SlideShare a Scribd company logo
NETWORK & COMPUTER
SECURITY
Prof. Giovambattista Ianni - 2013
INFORMATION
 10 ECTS (5 Theory + 5 Lab.)
 Suggested material:
 W. Stallings, Cryptography and Network Security
 W. Stallings, Computer Security: Principles and Practice
 Online material
 Required skills:
 Operating Systems, Computer Networks,
Databases, Web Information Systems
EXAM PROCEDURE
1. Talk on a selected topic
2. The talk must include a live demo
3. Oral exam
COURSE PROGRAM
 Part 1: Cryptography on the field
 Hashing, Asymmetric and Symmetric Cryptography, PKI
 Part 2: a travel into the security of the TCP/IP stack
 Part 3: Host security. Programming security.
 Laboratory: Linux, simulations with Netkit
 Ongoing projects
FOOD OF THE DAY
• Pancake  Cake made in
the Pan
• Poorly known in Italy as
«Frittelle»
DICTIONARY - I
Who/what sits in the playfield:
 Computers
 Networks
 Humans (stupid and not stupid ones)
The players:
 Attackers: black and white hackers
 Defenders: sysadmins, programmers, users
DICTIONARY - II
 consider 3 aspects of information security:
 security attack
 security mechanism
 security service
 note terms
 threat – a potential for violation of security
 attack – an assault on system security, a
deliberate attempt to evade security services
DICTIONARY - III
The possible moves (Attack types):
 Attacks to integrity
 Data counterfeiting, identity theft
 Attacks to confidentiality
 Weak and strong information theft
 Attacks to the quality of service
 Denial of service
 Authenticity, accountability
KEY SECURITY CONCEPTS
The art of war teaches us to rely not on the
likelihood of the enemy's not coming, but on our
own readiness to receive him; not on the chance
of his not attacking, but rather on the fact that we
have made our position unassailable.
—The Art of War, Sun Tzu
PARANOID VS UNSECURED
 Estimated Money loss per year due to
security breaches in your company = L
 Estimated Money loss per year due to
uncontrolled system
administrator/programmers paranoidism = D
L > D
PASSIVE ATTACKS
ACTIVE ATTACKS
SECURITY SERVICE
 enhance security of data processing systems
and information transfers of an organization
 intended to counter security attacks
 using one or more security mechanisms
 often replicates functions normally associated
with physical documents
 which, for example, have signatures, dates; need
protection from disclosure, tampering, or
destruction; be notarized or witnessed; be
recorded or licensed
SECURITY SERVICES (X.800)
 Authentication - assurance that communicating
entity is the one claimed
 have both peer-entity & data origin authentication
 Access Control - prevention of the
unauthorized use of a resource
 Data Confidentiality –protection of data from
unauthorized disclosure
 Data Integrity - assurance that data received is
as sent by an authorized entity
 Non-Repudiation - protection against denial by
one of the parties in a communication
 Availability – resource accessible/usable
SECURITY MECHANISM
 feature designed to detect, prevent, or
recover from a security attack
 no single mechanism that will support all
services required
 however one particular element underlies
many of the security mechanisms in use:
 cryptographic techniques
 hence our focus on this topic
SECURITY MECHANISMS (X.800)
 specific security mechanisms:
 encipherment, digital signatures, access
controls, data integrity, authentication
exchange, traffic padding, routing control,
notarization
 pervasive security mechanisms:
 trusted functionality, security labels, event
detection, security audit trails, security
recovery
MODEL FOR NETWORK SECURITY
MODEL FOR NETWORK ACCESS SECURITY
CRYPTOGRAPHY AND NETWORK
SECURITY
CHAPTER 1
Fifth Edition
by William Stallings
Lecture slides by Lawrie Brown
ROADMAP
 Cryptographic algorithms
 symmetric ciphers
 asymmetric encryption
 hash functions
 Mutual Trust
 Network Security
 Computer Security
STANDARDS ORGANIZATIONS
 National Institute of Standards & Technology
(NIST)
 Internet Society (ISOC)
 International Telecommunication Union
Telecommunication Standardization Sector
(ITU-T)
 International Organization for
Standardization (ISO)
CHAPTER 1 – INTRODUCTION
 The combination of space, time, and
strength that must be considered as the
basic elements of this theory of defense
makes this a fairly complicated matter.
Consequently, it is not easy to find a fixed
point of departure..
— On War, Carl Von Clausewitz
COMPUTER SECURITY
 the protection afforded to an automated
information system in order to attain the
applicable objectives of preserving the
integrity, availability and confidentiality of
information system resources (includes
hardware, software, firmware,
information/data, and telecommunications)
LEVELS OF IMPACT
 can define 3 levels of impact from a security
breach
 Low
 Moderate
 High
EXAMPLES OF SECURITY REQUIREMENTS
 confidentiality – student grades
 integrity – patient information
 availability – authentication service
COMPUTER SECURITY CHALLENGES
1. not simple
2. must consider potential attacks
3. procedures used counter-intuitive
4. involve algorithms and secret info
5. must decide where to deploy mechanisms
6. battle of wits between attacker / admin
7. not perceived on benefit until fails
8. requires regular monitoring
9. too often an after-thought
10. regarded as impediment to using system
OSI SECURITY ARCHITECTURE
 ITU-T X.800 “Security Architecture for OSI”
 defines a systematic way of defining and
providing security requirements
 for us it provides a useful, if abstract,
overview of concepts we will study
SECURITY SERVICES
 X.800:
“a service provided by a protocol layer of
communicating open systems, which ensures
adequate security of the systems or of data
transfers”
 RFC 2828:
“a processing or communication service
provided by a system to give a specific kind of
protection to system resources”
MODEL FOR NETWORK SECURITY
 using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used by
the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to use
the transformation and secret information for a
security service
MODEL FOR NETWORK ACCESS SECURITY
 using this model requires us to:
1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated
information or resources
SUMMARY
 topic roadmap & standards organizations
 security concepts:
 confidentiality, integrity, availability
 X.800 security architecture
 security attacks, services, mechanisms
 models for network (access) security
Ad

