Network Security Part I: Introduction General Overview of Network Security.
Introduction Network security
-
Upload
igz-software-house -
Category
Education
-
view
42 -
download
0
Transcript of Introduction Network security
Information Security
Information SecurityInformation Security is the name given to the preventative stepspreventative steps we take to guard our informationinformation and our capabilitiescapabilities.
Measures adopted to prevent the unauthorized use, misuse, modification, or denial of use of knowledge, facts ,data or capabilities.
Availability
Enables users who need to accessaccess information to do so without interference interference and receive it in requiredrequired format.format.
The information is availableavailable only to the authorizedauthorized users.
Accuracy
Information is accurate when it is free free from mistakesfrom mistakes or errors and it has the value that the end user expects.
Authenticity
Authenticity of information is the quality or state of being genuine or original,genuine or original, rather than a reproduction or fabrication.
e.g. Email SpoofingEmail Spoofing The unauthorized use of a third-party The unauthorized use of a third-party
domain name as the sender's name in an e-domain name as the sender's name in an e-mail messagemail message
http://blockstatus.com/anonymous-mailer
Confidentiality
Information is available only to people with rightful access.rightful access.
Ensuring that only those with the rights rights and privilegesprivileges to accessaccess a particular set of information are able to do so.
It is closely related with the privacyprivacy of information.
Integrity Information can only be changedchanged by
authorizedauthorized personnel. The quality or state of being whole, complete whole, complete
and uncorrupted uncorrupted is the integrity of information. Three goals of Integrity
Prevention of Modification by unauthorized users. Prevention of unauthorized modification by authorized users. Preservation of Internal and External Consistency.
Integrity check can be done through: File size File hashing
Hashing is the transformation of a string of character s into a usually shorter fixed-length value or key that represents the original string
Software
Comprises of OSOS,,ApplicationsApplications and command command utilitiesutilities.
BugsBugs, WeaknessesWeaknesses and HolesHoles. An error or defect in software or hardware that causes a program to
malfunction
Security Hole( something you need to fix now) Security Warning( something you need to fix soon) Security Note (something you need to fix when you get around to it, or just
some information that you should consider)
Service PacksService Packs, PatchesPatches and Hot fixesHot fixes. Security is least Priorityleast Priority in Software
development
Hardware
HousesHouses and ExecutesExecutes a software.Stores and carries the data.Provides InterfacesInterfaces for the entry and
removal of information from the system.
Physical security policies Physical security policies deal with the deal with the H/WH/W.
Procedures
Procedures are written instructionswritten instructions for accomplishingaccomplishing a specific tasktask.
Another frequently overlookedoverlooked component
What is Network Security?
Effort to create a secure computingsecure computing platformplatform, so users or programs cannot perform actionscannot perform actions that they are not allowed to do.
Network Security is the protectionprotection of networking componentsnetworking components, connectionsconnections and contentscontents.
Network Security as a Continuous Process
Network security is a continuous processcontinuous process built around a security policy.Step 1: SecureStep 2: MonitorStep 3: TestStep 4: Improve
Step 1: Secure the Network
Implement security solutions to preventprevent unauthorized accessunauthorized access and to protectprotect information.information.AuthenticationEncryptionFirewallsVulnerability Patching
Step 2: Monitor Security
Detects violationsDetects violations to the security policy
Involves system auditingsystem auditing and real-time intrusion intrusion detectiondetection
ValidatesValidates the securitysecurity implementation in Step 1
Step 3: Test Security
Validates effectivenessValidates effectiveness of the security policy through system auditing and network scanningnetwork scanning
Step 4: Improve Security
Use information from the monitor and test phases to make improvements improvements to the security implementation.
Adjust the security policy as security holessecurity holes and risksrisks are identified.
Asset
An asset is the organizational resourceorganizational resource that is being protected.
It can be logicallogical like website, information, data.
It can be physicalphysical like computer system or other tangible object.
Threats, Vulnerability and Controls
Threat a person, thing, event or idea which poses some danger to an asset
(in terms of confidentiality, integrity, availability). a possible means by which a security policy may be breached.
An attack is a realization of a threat.
Vulnerability A weakness in the system that can be exploited to cause loss or
harm Control, Countermeasure, safeguard
An action, device, procedure or technique that removes or reduces a vulnerability.
Risk = Threat + Vulnerability
Threats without vulnerabilities pose no risk.Likewise, vulnerabilities without threats
pose no risk.
Risk is the probability that something can happen.
Risk analysis can be quantitative or qualitative.
Cont…
Risk can be qualitatively defined in three levels:
LowLow- Action to remove the vulnerability should be taken if possible
MediumMedium- Action to remove the vulnerability is advisable
HighHigh-- Action should be taken immediately to remove this vulnerability
Hacking
Can be defined positively and negatively:To write computer programs for enjoyment.To gain access to a computer illegally.