Académique Documents
Professionnel Documents
Culture Documents
1. Introduction
Things you need to know …
Instructor:
Madiha Abbasi
Office:
FT-06
Email:
madihaabbasi2@hotmail.com
2
Things you need to know …
Books:
Cryptography and Network Security
Behrouz A. Forouzan
3
Things you need to know …
4
Contents
Security Goals
Security Attacks
Security Services
Security Mechanisms
Security Techniques
Security Models
5
Security
6
Information security
The information stored in physical form
requires physical security mechanisms
e.g. rugged filing cabinets for paper
based filing systems
With computers managing the most of
the information, tools are required for
1. Computer security
2. Network or Internet security
7
Computer security
8
Network security
9
Security Goals
10
Security Goals
Confidentiality
Protection of data from
unauthorized disclosure
Integrity
Assurance that data received is as
sent by an authorized entity.
Availability
The information created and stored
by an organization needs to be
available to authorized entities. 11
Security Attacks or Threats
An attack is an action that compromises
the security (Confidentiality, Availability,
Integrity) of information.
A threat is a danger which could affect
the security of information, leading to
potential loss or damage.
Often attack & threat are used
synonymously.
12
Security Attacks
13
Attacks Threatening
Confidentiality
14
Attacks Threatening Integrity
Modification – the attacker intercepts
the message and changes it.
Masquerading or spoofing happens
when the attacker impersonates
somebody else.
15
Attacks Threatening Integrity
17
Passive vs. Active Attacks
Passive attack:
attacker’s goal is just to obtain
information
the attack does not modify data or harm
the system
difficult to detect
Active attack:
may change the data or harm the system
easier to detect than to prevent
18
Passive vs. Active Attacks
19
OSI Security Architecture
22
Security Services
Data Confidentiality – designed to
protect data from disclosure attack.
Data Integrity – designed to protect
data from modification, insertion,
deletion and replaying by an adversary.
Authentication – This service provides
the authentication of the party at the
other end of the line
23
Security Services
24
Security Mechanisms
ITU-T X.800
also defines
some security
mechanisms to
provide the
security services
25
Relationship between Services
and Mechanisms
26
Relationship btw Services & Mechanisms
Y=Yes, the mechanism is considered to be appropriate, either on its
own or in combination with other mechanisms [ITU-T X.800]
27
Relationship btw Services & OSI Layers
Y=Yes, service could be incorporated in the standards for the layer as
a provider option [ITU-T X.800]
28
Techniques
30
Steganography
The word steganography, with origin in
Greek, means “covered writing,” in
contrast with cryptography, which
means “secret writing.”
Example: covering data under color image
31
Model for Network Security
32
Model for Network Access
Security
33
Summary
Have considered:
Information security
Security attacks, services, mechanisms
Security techniques
Models for network (access) security
34