SlideShare a Scribd company logo
1 of 11
Download to read offline
BIG DATAANALYTICS
SUBMITTED BY
NAME:K.GAYADRI
CLASS:II-M.SC,COMPUTER SCIENCE
BATCH:2017-2019
INCHARGE STAFF:MS.M.FLORENCE DAYANA
The problem is that given the OSI Network Model of: Application,
Transport, Network, Datalink and Physical, where amongst this can security be
deployed? Should everything be concentrated at the data link or network or transport…
layers? or should a Defence in Depth strategy be employed? These notes details the
various ways in which networks can be made secure. The remainder of this chapter
provides some introductory material in relation to networks and their security. First,
some terminology:
• Security Attack: Any action that compromises the security of information
exchanges and systems.
• Security Service: A service that enhances the security of information
exchanges and systems. A security service makes use of one or more
security mechanisms.
• Security Mechanism*: A mechanism that is designed to detect, prevent or
recover from a security attack.
. Security Attacks
There exist several attack types and they can be divided into two distinct category’s:
Passive and Active, they denote the amount of work that an attacker must do.
2.1.1. Passive Attacks
A Passive Attack is one that involves either the eavesdropping or monitoring of data communications.
The goal of the malicious entity is to acquire the information or learn more about the communication.
Traffic Analysis:
Traffic analysis is concerned with the analysis of patterns generated by the
actions of the parties involved. This may simply involve the detection of an
encrypted message being sent from a single party.
Such attacks are difficult to detect, due to their inherent nature. Though one can use encryption in
order to inhibit the success-fullness of such attacks.
Active Attacks
Active Attacks are those that involve the modification of the communication
channel or the data being sent across the channel.
• Masquerade: This is simply the impersonation of a legitimate
entity in order to abuse or access the resources accessible
by the entity.
• Replay: Involves the retransmission of existing and already
transmitted data in order to produce an unauthorized effect.
• Message Modification: The delay, modification, reorder on a
legitimate message such that it produces an unauthorized
effect.
• Denial of Service: This involves the prevention of or
reduction in quality, of a legitimate service. Such attacks may
target specific hosts or entire networks.
In contrast to passive attacks, active ones are easy to detect but harder to
counter, as it would involve the protection of all the communication services
offered.
A Security Service, as defined by X.800, is a service provided by a protocol layer of communicating
open systems, which ensures adequate security of the systems or data transfers. There are five ctegories
mentioned, together with availability:
Availability
The property of a system or a system resource being accessible and usable upon demand by an
authorized system entity, according to performance specifications for the system.
Access Control
The prevention of unauthorized use of a resource.
Authentication
This is the assurance that the communicating entity is the one that it claims to be. There are two classes
of authentication:
Data Confidentiality
The protection of data from unauthorised disclosure. This can be
further specified as:
• Connection Confidentiality — The protection of all
user data on a connection.
• Connectionless Confidentiality — The protection
of all user data in as single data block.
• Selective-Field Confidentiality — The
confidentiality of selected fields within the user data
on a connection or in a single data block.
• Traffic-Flow Confidentiality — The protection of
the information that might be derived from
observation of traffic flows.
Data Integrity
The assurance that data received is in the exact same format as it was
when sent by an authorised entity. This can be considered in terms of
Connection Integrity:
• Connection Integrity with Recovery — Provided for
the integrity of all user data on a connection and
detects any modification, insertion, deletion or replay of
any data within an entire data sequence, with recovery
attempted.
• Connection Integrity without Recovery — As
previously but provides only detection without recovery.
• Selective-Field Connection Integrity — Provides for
the integrity of selected field within the user data of a
data block transferred over a connection and takes the
form of determination of whether the selected fields
have been modified, inserted, deleted or replayed.
Security Mechanisms
refer to tools and techniques that can be implemented within a specific
protocol layer or out with the layer that provided some form of security. Some
examples are listed below.
Specific Mechanisms
Encryption, Digital Signatures, Access Control, Data Integrity, Authentication
Exchange, Traffic Padding, Routing Control, Notarisation
Pervasive Mechanisms
Trusted Functionality, Security Label, Event Detection, Security Audit
Trail, Security Recovery
a. Design an algorithm for performing the security related transformation.
b.Generate the secret information that is to be used.
c.Develop method for distribution and sharing of the secret information.
d.Specify a protocol to be used by the two principals that utilises the security
algorithm and secret information to achieve a particular security service. 2.4.2.
Secure Systems
Secure System
The other model reflects the remainder of the security problems that are
associated with the protection of an information system i.e. a network, from
malicious entities
THANKYOU

