.
Network Security 13
2. Integrity
Data integrity

Assures that information and programs are changed only in a specified and
authorized manner.

System integrity

Assures that a system performs its intended function in an unimpaired


manner, free from deliberate or inadvertent unauthorized manipulation of
the system.
Network Security 14
3. Availability

Assures that systems work promptly and service is not denied


to authorized users.

Network Security 15
Network Security 16
Additional Concepts
4. Authenticity
5. Accountability

Network Security 17
4. Authenticity

The property of being genuine and being able to be verified


and trusted; confidence in the validity of a transmission, a
message, or message originator. This means verifying that
users are who they say they are and that each input arriving at
the system came from a trusted source.

Network Security 18
5. Accountability

The security goal that generates the requirement for actions of an


entity to be traced uniquely to that entity. This supports
nonrepudiation, deterrence, fault isolation, intrusion detection and
prevention, and after-action recovery and legal action. Because
truly secure systems are not yet an achievable goal, we must be
able to trace a security breach to a responsible party. Systems
must keep records of their activities to permit later forensic
analysis to trace security breaches or to aid in transaction disputes.

Network Security 19
Daily Assignment

The challenges of computer security

Network Security 20
1. Security is not as simple as it might first appear to the novice. The requirements seem to be straightforward; indeed, most of the major requirements for security
services can be given self-explanatory, one-word labels: confidentiality, authentication, nonrepudiation, or integrity. But the mechanisms used to meet those
requirements can be quite complex, and understanding them may involve rather subtle reasoning.
2. In developing a particular security mechanism or algorithm, one must always consider potential attacks on those security features. In many cases, successful
attacks are designed by looking at the problem in a completely different way, therefore exploiting an unexpected weakness in the mechanism.
3. Because of point 2, the procedures used to provide particular services are often counterintuitive.Typically, a security mechanism is complex, and it is not obvious
from the statement of a particular requirement that such elaborate measures are needed. It is only when the various aspects of the threat are considered that
elaborate security mechanisms make sense.
4. Having designed various security mechanisms, it is necessary to decide where to use them. This is true both in terms of physical placement (e.g., at what points
in a network are certain security mechanisms needed) and in a logical sense [e.g., at what layer or layers of an architecture such as TCP/IP (Transmission Control
Protocol/Internet Protocol) should mechanisms be placed].
5. Security mechanisms typically involve more than a particular algorithm or protocol. They also require that participants be in possession of some secret
information (e.g., an encryption key), which raises questions about the creation, distribution, and protection of that secret information. There also may be a
reliance on communications protocols whose behavior may complicate the task of developing the security mechanism. For example, if the proper functioning of
the security mechanism requires setting time limits on the transit time of a message from sender to receiver, then any protocol or network that introduces
variable, unpredictable delays may render such time limits meaningless.
6. Computer and network security is essentially a battle of wits between a perpetrator who tries to find holes and the designer or administrator who tries to close
them. The great advantage that the attacker has is that he or she need only find a single weakness, while the designer must find and eliminate all weaknesses to
achieve perfect security.
7. There is a natural tendency on the part of users and system managers to perceive little benefit from security investment until a security failure occurs.
8. Security requires regular, even constant, monitoring, and this is difficult in today’s short-term, overloaded environment.
9. Security is still too often an afterthought to be incorporated into a system after the design is complete rather than being an integral part of the design process.
10. Many users and even security administrators view strong security as an impediment to efficient and user-friendly operation of an information system or use of
information.

Network Security 21
D2 - Agendas

1. The OSI Security Architecture

Network Security 22
The OSI Security Architecture
OSI: Open Systems Interconnection
• Defines a systematic approach of providing security
• Developed as an international standard
• Development of security features for products and services
are based on its structured definition

Network Security 23
The OSI Security Architecture
defines :
1. Security Attacks (2)
2. Security Services (5)
3. Security Mechanisms (8)

Network Security 24
Security Attacks
Any action that compromises the security of information
owned by an organization.

