Lecture 07
Lecture 07
SECURITY
REQUIREMENTS OF SECURITY OVER THE
INTERNET
Privacy
The ability to control who sees(or cannot see) information and
under what terms.
Authenticity
The ability to know the identities of communicating parties.
Integrity
The assurance that stored or transmitted information is unaltered.
Availability
The ability to know when information and communication services
will(or will not be ) available.
Blocking
The ability to block unwanted information or intrusions.
SECURITY AT DIFFERENT LEVELS /
TYPES OF SECURITY
Network security
Firewalls
Kerberos
Biometrics
Steganography
Transaction security
Encryption
Digital signatures
Digital certificates
Security over the web
SSL
SET
NETWORK SECURITY
The goal of network security is to allow
authorized users access to information and
services while preventing unauthorized users
from gaining access to and possibly corrupting,
the network.
Such systems record all network traffic flowing through the firewall
in a file or database for auditing purposes.
It records the name of the file accessed, the domain name that the
user came in on, the exact second of the access and the number of
bytes transmitted.
BENEFITS OF ANALYZING THE AUDIT
LOG
What are the peak demand hours?
What directories and pages are most frequently requested?
How many times was the homepage requested?
Does the website have any broken content links?
What browsers are visitors using?
How many requests for product information have been received this
week?
How does that compare to last week?
What type of Information is being requested by existing customers?
By competitors?
IP PACKET SCREENING ROUTERS
The screening router (also called a packet-filtering
gateway) is the simplest firewall.