Information Security Rabie A. Ramadan GUC, Cairo [email protected] Room C7 -310 Lecture 2.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks...
-
Upload
bruno-charles -
Category
Documents
-
view
215 -
download
1
Transcript of Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks...
![Page 1: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/1.jpg)
Computer and Network Security
Rabie A. Ramadan
![Page 2: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/2.jpg)
Organization of the Course (Cont.)
2
Textbooks
• William Stallings, “Cryptography and Network
Security,” Fourth Edition
• Behrouz A. Forouzan, “Cryptography and Network
Security,” 2008 Edition
• Charles P. Pfleeger and Shari L. Pfleeger,
“Security in Computing,” third addition
![Page 3: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/3.jpg)
Course Contents
3
Introduction to Cryptography Authentication Functions Symmetric Key-Exchange Protocols Asymmetric Key-Distribution and Cryptography Network Layer Security Transport Layer Security Introduction to wireless network security
![Page 4: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/4.jpg)
Exams
4
Do not worry about the exam as long as :
• You are attending
• Done with your project
• Done with your presentation
• Assignments are delivered
![Page 5: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/5.jpg)
Projects or Term Papers
5
• There will be a term project
• Only 2 persons per project
• You can select your own project after my approval
• Project report must follow IEEE format
• Deadline of the projects proposal is two weeks from today
• Suggested Projects and Term Papers
![Page 6: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/6.jpg)
Table of Contents
6
Introduction Security Goals Attacks Services and Mechanisms Security mechanisms Techniques
![Page 7: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/7.jpg)
Introduction
7
The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.
—The Art of War, Sun Tzu
![Page 8: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/8.jpg)
Introduction
8
In old days , to be secure,• Information maintained physically on a secure place
• Few authorized persons have access to it (confidentiality)
• Protected from unauthorized change (integrity)
• Available to authorized entity when is needed (availability)
Nowadays, • Information are stored on computers
• Confidentiality are achieved few authorized persons can access the files.
• Integrity is achieved few are allowed to make change
• Availability is achieved at least one person has access to the files all the time
![Page 9: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/9.jpg)
Introduction
9
Achieving Confidentiality , Integrity, availability is a challenge:
• Distributed information
• Could be captured while it is transmitted
• Could be altered
• Could be blocked
![Page 10: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/10.jpg)
Security Goals
10
Confidentiality• Ensures that computer-related assets are accessed only by
authorized parties.
• Sometimes called secrecy or privacy.
Integrity• Assets can be modified only by authorized parties or only in
authorized ways.
Availability • assets are accessible to authorized parties at appropriate times.
• The opposite is denial of service.
![Page 11: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/11.jpg)
Security Goals
11
Strong protection is based on Goals relations
![Page 12: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/12.jpg)
Goals are Applied to
12
Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers
Network Security - measures to protect data during their transmission
Internet Security - measures to protect data during their transmission over a collection of interconnected networks
![Page 13: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/13.jpg)
Our Aim of this Part
13
Our main concern is: • Network and Internet Security
• Protecting the information while it is transmitted
Will touch the computer security• Presentations
• Assignments
• Projects
![Page 14: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/14.jpg)
Threats , vulnerability, and Attacks
14
Crossing the water to the right is a Threat to the man.
• Ex. (Computer) software failures
Crossing the water through the wall crack is a Vulnerability.
• Ex. (Computer) Open ports
Somebody or another system destroyed the wall is an Attack
• Ex. (Computer) sending an overwhelming set of messages to another system to block it.
![Page 15: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/15.jpg)
Attacks
15
Passive Attacks • Attempts to learn or make use of information from the system
but does not affect system resources.
• Eavesdropping or monitoring of transmissions
Active Attacks • Attempts to alter system resources or affect their operation.
![Page 16: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/16.jpg)
Passive Attacks
16
Release of message contents / snooping
![Page 17: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/17.jpg)
Passive Attacks (Cont.)
17
Traffic Analysis/ spoofing
Passive Attacks are hard to be detected
![Page 18: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/18.jpg)
Active Attacks
18
Masquerade• One entity pretends to be a different entity
![Page 19: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/19.jpg)
Active Attacks (Cont.)
19
Replay Attack • Passive capture of a data unit and its subsequent retransmission
to produce an unauthorized effect.
![Page 20: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/20.jpg)
Active Attacks (Cont.)
20
Modification Attack • Some portion of a legitimate message is altered, or that messages
are reordered, to produce an unauthorized effect
![Page 21: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/21.jpg)
Active Attacks (Cont.)
21
Denial of Service• Prevents or inhibits the normal use or management of
communications facilities
![Page 22: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/22.jpg)
Group Activities
22
Which of the following attacks is a threat to which of the security goals?
Attacks Security Goals Modification Confidentiality
Masquerading Integrity
Traffic Analysis Availability
Denial of service
Replaying
Snooping
![Page 23: Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”](https://reader038.fdocuments.in/reader038/viewer/2022110103/56649eff5503460f94c14970/html5/thumbnails/23.jpg)
Answer
23
Security Attacks
Snooping
Traffic Analysis
Modification
Masquerading
Replaying
Denial of Service
Confidentiality Integrity Availability