Network Security 25
Security Attacks !
• Passive Attacks
• Active Attacks

Network Security 26
Security Attacks
1. Passive Attacks
2. A passive attack attempts to learn or make use of information from the
system but does not affect system or its resources.
3. Difficult to detect as they do not involve alteration of data.
4. Preventable to some extent using encryption.
5. Active Attacks
6. An active attack attempts to alter system resources or affect their
operation.
Network Security 27
Passive Attacks
• Release of message Contents
• Traffic Analysis

Network Security 28
1.Release of message Contents

A telephone conversation, an electronic mail message, and a


transferred file may contain sensitive or confidential
information.

Network Security 29
Network Security 30
2.Traffic Analysis

• Subtle form of attack


• Determine location/origin of hosts
• Observe frequency and length of messages being
exchanged.

Network Security 31
Network Security 32
Active Attacks
• Masquerade
• Replay
• Modification of messages
• DOS (Denial of Service)

Network Security 33
1. Masquerade

• A masquerade takes place when one entity pretends to be a


different entity. A masquerade attack usually includes one of
the other forms of active attack.
• For example, authentication sequences can be captured
and replayed after a valid authentication sequence has
taken place, thus enabling an authorized entity with few
privileges to obtain extra privileges by impersonating an
entity that has those privileges.
Network Security 34
Network Security 35
2. Replay

Replay involves the passive capture of a data unit and its


subsequent retransmission to produce an unauthorized effect

Network Security 36
Network Security 37
3. Modification of messages

• Modification of messages simply means that some portion


of a legitimate message is altered, or that messages are
delayed or reordered, to produce an unauthorized effect.
• For example, a message meaning “Allow John Smith to read
confidential file accounts” is modified to mean “Allow Fred
Brown to read confidential file accounts.”

Network Security 38
Network Security 39
4. DOS (Denial of Service)

• The denial of service prevents the normal use of facilities.


This attack may have a specific target.
• It is the disruption of an entire network, either by disabling
the network or by overloading it with messages so as to
degrade performance.
• For example, an entity may suppress all messages directed
to a particular destination

Network Security 40
Network Security 41
The OSI Security Architecture:
1. Security Attacks (2) ✅
2. Passive Attacks ✓
3. Active Attacks ✓
4. Security Services (5)
5. Security Mechanisms (8)

Network Security 42
Security Services
Definition:

A processing or communication service that enhances the


security of the data processing systems and the information
transfers of an organization. The services are intended to
counter security attacks, and they make use of one or more
security mechanisms to provide the service.

Network Security 43
Security Services
• Authentication
• Access Control
• Data Confidentiality
• Data Integrity
• Nonrepudiation

Network Security 44
1. Authentication Service
• The assurance that the communicating entity is the one that it claims to be.
• In the case of a single message, such as a warning or alarm signal, the function of the
authentication service is to assure the recipient that the message is from the source that it
claims to be from.
• In the case of an ongoing interaction, such as the connection of a terminal to a host, two
aspects are involved.
• First, at the time of connection initiation, the service assures that the two entities are
authentic, that is, that each is the entity that it claims to be.
• Second, the service must assure that the connection is not interfered with in such a way that
a third party can masquerade as one of the two legitimate parties for the purposes of
unauthorized transmission or reception.

Network Security 45
Authentication Service
• Peer Entity Authentication
• Data Origin Authentication

Network Security 46
2. Access Control Service
• Access control is the ability to limit and control the access to
host systems and applications via communications links.
• To achieve this, each entity trying to gain access must first
be identified, or authenticated, so that access rights can be
tailored to the individual.
• For example, Access to internet of volume-based user is
determined by his/her volume usage.

Network Security 47
3. Data Confidentiality Service
• The protection of data from unauthorized disclosure.
• With respect to the content of a data transmission, several
levels of protection can be identified.

Network Security 48
Data Confidentiality
• Connection Confidentiality
The protection of all user data on a connection.
• Connectionless Confidentiality
The protection of all user data in a single data block
• Selective-Field Confidentiality
The confidentiality of selected fields within the user data on a connection.
• Traffic-Flow Confidentiality
The protection of the information that might be derived from observation of traffic
flows.
Network Security 49
4. Data Integrity Service
The assurance that data received are exactly as sent by an
authorized entity (i.e., contain no modification, insertion,
deletion, or replay).

Network Security 50
5. Nonrepudiation Service
Provides protection against denial by one of the entities
involved in a communication of having participated in all or
part of the communication.
Nonrepudiation prevents either sender or receiver from
denying a transmitted message.
Thus, when a message is sent, the receiver can prove that the
alleged sender in fact sent the message.

