The document outlines various security mechanisms including authentication services, confidentiality methods, integrity checks, access control measures, availability strategies, and non-repudiation techniques. It also discusses the importance of security policies that define rules for implementing these mechanisms and the role of event logging and auditing in monitoring security events. Examples provided include biometric authentication, digital signatures, firewalls, and intrusion detection systems.
Download as PPT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
2 views
Examples of Security Mechanisms
The document outlines various security mechanisms including authentication services, confidentiality methods, integrity checks, access control measures, availability strategies, and non-repudiation techniques. It also discusses the importance of security policies that define rules for implementing these mechanisms and the role of event logging and auditing in monitoring security events. Examples provided include biometric authentication, digital signatures, firewalls, and intrusion detection systems.
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 16
Network Security 1304410
Lecture 2: Examples on Security
Mechanisms, Policy and Auditing Examples on Security Mechanisms • For Authentication Service: – Password – Digital Signature – Biometric authentication (e.g. finger print, face, etc…) • For Confidentiality: – Cryptography – Steganography Example on Biometric Authentication • Finger print authentication, e.g.
Fingerprint Image processing
OK or image DB And pattern recognition Not OK Example digital signature validation using digital certificate Example: Using symmetric key cryptography for confidentiality
Plaintext cipertext Plaintext
Examples on Security Mechanisms • For Integrity: – Classical CRC and ECC Codes – Message Authentication Codes – One Way Hash Functions • For Access Control: – Firewall, Proxy,… – Intrusion Detection and Prevention System – File System Privileges –… Example standalone network firewall box, cisco pix
Programmed using cisco IOS commands: e.g.
access-list ICMP-ACL permit icmp test address inside address range access-group ICMP-ACL in interface outside Example on access control in the operating system • Windows NTFS access control Examples on Security Mechanisms • For Availability: – Intrusion Prevention System (IPS) – Distributed Server Architecture – Uninterruptible Power Supplies (UPS) – Storage Replication –… • For Non-Repudiation – Digital Signature Example on Availability Mechanisms • Uninterruptible Power Supply Example on IDS/IPS, snort program Security Policy • A formal set of rules to specify the way security mechanisms should be implemented. • Rules are set by the manager and implemented by the administrator. Examples on Security Policy For Authentication: • Use Passwords • Password Length > 8 characters • Password Should be changed monthly • Number of failing attempts < 5 • More than five failing attempts result in account lockout. Example on a Security Policy Windows XP/2000/NT local security policy Event Logging and Auditing • Event Logging: recording events of interest for all or some users, or network traffic which may include malicious attempt Example: The Output from a Cisco PIX Firewall's show conn Command • TCP out xx.yy.zz.129:5190 in 172.16.1.33:1960 idle 629:25:50 • Bytes 6737 flags UIO TCP out xx.yy.zz.254:23 in 172.16.1.88:1053 idle 0:11:33 Bytes • 226696 flags UIO TCP out xx.yy.zz.254:23 in 172.16.1.76:1146 idle 256:09:15 Bytes • 78482 flags UIO TCP out xx.yy.zz.254:23 in 172.16.1.100:1660 idle 145:21:19 Bytes • 9657 flags UIO TCP out xx.yy.zz.254:23 in 172.16.1.100:1564 idle 641:51:05 Bytes • 132891 flags UIO UDP out xx.yy.zz.12:137 in 172.16.1.12:137 idle 0:00:03 flags • Example Audit Policy (what events to record and what events to ignore)
Echo on a Chip - Secure Embedded Systems in Cryptography: A New Perception for the Next Generation of Micro-Controllers handling Encryption for Mobile Messaging