More Related Content

Similar to Intro-2013.pptIntro-2013.pptIntro-2013.ppt (20)

CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptx
NavanathDarwante1
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
Jyothishmathi Institute of Technology and Science Karimnagar
 
Cryptography and Network Security ppt . pdf
Cryptography and Network Security ppt  . pdfCryptography and Network Security ppt  . pdf
Cryptography and Network Security ppt . pdf
22cc005
 
Ch01
Ch01Ch01
Ch01
Joe Christensen
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
VishwanathMahalle
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
shanthishyam
 
Ch01
Ch01Ch01
Ch01
n C
 
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
Shanmuganathan C
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
vikasVEVO
 
Ch01 overview nemo
Ch01 overview nemoCh01 overview nemo
Ch01 overview nemo
MrNitinJainSETAssist
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
Nithyasri Arumugam
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
ssuser6602e0
 
ch01_overview.ppt
ch01_overview.pptch01_overview.ppt
ch01_overview.ppt
DrVASAVIBANDE
 
ch01_overview.ppt
ch01_overview.pptch01_overview.ppt
ch01_overview.ppt
DrVASAVIBANDE
 
Network security in computer network for BS
Network security in computer network for BSNetwork security in computer network for BS
Network security in computer network for BS
23017156038
 
NS-Lec-01&02.ppt
NS-Lec-01&02.pptNS-Lec-01&02.ppt
NS-Lec-01&02.ppt
ahmed127489
 
ch01.ppt University of Education Lahore D
ch01.ppt University of Education Lahore Dch01.ppt University of Education Lahore D
ch01.ppt University of Education Lahore D
MuhammadShan87
 
Network security
Network securityNetwork security
Network security
Ravikumar Natarajan
 
Unit 1.ppt
Unit 1.pptUnit 1.ppt
Unit 1.ppt
DHANABALSUBRAMANIAN
 
CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptx
NavanathDarwante1
 
Cryptography and Network Security ppt . pdf
Cryptography and Network Security ppt  . pdfCryptography and Network Security ppt  . pdf
Cryptography and Network Security ppt . pdf
22cc005
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
VishwanathMahalle
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
shanthishyam
 
Ch01
Ch01Ch01
Ch01
n C
 
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
Shanmuganathan C
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
vikasVEVO
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
ssuser6602e0
 
Network security in computer network for BS
Network security in computer network for BSNetwork security in computer network for BS
Network security in computer network for BS
23017156038
 
NS-Lec-01&02.ppt
NS-Lec-01&02.pptNS-Lec-01&02.ppt
NS-Lec-01&02.ppt
ahmed127489
 
ch01.ppt University of Education Lahore D
ch01.ppt University of Education Lahore Dch01.ppt University of Education Lahore D
ch01.ppt University of Education Lahore D
MuhammadShan87
 

More from tahirnaquash2 (7)

Academia Maven Silicon.pdfAcademia Maven Silicon.pdf
Academia Maven Silicon.pdfAcademia Maven Silicon.pdfAcademia Maven Silicon.pdfAcademia Maven Silicon.pdf
Academia Maven Silicon.pdfAcademia Maven Silicon.pdf
tahirnaquash2
 
