The document discusses a network security course, including grading, textbooks, course outlines, and topics like cryptography, symmetric and public key encryption, network security applications, and system security. It provides details on the course structure, chapters to be covered, and security concepts like the OSI security architecture, security attacks, services, and mechanisms.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
21 views44 pages
Cys505 Lecture01
The document discusses a network security course, including grading, textbooks, course outlines, and topics like cryptography, symmetric and public key encryption, network security applications, and system security. It provides details on the course structure, chapters to be covered, and security concepts like the OSI security architecture, security attacks, services, and mechanisms.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44
CYS505 Network Security
Prepared By: Dr. Ihab ELAFF
What ? Why ? How? Grading System Text Books Course Outlines Grading Item Marks Homework 10 Presentations 20 Midterm Exam 30 Final Exam 40 Total 100 Cryptography and Network Security Principles and Practices, Fourth Edition, By William Stallings Part One: Symmetric Ciphers [Ch2 – Ch7] Part Two: Public-Key Encryption and Hash Functions [Ch8 – Ch13] Part Three: Network Security Applications [Ch14 – Ch17] Part Four: System Security [Ch18 – Ch20] Week Subjects 1 Introduction Ch1 2 Classical Encryption Techniques, and Block Ciphers and the Ch2, Ch3 Data Encryption Standard 3 Finite Fields and Advanced Encryption Standard, Ch4, Ch5 4 More on Symmetric Ciphers and Confidentiality Using Ch6, Ch7 Symmetric Encryption 5 Public-Key Cryptography and RSA and Public-Key Ch8 – Ch10 Cryptosystems 6 Message Authentication and Hash Functions, Hash and MAC Ch11 - Ch13 Algorithms and Digital Signatures and Authentication Protocols. 7 MIDTERM EXAM 8 Authentication Applications Ch14 9 Electronic Mail Security Ch15 10 IP Security Ch16 11 Web Security Ch17 12 Intruders Ch18 13 Malicious Software Ch19 14 Firewalls Ch20 FINAL EXAM Information Security requirements have changed in recent times Traditionally provided by physical and administrative mechanisms Computer use requires automated tools to protect files and other stored information Use of networks and communications links requires measures to protect data during transmission Computer Security - generic name for the collection of tools designed to protect data from hackers Network Security - measures to protect data during their transmission Internet Security - measures to protect data during their transmission over a collection of interconnected networks 1. The OSI Security Architecture 2. Security Attacks 3. Security Services 4. Security Mechanisms 5. Model for Network Security 1. The OSI Security Architecture 2. Security Attacks 3. Security Services 4. Security Mechanisms 5. Model for Network Security ITU-T Recommendation X.800, Security Architecture for OSI, defines such a systematic approach. The OSI security architecture is useful to managers as a way of organizing the task of providing security. The OSI security architecture provides a useful, if abstract, overview of many of the concepts that this book deals with. The OSI security architecture focuses on security attacks, services and mechanisms. Threat: A potential for violation of security, which exists when there is a circumstance, capability, action. (threat is a possible danger that might exploit a vulnerability).
Attack: An intelligent act that is a
deliberate attempt to evade security services and violate the security policy of a system. 1. The OSI Security Architecture 2. Security Attacks 3. Security Services 4. Security Mechanisms 5. A Model for Network Security Any action that compromises the security of information owned by an organization Information security is about how to prevent attacks, or failing that, to detect attacks on information-based systems Have a wide range of attacks Can focus of generic types of attacks Passive Attacks Active Attacks Passive Attacks Passive Attacks Passive Attacks Active Attacks Active Attacks Active Attacks Active Attacks Active Attacks 1. The OSI Security Architecture 2. Security Attacks 3. Security Services 4. Security Mechanisms 5. Model for Network Security X.800: defines a security service as a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers. RFC 2828 (Request for Comments): defines a security service as a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented by security mechanisms. 1. Authentication 2. Access Control 3. Data Confidentiality 4. Data Integrity 5. Nonrepudiation 6. Availability 1. The OSI Security Architecture 2. Security Attacks 3. Security Services 4. Security Mechanisms 5. Model for Network Security A mechanism that is designed to detect, prevent, or recover from a security attack No single mechanism that will support all functions required However one particular element underlies many of the security mechanisms in use: cryptographic techniques. Specific Security Mechanisms Pervasive Security Mechanisms 1. The OSI Security Architecture 2. Security Attacks 3. Security Services 4. Security Mechanisms 5. Model for Network Security