SlideShare a Scribd company logo
1 of 19
Download to read offline
Cryptography and Network
Security
Chapter 1
Fourth Edition
by William Stallings
Lecture slides by Lawrie Brown
Partially Edited by
Dr. Md Abir Hossain
1
Internet and Web Resource
oWeb Sites for This Book
oStudent Support
2
Definitions
oComputer Security - generic name for the
collection of tools designed to protect data and to
thwart hackers
oNetwork Security - measures to protect data during
their transmission
oInternet Security - measures to protect data during
their transmission over a collection of
interconnected networks
3
Aspects of Security
Consider 3 aspects of information security:
o Security attack
-Passive attacks, which include unauthorized reading of a
message of file and traffic analysis; and
-Active attacks is a modification of messages of files, and denial of
service
o Security mechanism
- Is any process that is designed to detect, prevent, or recover from a
security attack. Ex: encryption algorithms, digital signatures, and
authentication protocols.
o Security service
- A processing or communication service that enhances the security
of the data processing systems and the information transfers of an
organization. Ex: authentication, access control, data confidentiality
4
Security Attack
o Any action that compromises the security of information
owned by an organization
o Information security is about how to prevent attacks, or failing
that, to detect attacks on information-based systems
oCan focus of generic types of attacks
opassive
oactive
5
Passive Attacks
6
attempt to learn or
make use of
information from the
system but does not
affect system
resources.
Active Attacks
7
attempt to alter
system resources
or affect their
operation
Security Service
o Enhance security of data processing systems and
information transfers of an organization
o Intended to counter security attacks
o Using one or more security mechanisms
o Often replicates functions normally associated with physical
documents
o Which, for example, have signatures, dates; need
protection from disclosure, tampering, or destruction; be
notarized or witnessed; be recorded or licensed
8
Security Services
oX.800:
o A service provided by a protocol layer of communicating
open systems, which ensures adequate security of the
systems or of data transfers
oRFC 2828:
o A processing or communication service provided by a
system to give a specific kind of protection to system
resources
9
Security Services (X.800)
oAuthentication - assurance that the communicating
entity is the one claimed
oAccess Control - prevention of the unauthorized
use of a resource
oData Confidentiality –protection of data from
unauthorized disclosure
oData Integrity - assurance that data received is as
sent by an authorized entity
oNon-Repudiation - protection against denial by one
of the parties in a communication
10
Security Services (X.800)
11
Security Services (X.800)
12
Security Services (X.800)
13
Security Mechanism (X.800)
ofeatures designed to detect, prevent, or recover from a
security attack
o No single mechanism that will support all services required
o There security mechanism is categorized in two section
o Specific Security Mechanism
o Pervasive Security Mechanism
14
Security Mechanism (X.800)
15
Security Mechanism (X.800)
16
Model for Network Security
17
Model for Network Security
Using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used by the
algorithm
3. develop methods to distribute and share the secret
information
4. specify a protocol enabling the principals to use the
transformation and secret information for a security
service
18
19

More Related Content

Similar to ch01.pdf

dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
NISHASOMSCS113
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
arvindarora20042013
 

Similar to ch01.pdf (20)

Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Unit 1.ppt
Unit 1.pptUnit 1.ppt
Unit 1.ppt
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
Lec 01.pdf
Lec 01.pdfLec 01.pdf
Lec 01.pdf
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Security Ch-1.pptx
Security Ch-1.pptxSecurity Ch-1.pptx
Security Ch-1.pptx
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network security
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
 
CH01.ppt
CH01.pptCH01.ppt
CH01.ppt
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
computer security .ppt
computer security .pptcomputer security .ppt
computer security .ppt
 
Information and network security 7 security services
Information and network security 7 security servicesInformation and network security 7 security services
Information and network security 7 security services
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
NS-Lec-01&02.ppt
NS-Lec-01&02.pptNS-Lec-01&02.ppt
NS-Lec-01&02.ppt
 
Network security in computer network for BS
Network security in computer network for BSNetwork security in computer network for BS
Network security in computer network for BS
 

More from Abir Hossain (7)

Bayisa Taye.pptx
Bayisa Taye.pptxBayisa Taye.pptx
Bayisa Taye.pptx
 
Introduction to data communication
Introduction to data communicationIntroduction to data communication
Introduction to data communication
 
chapter 1.ppt
chapter 1.pptchapter 1.ppt
chapter 1.ppt
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networks
 
Mixim tutorial link
Mixim tutorial linkMixim tutorial link
Mixim tutorial link
 
Abir cover letter
Abir cover letterAbir cover letter
Abir cover letter
 
Important C program of Balagurusamy Book
Important C program of Balagurusamy BookImportant C program of Balagurusamy Book
Important C program of Balagurusamy Book
 

Recently uploaded

Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
Kira Dess
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 

Recently uploaded (20)

21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 

ch01.pdf

  • 1. Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Partially Edited by Dr. Md Abir Hossain 1
  • 2. Internet and Web Resource oWeb Sites for This Book oStudent Support 2
  • 3. Definitions oComputer Security - generic name for the collection of tools designed to protect data and to thwart hackers oNetwork Security - measures to protect data during their transmission oInternet Security - measures to protect data during their transmission over a collection of interconnected networks 3
  • 4. Aspects of Security Consider 3 aspects of information security: o Security attack -Passive attacks, which include unauthorized reading of a message of file and traffic analysis; and -Active attacks is a modification of messages of files, and denial of service o Security mechanism - Is any process that is designed to detect, prevent, or recover from a security attack. Ex: encryption algorithms, digital signatures, and authentication protocols. o Security service - A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. Ex: authentication, access control, data confidentiality 4
  • 5. Security Attack o Any action that compromises the security of information owned by an organization o Information security is about how to prevent attacks, or failing that, to detect attacks on information-based systems oCan focus of generic types of attacks opassive oactive 5
  • 6. Passive Attacks 6 attempt to learn or make use of information from the system but does not affect system resources.
  • 7. Active Attacks 7 attempt to alter system resources or affect their operation
  • 8. Security Service o Enhance security of data processing systems and information transfers of an organization o Intended to counter security attacks o Using one or more security mechanisms o Often replicates functions normally associated with physical documents o Which, for example, have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded or licensed 8
  • 9. Security Services oX.800: o A service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers oRFC 2828: o A processing or communication service provided by a system to give a specific kind of protection to system resources 9
  • 10. Security Services (X.800) oAuthentication - assurance that the communicating entity is the one claimed oAccess Control - prevention of the unauthorized use of a resource oData Confidentiality –protection of data from unauthorized disclosure oData Integrity - assurance that data received is as sent by an authorized entity oNon-Repudiation - protection against denial by one of the parties in a communication 10
  • 14. Security Mechanism (X.800) ofeatures designed to detect, prevent, or recover from a security attack o No single mechanism that will support all services required o There security mechanism is categorized in two section o Specific Security Mechanism o Pervasive Security Mechanism 14
  • 17. Model for Network Security 17
  • 18. Model for Network Security Using this model requires us to: 1. design a suitable algorithm for the security transformation 2. generate the secret information (keys) used by the algorithm 3. develop methods to distribute and share the secret information 4. specify a protocol enabling the principals to use the transformation and secret information for a security service 18
  • 19. 19