0% found this document useful (0 votes)
2 views

Examples of Security Mechanisms

The document outlines various security mechanisms including authentication services, confidentiality methods, integrity checks, access control measures, availability strategies, and non-repudiation techniques. It also discusses the importance of security policies that define rules for implementing these mechanisms and the role of event logging and auditing in monitoring security events. Examples provided include biometric authentication, digital signatures, firewalls, and intrusion detection systems.

Uploaded by

Raghad alshdefat
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Examples of Security Mechanisms

The document outlines various security mechanisms including authentication services, confidentiality methods, integrity checks, access control measures, availability strategies, and non-repudiation techniques. It also discusses the importance of security policies that define rules for implementing these mechanisms and the role of event logging and auditing in monitoring security events. Examples provided include biometric authentication, digital signatures, firewalls, and intrusion detection systems.

Uploaded by

Raghad alshdefat
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 16

Network Security 1304410

Lecture 2: Examples on Security


Mechanisms, Policy and Auditing
Examples on Security Mechanisms
• For Authentication Service:
– Password
– Digital Signature
– Biometric authentication (e.g. finger print,
face, etc…)
• For Confidentiality:
– Cryptography
– Steganography
Example on Biometric
Authentication
• Finger print authentication, e.g.

Fingerprint Image processing


OK or
image DB
And pattern recognition Not OK
Example digital signature validation using digital certificate
Example: Using symmetric key
cryptography for confidentiality

Plaintext cipertext Plaintext


Examples on Security Mechanisms
• For Integrity:
– Classical CRC and ECC Codes
– Message Authentication Codes
– One Way Hash Functions
• For Access Control:
– Firewall, Proxy,…
– Intrusion Detection and Prevention System
– File System Privileges
–…
Example standalone network
firewall box, cisco pix

Programmed using cisco IOS commands: e.g.


access-list ICMP-ACL permit icmp test address
inside address range
access-group ICMP-ACL in interface outside
Example on access control in the
operating system
• Windows NTFS
access control
Examples on Security Mechanisms
• For Availability:
– Intrusion Prevention System (IPS)
– Distributed Server Architecture
– Uninterruptible Power Supplies (UPS)
– Storage Replication
–…
• For Non-Repudiation
– Digital Signature
Example on Availability
Mechanisms
• Uninterruptible Power Supply
Example on IDS/IPS,
snort program
Security Policy
• A formal set of rules to specify the way
security mechanisms should be
implemented.
• Rules are set by the manager and
implemented by the administrator.
Examples on Security Policy
For Authentication:
• Use Passwords
• Password Length > 8 characters
• Password Should be changed monthly
• Number of failing attempts < 5
• More than five failing attempts result in
account lockout.
Example on a Security Policy
Windows XP/2000/NT local security policy
Event Logging and Auditing
• Event Logging: recording events of interest for all or some users, or
network traffic which may include malicious attempt
Example:
The Output from a Cisco PIX Firewall's show conn Command •
TCP out xx.yy.zz.129:5190 in 172.16.1.33:1960 idle 629:25:50 •
Bytes 6737 flags UIO
TCP out xx.yy.zz.254:23 in 172.16.1.88:1053 idle 0:11:33 Bytes •
226696 flags UIO
TCP out xx.yy.zz.254:23 in 172.16.1.76:1146 idle 256:09:15 Bytes •
78482 flags UIO
TCP out xx.yy.zz.254:23 in 172.16.1.100:1660 idle 145:21:19 Bytes •
9657 flags UIO
TCP out xx.yy.zz.254:23 in 172.16.1.100:1564 idle 641:51:05 Bytes •
132891 flags UIO
UDP out xx.yy.zz.12:137 in 172.16.1.12:137 idle 0:00:03 flags •
Example Audit Policy
(what events to record and what events to ignore)

You might also like