Network Security

14
Henric Johnson 1 Network Network Security Security Henric Johnson Blekinge Institute of Technology, Sweden www.its.bth.se/staff/hjo/ [email protected] +46 708 250375

description

Network Security. Henric Johnson Blekinge Institute of Technology, Sweden www.its.bth.se/staff/hjo/ [email protected] +46 708 250375. Outline. Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork Security - PowerPoint PPT Presentation

Transcript of Network Security

Page 1: Network Security

Henric Johnson 1

Network Network SecuritySecurity

Henric JohnsonBlekinge Institute of Technology,

Swedenwww.its.bth.se/staff/hjo/[email protected]

+46 708 250375

Page 2: Network Security

Henric Johnson 2

OutlineOutline

• Attacks, services and mechanisms• Security attacks• Security services• Methods of Defense• A model for Internetwork Security• Internet standards and RFCs

Page 3: Network Security

Henric Johnson 3

Attacks, Services and Attacks, Services and MechanismsMechanisms

• Security Attack: Any action that compromises the security of information.

• Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack.

• Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

Page 4: Network Security

Henric Johnson 4

Security AttacksSecurity Attacks

Page 5: Network Security

Henric Johnson 5

Security AttacksSecurity Attacks

• Interruption: This is an attack on availability

• Interception: This is an attack on confidentiality

• Modfication: This is an attack on integtrity

• Fabrication: This is an attack on authenticity

Page 6: Network Security

Henric Johnson 6

Security GoalsSecurity Goals

Integrity

Confidentiality

Avaliability

Page 7: Network Security

Henric Johnson 7

Page 8: Network Security

Henric Johnson 8

Security ServicesSecurity Services

• Confidentiality (privacy)

• Authentication (who created or sent the data)

• Integrity (has not been altered)

• Non-repudiation (the order is final)

• Access control (prevent misuse of resources)

• Availability (permanence, non-erasure)

– Denial of Service Attacks

– Virus that deletes files

Page 9: Network Security

Henric Johnson 9

Page 10: Network Security

Henric Johnson 10

Page 11: Network Security

Henric Johnson 11

Methods of DefenceMethods of Defence

• Encryption• Software Controls (access limitations

in a data base, in operating system protect each user from other users)

• Hardware Controls (smartcard)• Policies (frequent changes of

passwords)• Physical Controls

Page 12: Network Security

Henric Johnson 12

Internet standards and Internet standards and RFCsRFCs

• The Internet society– Internet Architecture Board (IAB)– Internet Engineering Task Force (IETF)– Internet Engineering Steering Group

(IESG)

Page 13: Network Security

Henric Johnson 13

Internet RFC Internet RFC Publication ProcessPublication Process

Page 14: Network Security

Henric Johnson 14

Recommended ReadingRecommended Reading

• Pfleeger, C. Security in Computing. Prentice Hall, 1997.

• Mel, H.X. Baker, D. Cryptography Decrypted. Addison Wesley, 2001.