Security

20
Network Security Mechanisms

Transcript of Security

Page 1: Security

Network Security Mechanisms

Page 2: Security

Vulnerability Attack Threat Network Security Mechanisms

Contents

Page 3: Security

Vulnerabilities are weak points or loopholes in security that an attacker exploits in order to gain access to the network or to resources on the network.

Vulnerabilities

Page 4: Security
Page 5: Security

Attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset.

Two types of attack are: Passive Attack Active Attack

Attacks

Page 6: Security

Passive Attack

Page 7: Security

Active Attack

Page 8: Security

Active Attack

Page 9: Security

Threat

Page 10: Security

 A mechanism that is designed to detect, prevent, or recover from a security attack.

Different types of security Mechanisms are:

Routing control Traffic padding Encipherment Access Control Digital Signatures Data Integrity

Security Mechanism

Page 11: Security

Enables selection of particular physically secure routes for certain data and allows routing changes, especially when a breach of security is suspected.

Routing Control

Page 12: Security

The insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

Traffic Padding

Page 13: Security

Encipherment

Encipherment is the process of translating plaintext into ciphertext.

The use of mathematical algorithms to transform data into a form that is not readily intelligible.

Cryptography technique is used for enciphering.

Page 14: Security

Cryptography

A word with greek origin, means “Secret Writing”.

Two distinct mechanisms:

Symmetric-Key Encipherment Asymmetric-Key Encipherment

Page 15: Security

Digital Signature

A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document.

Page 16: Security
Page 17: Security

Access Control

It uses methods to prove that a user has access rights to the data or resources owned by a system.

Examples: passwords and PINs

Page 18: Security

Data Integrity

Data integrity refers to maintaining and assuring the accuracy and consistency of data.

A variety of mechanisms used to assure the integrity of a data unit or stream of data units.

Page 19: Security

Method of checking data integrity

A check digit is an extra digit added to a number so that, if a number is changed, the error will be detected.

Method

Starting from the right, multiply the first digit by 1, the second by 2 etc

Add the results togetherUse the last digit of the result and add to end of

number.

◦Example: 56037 becomes 560372◦Example: 50637 becomes 506376

Page 20: Security