Lecture 1 Introduction to Electronics Rabie A. Ramadan [email protected]
Computer Engineering II Computer and Network Security Rabie A. Ramadan [email protected].
-
Upload
amy-nichols -
Category
Documents
-
view
215 -
download
0
Transcript of Computer Engineering II Computer and Network Security Rabie A. Ramadan [email protected].
![Page 2: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/2.jpg)
2
Welcome Back
![Page 3: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/3.jpg)
Organization of the Course
3
Two lectures weekly
Evaluation is based on: • Midterm and Final Exams
• In class quizzes
• Assignments , Tutorials
• Project
![Page 4: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/4.jpg)
Organization of the Course (Cont.)
4
Textbooks
• William Stallings, “Cryptography and Network
Security,” Fourth Edition
• Behrouz A. Forouzan, “Cryptography and Network
Security,” 2008 Edition
• Charles P. Pfleeger and Shari L. Pfleeger,
“Security in Computing,” third addition
![Page 5: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/5.jpg)
Course Contents
5
Introduction to Cryptography Authentication Functions Symmetric Key-Exchange Protocols Asymmetric Key-Distribution and Cryptography Network Layer Security Transport Layer Security Introduction to wireless network security
![Page 6: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/6.jpg)
Exams
6
Do not worry about the exam as long as :
• You are attending
• Done with your project
• Done with your presentation
• Assignments are delivered
![Page 7: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/7.jpg)
Why should I attend ?
7
• We will have group activities in class.
• Some materials will be taught from outside our textbook(s).
• Some materials will be skipped or left for you to read
![Page 8: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/8.jpg)
Projects
8
• There will be a term project
• Only 4 persons per project
• You can select your own project after my approval
• Suggested Projects
![Page 9: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/9.jpg)
TA
?????
![Page 10: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/10.jpg)
Things need to be with you in class
10
• For the group activities
![Page 11: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/11.jpg)
Table of Contents
11
Introduction Security Goals Attacks Services and Mechanisms Security mechanisms Techniques
![Page 12: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/12.jpg)
Introduction
12
The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.
—The Art of War, Sun Tzu
![Page 13: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/13.jpg)
The Role of Security
13
Security is like adding brakes to cars. The Security is like adding brakes to cars. The purpose of brakes is not to stop you; it is to purpose of brakes is not to stop you; it is to enable you to go faster. Brakes help avoid enable you to go faster. Brakes help avoid accidents caused by mechanical failures in accidents caused by mechanical failures in other cars, rude drivers, and road hazards.other cars, rude drivers, and road hazards.
Better security is an enabler for greater freedom Better security is an enabler for greater freedom and confidence in the Cyber world.and confidence in the Cyber world.
![Page 14: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/14.jpg)
Why Security?
14
Play
Play
![Page 15: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/15.jpg)
What is the Internet?
15
Three layers
All have vulnerabilities
![Page 16: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/16.jpg)
16
The Transit Layer
![Page 17: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/17.jpg)
17
![Page 18: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/18.jpg)
The Application Layer
18
![Page 19: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/19.jpg)
Spectrum of Risk
1.Messaging
2. Storing Information
3. Transactional systems
4. Technology Integration
5. Fully Integrated information based
Business
Deg
ree
of
Dat
a D
igit
izat
ion
Business has been aggregating data and risk at an unprecedented rate…
![Page 20: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/20.jpg)
We have developed the myth that technology can be an effective fortress – we can have security
20
Traditional focus on: Better Firewalls Boundary Intrusion Detection Critical Offsite Capacity Compliance Certification
False myths: IT staff = security staff Compliance failure is the main source of risk Being compliant = being safe
![Page 21: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/21.jpg)
But this concept of security is false – the Internet is fundamentally open
21
Facts: We don’t know what’s on our own nets What’s on our nets is bad, and existing
practices aren’t finding everything Threat is in the “interior” Threat is faster than the response “Boundaries” are irrelevant We don’t know what is on our partner’s
nets nor on the points of intersection Compromises occur despite defenses Depending on the motivation behind
any particular threat, it can be a nuisance, costly or mission threatening
Global Internet
The critical capability it do develop real time response and resiliency
![Page 22: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/22.jpg)
22
![Page 23: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/23.jpg)
Why is computer and network security important?
23
To protect company assets• The assets are comprised of the "information"
that is housed on a company's computers and networks. Information is a vital organizational asset.
To gain a competitive advantage• Security can mean the difference between
wide acceptance of a service and customer response.
![Page 24: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/24.jpg)
Why is computer and network security important?
24
To comply with regulatory requirements• Ensuring the continuing operation of the organization.
• Many organizations are subject to governmental regulation, which often stipulates requirements for the safety and security of an organization.
To keep your job• Security should be part of every network or systems
administrator's job. Failure to perform adequately can result in termination.
![Page 25: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/25.jpg)
Historical Aspects of Security
25
In old days , to be secure,• Information maintained physically on a secure place
• Few authorized persons have access to it (confidentiality)
• Protected from unauthorized change (integrity)
• Available to authorized entity when is needed (availability)
Nowadays, • Information are stored on computers
• Confidentiality are achieved few authorized persons can access the files.
• Integrity is achieved few are allowed to make change
• Availability is achieved at least one person has access to the files all the time
![Page 26: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/26.jpg)
Current aspects of security
26
Achieving Confidentiality , Integrity, availability is a challenge:
• Distributed information
• Could be captured while it is transmitted
• Could be altered
• Could be blocked
![Page 27: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/27.jpg)
Security TrinityBasis for Computer and Network Security
27
Prevention, Detection, and Response,
![Page 28: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/28.jpg)
What is a Computer Security?
28
Different answers
• It is the password that I use to enter the system or required set of rules (lock the computer before you leave) – End User
• It is the proper combination of firewall technologies with encryption systems and access controls – Administrator
• Keeping the bad guys out of my computer– Manager
28
![Page 29: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/29.jpg)
What is a computer security?
29
A computer is secure if you can depend on it and its software to behave as you expect– Simson and Gene in “Practical Unix and Internet Security “ book
Which definition is correct ?
• All of them. However,
• We need to keep all of these prospectives in mind
![Page 30: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/30.jpg)
CIA Triad
30
Security Goals• Confidentiality,
• Integrity , and
• Availability
![Page 31: Computer Engineering II Computer and Network Security Rabie A. Ramadan rabieramadan@gmail.com.](https://reader036.fdocuments.in/reader036/viewer/2022062518/56649e525503460f94b47968/html5/thumbnails/31.jpg)
31
CIA Triad
Security