0% found this document useful (0 votes)
2 views

LO3

The document outlines key concepts in network security, including user account verification, access control, and the role of firewalls in protecting networks from unauthorized access. It explains packet filtering as a technique for controlling network access based on IP addresses and discusses cryptographic communication methods, including symmetric and asymmetric encryption. Overall, it emphasizes the importance of security measures in safeguarding computer assets and information transmission.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

LO3

The document outlines key concepts in network security, including user account verification, access control, and the role of firewalls in protecting networks from unauthorized access. It explains packet filtering as a technique for controlling network access based on IP addresses and discusses cryptographic communication methods, including symmetric and asymmetric encryption. Overall, it emphasizes the importance of security measures in safeguarding computer assets and information transmission.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

LO4

Ensure user
accounts are
verified for
security
Test Security
and Internet
Access
Network security

 Network security on the other hand


deals with provisions and policies adopted
to prevent and monitor unauthorized
access, misuse, modification, or denial of
the computer network and network-
accessible resources.
Security

 Security:
The prevention and
protection of computer assets
from unauthorized access, use,
alteration, degradation,
destruction, and other threats.
Access Control

 The prevention of unauthorized use


of a resource (i.e., this service
controls who can have access to a
resource, under what conditions
access can occur, and what those
accessing the resource are
allowed to do).
Authentication and
Authorization

• Authentication verifies user


identification
• Client/server environment
• server system
• Cryptographic authentication
• Messaging environment
•e-mail
• e-commerce
Authorization

 Authorization grants access to


information
 Read, read-write, no-access
 Indefinite period, finite period,
one-time use
Firewalls

 The main purpose of firewall is to


protect a network from external
attacks.
 It monitors and controls traffic into
and out of a secure network.
 It can be implemented in a router,
gateway, or special host.
 A firewall is normally located at the
gateway to a network, but it may also
be located at host access points.
Cont..

 Implementing a firewall to a network


yields numerous benefits .
 It reduces the risk of access to hosts
from an external network by filtering
insecure services.
 Firewalls involve the use of packet
filtering or application-level gateways as
the two primary techniques of
controlling undesired traffic.

Packet Filters

• Packet filtering is based on protocol-


specific criteria.
• It is done at the OSI data link, network,
and transport layers.
• Packet filters are implemented in some
commercial routers, called screening
routers or packet filtering routers.
• We will use the generic term packet
filtering rooters here.
Cont..

• Packet filtering routers can either


drop packets or redirect them to
specific hosts for further screening.
 Some packets never reach the local
network
 because they are trashed.
What is a packet filter

 packet filtering is “controlling access


to a network by analyzing the
incoming and outgoing packets and
letting them pass or halting them
based on the IP address of the source
and destination.
Cont…

 Packet filtering is one technique,


among many, for implementing
security firewalls.” Packet filtering is
both a tool and a technique that is a
basic building block of network
security.
 It is a tool in that it is an instrument
that aids in accomplishing a task.
Cont..

 Packetfiltering is a firewall
technique used to control network
access by monitoring outgoing and
incoming packets and allowing them
to pass or halt based on the source
and destination Internet Protocol (IP)
addresses, protocols and ports.
Cont…

 Network layer firewalls define packet


filtering rule sets, which provide
highly efficient security mechanisms.
 Packet filtering is also known as
static filtering.
Cryptographic Communication

 Terminology
 Cryptography: Schemes for encryption and
decryption
 Encryption: The process by which plaintext is
converted into cipher text.
 Decryption: Recovering plaintext from the
cipher text
Cont..

Secret key: Used to set some or all of the


various parameters used by the
encryption algorithm. In a classical
(symmetric key) cryptography, the same
secret key is used for encryption and
decryption
Cont…

Cryptanalysis: The study of


“breaking the code”. Cryptanalysts!
Cryptology: Cryptography and
cryptanalysis together constitute
the area of cryptology.
Cont..

Cryptography has five


ingredients:
• Plaintext
• Encryption algorithm
• Secret Key
• Cipher text
• Decryption algorithm
Cont..

 The input message, called


plaintext, is encrypted with a
secret (encryption) key.
 The encrypted message is called
cipher text, which moves through
an unsecure communication
channel, the Internet for example.
Cont..

 Asymmetrical encryption is also


known as public key cryptography,
which is a relatively new method,
compared to symmetric encryption.
 Asymmetric encryption uses two
keys to encrypt a plain text.

Cont..

 Secret keys are exchanged over the


Internet or a large network.
 It ensures that malicious persons do
not misuse the keys.
 It is important to note that anyone
with a secret key can decrypt the
message and this is why
asymmetrical encryption uses two
related keys to boosting security.
Cont..
A public key is made freely available to
anyone who might want to send you a
message. The second private key is
kept a secret so that you can only know.
 A message that is encrypted using a
public key can only be decrypted using
a private key, while also, a message
encrypted using a private key can be
decrypted using a public key.

Cont..

 Security of the public key is not


required because it is publicly
available and can be passed over the
internet. Asymmetric key has a far
better power in ensuring the security
of information transmitted during
communication.
 Asymmetric encryption is mostly
used in day-to-day communication
channels, especially over the
Comments/Questions

You might also like