NumPy-python-27-9-24-we.pptxNumPy-python-27-9-24-we.pptx
NumPy-python-27-9-24-we.pptxNumPy-python-27-9-24-we.pptxNumPy-python-27-9-24-we.pptxNumPy-python-27-9-24-we.pptx
NumPy-python-27-9-24-we.pptxNumPy-python-27-9-24-we.pptx
tahirnaquash2
 
ATAL_Online_6_Days_Faculty_Development_Programme_Selected_List_for_A.Y_2024-2...
ATAL_Online_6_Days_Faculty_Development_Programme_Selected_List_for_A.Y_2024-2...ATAL_Online_6_Days_Faculty_Development_Programme_Selected_List_for_A.Y_2024-2...
ATAL_Online_6_Days_Faculty_Development_Programme_Selected_List_for_A.Y_2024-2...
tahirnaquash2
 
Module 4.pptModule 4.pptModule 4.pptModule 4.ppt
Module 4.pptModule 4.pptModule 4.pptModule 4.pptModule 4.pptModule 4.pptModule 4.pptModule 4.ppt
Module 4.pptModule 4.pptModule 4.pptModule 4.ppt
tahirnaquash2
 
ch10_EffiBinSearchTrees ch10_EffiBinSearchTrees
ch10_EffiBinSearchTrees ch10_EffiBinSearchTreesch10_EffiBinSearchTrees ch10_EffiBinSearchTrees
ch10_EffiBinSearchTrees ch10_EffiBinSearchTrees
tahirnaquash2
 
ch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.ppt
ch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.pptch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.ppt
ch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.ppt
tahirnaquash2
 
ch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.pptch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.ppt
tahirnaquash2
 
Academia Maven Silicon.pdfAcademia Maven Silicon.pdf
Academia Maven Silicon.pdfAcademia Maven Silicon.pdfAcademia Maven Silicon.pdfAcademia Maven Silicon.pdf
Academia Maven Silicon.pdfAcademia Maven Silicon.pdf
tahirnaquash2
 
NumPy-python-27-9-24-we.pptxNumPy-python-27-9-24-we.pptx
NumPy-python-27-9-24-we.pptxNumPy-python-27-9-24-we.pptxNumPy-python-27-9-24-we.pptxNumPy-python-27-9-24-we.pptx
NumPy-python-27-9-24-we.pptxNumPy-python-27-9-24-we.pptx
tahirnaquash2
 
ATAL_Online_6_Days_Faculty_Development_Programme_Selected_List_for_A.Y_2024-2...
ATAL_Online_6_Days_Faculty_Development_Programme_Selected_List_for_A.Y_2024-2...ATAL_Online_6_Days_Faculty_Development_Programme_Selected_List_for_A.Y_2024-2...
ATAL_Online_6_Days_Faculty_Development_Programme_Selected_List_for_A.Y_2024-2...
tahirnaquash2
 
Module 4.pptModule 4.pptModule 4.pptModule 4.ppt
Module 4.pptModule 4.pptModule 4.pptModule 4.pptModule 4.pptModule 4.pptModule 4.pptModule 4.ppt
Module 4.pptModule 4.pptModule 4.pptModule 4.ppt
tahirnaquash2
 
ch10_EffiBinSearchTrees ch10_EffiBinSearchTrees
ch10_EffiBinSearchTrees ch10_EffiBinSearchTreesch10_EffiBinSearchTrees ch10_EffiBinSearchTrees
ch10_EffiBinSearchTrees ch10_EffiBinSearchTrees
tahirnaquash2
 
ch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.ppt
ch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.pptch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.ppt
ch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.ppt
tahirnaquash2
 
ch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.pptch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.ppt
tahirnaquash2
 
Ad

Recently uploaded (20)