Network Security 51
The OSI Security Architecture:
1. Security Attacks (2) ✅
2. Security Services (5) ✅
3. Authentication Services ✓
4. Access Control Services ✓
5. Data Confidentiality Services ✓
6. Data Integrity Services ✓
7. Nonrepudiation Services ✓
8. Security Mechanisms (8)
Network Security 52
3. Security Mechanisms
Incorporated into the appropriate protocol layer in order to
provide some of the OSI security services.

Network Security 53
Security Mechanisms
• Encipherment
• Digital Signature
• Access Control
• Data Integrity
• Authentication Exchange
• Traffic Padding
• Routing Control
• Notarization
Network Security 54
1. Encipherment
The use of mathematical algorithms to transform data into a
form that is not readily intelligible. The transformation and
subsequent recovery of the data depend on an algorithm and
zero or more encryption keys.

Network Security 55
Network Security 56
2. Digital Signature
Data appended to, or a cryptographic transformation of, a data
unit that allows a recipient of the data unit to prove the source
and integrity of the data unit and protect against forgery (e.g.,
by the recipient).

Network Security 57
Network Security 58
3. Access Control
A variety of mechanisms that enforce access rights to
resources.

Network Security 59
4. Data Integrity
A variety of mechanisms used to assure the integrity of a data
unit or stream of data units.

Network Security 60
Network Security 61
5. Authentication Exchange
A mechanism intended to ensure the identity of an entity by
means of information exchange.

Network Security 62
6. Traffic Padding
The insertion of bits into gaps in a data stream to frustrate
traffic analysis attempts.

Network Security 63
Network Security 64
7. Routing Control
Enables selection of particular physically secure routes for
certain data and allows routing changes, especially when a
breach of security is suspected.

Network Security 65
8. Notarization
The use of a trusted third party to assure certain properties of a
data exchange.

Network Security 66
PERVASIVE SECURITY
MECHANISMS
Mechanisms that are not specific to any particular OSI security service or
protocol layer.

• Trusted Functionality
• Security Label
• Event Detection
• Security Audit Trail
• Security Recovery
Network Security 67
1. Trusted Functionality
That which is perceived to be correct with respect to some
criteria (e.g., as established by a security policy).

Network Security 68
2. Security Label
The marking bound to a resource (which may be a data unit)
that names or designates the security attributes of that
resource.

Network Security 69
3. Event Detection
Detection of security-relevant events.

Network Security 70
4. Security Audit Trail
Data collected and potentially used to facilitate a security
audit, which is an independent review and examination of
system records and activities.

Network Security 71
5. Security Recovery
Deals with requests from mechanisms, such as event handling
and management functions, and takes recovery actions.

Network Security 72
The OSI Security Architecture:
1. Security Attacks (2) ✅
2. Security Services (5) ✅
3. Security Mechanisms (8) ✅

Network Security 73
Network Security 74
A Model for Network
Security

Network Security 75
All the techniques for providing security
have two components:
1. Encryption - A security-related transformation on the information to be sent.
2. Examples include the encryption of the message, which scrambles the message
so that it is unreadable by the opponent, and the addition of a code based on the
contents of the message, which can be used to verify the identity of the sender.
3. Information - Some secret information shared by the two principals and, it is
hoped, unknown to the opponent.
4. An example is an encryption key used in conjunction with the transformation to
scramble the message before transmission and unscramble it on reception.

Network Security 76
Network Security 77
Four basic tasks in designing a
security service:
1. Design a good/secure algorithm.
2. Generate the necessary secret information.
3. Develop methods for distributing the secret information.
4. Specify a protocol to be used.

Network Security 78
Four basic tasks in designing a
security service:
1. Design an algorithm for performing the security-related transformation.
The algorithm should be such that an opponent cannot defeat its purpose.
2. Generate the secret information to be used with the algorithm.
3. Develop methods for the distribution and sharing of the secret information.
4. Specify a protocol to be used by the two principals that makes use of the
security algorithm and the secret information to achieve a particular
security service.

Network Security 79
Network Security 80
There is no substitute for
hard work.
— Thomas Edison

Network Security 81

You might also like