More Related Content

What's hot

ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges Behak Kangarloo
 
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Host-based Security, by Dmitry Khlebnikov @ Secure Development MelbourneHost-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Host-based Security, by Dmitry Khlebnikov @ Secure Development MelbourneAlec Sloman
 
Evaluation the performanc of dmz
Evaluation the performanc of dmzEvaluation the performanc of dmz
Evaluation the performanc of dmzBaha Rababah
 
Distributed system for access control to physical resources based on qualific...
Distributed system for access control to physical resources based on qualific...Distributed system for access control to physical resources based on qualific...
Distributed system for access control to physical resources based on qualific...Darshan Vithani
 
Personalized Sensing System
Personalized Sensing SystemPersonalized Sensing System
Personalized Sensing SystemNobre Pedro
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...IJNSA Journal
 
A Distributed Approach to Defend Web Service from DDoS Attacks
A Distributed Approach to Defend Web Service from DDoS AttacksA Distributed Approach to Defend Web Service from DDoS Attacks
A Distributed Approach to Defend Web Service from DDoS AttacksCSCJournals
 
G041124047
G041124047G041124047
G041124047IOSR-JEN
 
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksZainab Nayyar
 
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...IJNSA Journal
 
Transforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence SharingTransforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence SharingEMC
 

What's hot (20)

Chapter006
Chapter006Chapter006
Chapter006
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges
 
Do4301690695
Do4301690695Do4301690695
Do4301690695
 
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Host-based Security, by Dmitry Khlebnikov @ Secure Development MelbourneHost-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
 
Web security
Web securityWeb security
Web security
 
Evaluation the performanc of dmz
Evaluation the performanc of dmzEvaluation the performanc of dmz
Evaluation the performanc of dmz
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
 
Distributed system for access control to physical resources based on qualific...
Distributed system for access control to physical resources based on qualific...Distributed system for access control to physical resources based on qualific...
Distributed system for access control to physical resources based on qualific...
 
Jb ia
Jb   iaJb   ia
Jb ia
 
02.security systems
02.security systems02.security systems
02.security systems
 
Personalized Sensing System
Personalized Sensing SystemPersonalized Sensing System
Personalized Sensing System
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
 
A Distributed Approach to Defend Web Service from DDoS Attacks
A Distributed Approach to Defend Web Service from DDoS AttacksA Distributed Approach to Defend Web Service from DDoS Attacks
A Distributed Approach to Defend Web Service from DDoS Attacks
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
security IDS
security IDSsecurity IDS
security IDS
 
G041124047
G041124047G041124047
G041124047
 
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
 
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
 
Transforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence SharingTransforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence Sharing
 

Similar to NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE

A Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfA Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfRhonda Cetnar
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptxNISARSHAIKH57
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxsalutiontechnology
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityAparnaSunil24
 
Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptxAwais725629
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptxAwais725629
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptshanthishyam
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1Temesgen Berhanu
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 

Similar to NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE (20)

Unit 1
Unit 1Unit 1
Unit 1
 
A Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfA Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdf
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Lec 01.pdf
Lec 01.pdfLec 01.pdf
Lec 01.pdf
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptx
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
 
Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptx
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptx
 
abc.pptx
abc.pptxabc.pptx
abc.pptx
 
Ch01 NetSec5e.pdf
Ch01 NetSec5e.pdfCh01 NetSec5e.pdf
Ch01 NetSec5e.pdf
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Ch01
Ch01Ch01
Ch01
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 