new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
Ad

Intro-2013.pptIntro-2013.pptIntro-2013.ppt

  • 1. NETWORK & COMPUTER SECURITY Prof. Giovambattista Ianni - 2013
  • 2. INFORMATION  10 ECTS (5 Theory + 5 Lab.)  Suggested material:  W. Stallings, Cryptography and Network Security  W. Stallings, Computer Security: Principles and Practice  Online material  Required skills:  Operating Systems, Computer Networks, Databases, Web Information Systems
  • 3. EXAM PROCEDURE 1. Talk on a selected topic 2. The talk must include a live demo 3. Oral exam
  • 4. COURSE PROGRAM  Part 1: Cryptography on the field  Hashing, Asymmetric and Symmetric Cryptography, PKI  Part 2: a travel into the security of the TCP/IP stack  Part 3: Host security. Programming security.  Laboratory: Linux, simulations with Netkit  Ongoing projects
  • 5. FOOD OF THE DAY • Pancake  Cake made in the Pan • Poorly known in Italy as «Frittelle»
  • 6. DICTIONARY - I Who/what sits in the playfield:  Computers  Networks  Humans (stupid and not stupid ones) The players:  Attackers: black and white hackers  Defenders: sysadmins, programmers, users
  • 7. DICTIONARY - II  consider 3 aspects of information security:  security attack  security mechanism  security service  note terms  threat – a potential for violation of security  attack – an assault on system security, a deliberate attempt to evade security services
  • 8. DICTIONARY - III The possible moves (Attack types):  Attacks to integrity  Data counterfeiting, identity theft  Attacks to confidentiality  Weak and strong information theft  Attacks to the quality of service  Denial of service  Authenticity, accountability
  • 10. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. —The Art of War, Sun Tzu
  • 11. PARANOID VS UNSECURED  Estimated Money loss per year due to security breaches in your company = L  Estimated Money loss per year due to uncontrolled system administrator/programmers paranoidism = D L > D
  • 14. SECURITY SERVICE  enhance security of data processing systems and information transfers of an organization  intended to counter security attacks  using one or more security mechanisms  often replicates functions normally associated with physical documents  which, for example, have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded or licensed
  • 15. SECURITY SERVICES (X.800)  Authentication - assurance that communicating entity is the one claimed  have both peer-entity & data origin authentication  Access Control - prevention of the unauthorized use of a resource  Data Confidentiality –protection of data from unauthorized disclosure  Data Integrity - assurance that data received is as sent by an authorized entity  Non-Repudiation - protection against denial by one of the parties in a communication  Availability – resource accessible/usable
  • 16. SECURITY MECHANISM  feature designed to detect, prevent, or recover from a security attack  no single mechanism that will support all services required  however one particular element underlies many of the security mechanisms in use:  cryptographic techniques  hence our focus on this topic
  • 17. SECURITY MECHANISMS (X.800)  specific security mechanisms:  encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization  pervasive security mechanisms:  trusted functionality, security labels, event detection, security audit trails, security recovery
  • 18. MODEL FOR NETWORK SECURITY
  • 19. MODEL FOR NETWORK ACCESS SECURITY
  • 20. CRYPTOGRAPHY AND NETWORK SECURITY CHAPTER 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown
  • 21. ROADMAP  Cryptographic algorithms  symmetric ciphers  asymmetric encryption  hash functions  Mutual Trust  Network Security  Computer Security
  • 22. STANDARDS ORGANIZATIONS  National Institute of Standards & Technology (NIST)  Internet Society (ISOC)  International Telecommunication Union Telecommunication Standardization Sector (ITU-T)  International Organization for Standardization (ISO)
  • 23. CHAPTER 1 – INTRODUCTION  The combination of space, time, and strength that must be considered as the basic elements of this theory of defense makes this a fairly complicated matter. Consequently, it is not easy to find a fixed point of departure.. — On War, Carl Von Clausewitz
  • 24. COMPUTER SECURITY  the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)
  • 25. LEVELS OF IMPACT  can define 3 levels of impact from a security breach  Low  Moderate  High
  • 26. EXAMPLES OF SECURITY REQUIREMENTS  confidentiality – student grades  integrity – patient information  availability – authentication service
  • 27. COMPUTER SECURITY CHALLENGES 1. not simple 2. must consider potential attacks 3. procedures used counter-intuitive 4. involve algorithms and secret info 5. must decide where to deploy mechanisms 6. battle of wits between attacker / admin 7. not perceived on benefit until fails 8. requires regular monitoring 9. too often an after-thought 10. regarded as impediment to using system
  • 28. OSI SECURITY ARCHITECTURE  ITU-T X.800 “Security Architecture for OSI”  defines a systematic way of defining and providing security requirements  for us it provides a useful, if abstract, overview of concepts we will study
  • 29. SECURITY SERVICES  X.800: “a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers”  RFC 2828: “a processing or communication service provided by a system to give a specific kind of protection to system resources”
  • 30. MODEL FOR NETWORK SECURITY  using this model requires us to: 1. design a suitable algorithm for the security transformation 2. generate the secret information (keys) used by the algorithm 3. develop methods to distribute and share the secret information 4. specify a protocol enabling the principals to use the transformation and secret information for a security service
  • 31. MODEL FOR NETWORK ACCESS SECURITY  using this model requires us to: 1. select appropriate gatekeeper functions to identify users 2. implement security controls to ensure only authorised users access designated information or resources
  • 32. SUMMARY  topic roadmap & standards organizations  security concepts:  confidentiality, integrity, availability  X.800 security architecture  security attacks, services, mechanisms  models for network (access) security