Recently uploaded

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE

  • 1. BIG DATAANALYTICS SUBMITTED BY NAME:K.GAYADRI CLASS:II-M.SC,COMPUTER SCIENCE BATCH:2017-2019 INCHARGE STAFF:MS.M.FLORENCE DAYANA
  • 2. The problem is that given the OSI Network Model of: Application, Transport, Network, Datalink and Physical, where amongst this can security be deployed? Should everything be concentrated at the data link or network or transport… layers? or should a Defence in Depth strategy be employed? These notes details the various ways in which networks can be made secure. The remainder of this chapter provides some introductory material in relation to networks and their security. First, some terminology: • Security Attack: Any action that compromises the security of information exchanges and systems. • Security Service: A service that enhances the security of information exchanges and systems. A security service makes use of one or more security mechanisms. • Security Mechanism*: A mechanism that is designed to detect, prevent or recover from a security attack.
  • 3. . Security Attacks There exist several attack types and they can be divided into two distinct category’s: Passive and Active, they denote the amount of work that an attacker must do. 2.1.1. Passive Attacks A Passive Attack is one that involves either the eavesdropping or monitoring of data communications. The goal of the malicious entity is to acquire the information or learn more about the communication. Traffic Analysis: Traffic analysis is concerned with the analysis of patterns generated by the actions of the parties involved. This may simply involve the detection of an encrypted message being sent from a single party. Such attacks are difficult to detect, due to their inherent nature. Though one can use encryption in order to inhibit the success-fullness of such attacks.
  • 4. Active Attacks Active Attacks are those that involve the modification of the communication channel or the data being sent across the channel. • Masquerade: This is simply the impersonation of a legitimate entity in order to abuse or access the resources accessible by the entity. • Replay: Involves the retransmission of existing and already transmitted data in order to produce an unauthorized effect. • Message Modification: The delay, modification, reorder on a legitimate message such that it produces an unauthorized effect. • Denial of Service: This involves the prevention of or reduction in quality, of a legitimate service. Such attacks may target specific hosts or entire networks. In contrast to passive attacks, active ones are easy to detect but harder to counter, as it would involve the protection of all the communication services offered.
  • 5. A Security Service, as defined by X.800, is a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or data transfers. There are five ctegories mentioned, together with availability: Availability The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system. Access Control The prevention of unauthorized use of a resource. Authentication This is the assurance that the communicating entity is the one that it claims to be. There are two classes of authentication:
  • 6. Data Confidentiality The protection of data from unauthorised disclosure. This can be further specified as: • Connection Confidentiality — The protection of all user data on a connection. • Connectionless Confidentiality — The protection of all user data in as single data block. • Selective-Field Confidentiality — The confidentiality of selected fields within the user data on a connection or in a single data block. • Traffic-Flow Confidentiality — The protection of the information that might be derived from observation of traffic flows.
  • 7. Data Integrity The assurance that data received is in the exact same format as it was when sent by an authorised entity. This can be considered in terms of Connection Integrity: • Connection Integrity with Recovery — Provided for the integrity of all user data on a connection and detects any modification, insertion, deletion or replay of any data within an entire data sequence, with recovery attempted. • Connection Integrity without Recovery — As previously but provides only detection without recovery. • Selective-Field Connection Integrity — Provides for the integrity of selected field within the user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted or replayed.
  • 8. Security Mechanisms refer to tools and techniques that can be implemented within a specific protocol layer or out with the layer that provided some form of security. Some examples are listed below. Specific Mechanisms Encryption, Digital Signatures, Access Control, Data Integrity, Authentication Exchange, Traffic Padding, Routing Control, Notarisation Pervasive Mechanisms Trusted Functionality, Security Label, Event Detection, Security Audit Trail, Security Recovery
  • 9. a. Design an algorithm for performing the security related transformation. b.Generate the secret information that is to be used. c.Develop method for distribution and sharing of the secret information. d.Specify a protocol to be used by the two principals that utilises the security algorithm and secret information to achieve a particular security service. 2.4.2. Secure Systems
  • 10. Secure System The other model reflects the remainder of the security problems that are associated with the protection of an information system i.e. a network, from malicious entities