SlideShare a Scribd company logo
1 of 41
Chapter Twelve
Network Security
Data Communications and Computer Networks: A Business
User’s Approach
Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
After reading this chapter,
you should be able to:Recognize the basic forms of system
attacksRecognize the concepts underlying physical protection
measuresCite the techniques used to control access to computers
and networksDiscuss the strengths and weaknesses of
passwordsList the techniques used to make data secure
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
After reading this chapter,
you should be able to (continued):Explain the difference
between a substitution-based cipher and a transposition-based
cipherOutline the basic features of public key cryptography,
Advanced Encryption Standard, digital signatures, and the
public key infrastructureCite the techniques used to secure
communicationsDescribe the differences between the frequency
hopping spread spectrum technique and the direct sequence
spread spectrum technique
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
After reading this chapter,
you should be able to (continued):Recognize the importance of
a firewall and be able to describe the two basic types of firewall
protectionRecognize the techniques used to secure wireless
communicationsList the advantages to a business of having a
security policy
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
IntroductionWhile computer systems today have some of the
best security systems ever, they are more vulnerable than ever
beforeThis vulnerability stems from the world-wide access to
computer systems via the InternetComputer and network
security comes in many forms, including encryption algorithms,
access to facilities, digital signatures, and using fingerprints
and face scans as passwords
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Standard System AttacksVirusesComputer virus – small
program that alters the way a computer operates and often does
various types of damage by deleting and corrupting data and
program files, or by altering operating system components, so
that computer operation is impaired or even haltedMany
different types of viruses, such as parasitic, boot sector, stealth,
polymorphic, and macro
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Standard System Attacks (continued)WormsComputer worm –
program that copies itself from one system to another over a
network, without the assistance of a human beingWorms usually
propagate themselves by transferring from computer to
computer via e-mailTypically, a virus or a worm is transported
as a Trojan horseIn other words, hiding inside a harmless-
looking piece of code such as an e-mail or an application macro
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Standard System Attacks (continued)Two popular forms of
attacks:Socially engineered attack – a bogus link in a web page
that leads to no goodExploiting known vulnerabilities in
operating systems and application softwareFor both of these,
software company issues a patchPatch may fix it, or introduce
even more holesEither way, bad guys find new holes and exploit
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Standard System Attacks (continued)Very common way to
attack vulnerability is via an e-mail attachmentYou open the
attachment and you launch the virusSecond common way to
attack is to simply scan your computer ports while you are
connected to the Internet (either dial-up or non-dial-up)If you
have an open port, hacker will download malicious software to
your machine
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Standard System Attacks (continued)Other standard
attacksDenial of service attacks, or distributed denial of service
attacksBombard computer site with so many messages that site
is incapable of answering valid requestE-mail bombingUser
sends an excessive amount of unwanted e-mail to
someoneBotnetsMalicious programs that take over operations on
a comprised computer
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Standard System Attacks (continued)Other standard attacks
(continued)Smurfing Nasty technique in which a program
attacks a network by exploiting IP broadcast addressing
operationsPing storm Condition in which the Internet ping
program is used to send a flood of packets to a server
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Standard System Attacks (continued)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Standard System Attacks (continued)Other standard attacks
(continued)Spoofing When a user creates a packet that appears
to be something else or from someone elseTrojan Horse
Malicious piece of code hidden inside a seemingly harmless
piece of code.Stealing, guessing, and intercepting passwords is
also a tried and true form of attack
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Standard System Attacks (continued)Other standard attacks
(continued)Phishing Hackers create emails which look as if they
are coming from a legit source when in reality the hacker is
trying to get the user to give up ID and password infoPharming
Hacker redirects unknowing user to bogus look-alike website
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Standard System Attacks (continued)Other standard attacks
(continued)Rootkit A program that has been installed deep
within a user’s operating system; defies detection and takes
over the user’s computerKeylogger A software system that
secretly captures and records keystrokes made at a user’s
keyboard
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Physical ProtectionProtection from environmental damage such
as floods, earthquakes, and heatPhysical security such as
locking rooms, locking down computers, keyboards, and other
devicesElectrical protection from power surgesNoise protection
from placing computers away from devices that generate
electromagnetic interference
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Physical Protection (continued)Surveillance Proper placement
of security cameras can deter theft and vandalismCameras can
also provide a record of activitiesIntrusion detection is a field
of study in which specialists try to prevent intrusion and try to
determine if a computer system has been violatedHoneypot is an
indirect form of surveillanceNetwork personnel create a trap,
watching for unscrupulous activity
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Controlling AccessDeciding who has access to whatLimiting
time of day accessLimiting day of week accessLimiting access
from a location, such as not allowing a user to use a remote
login during certain periods of time
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Controlling Access (continued)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Passwords and ID SystemsPasswords are the most common form
of security and the most abusedSimple rules help support safe
passwords, including:Change your password oftenPick a good,
random password (minimum 8 characters, mixed symbols)Don’t
share passwords or write them downDon’t select names and
familiar objects as passwords
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Passwords and ID Systems (continued)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Passwords and ID Systems (continued)Many new forms of
“passwords” are emerging (biometrics):FingerprintsFace
printsRetina scans and iris scansVoice printsEar prints (?)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Access RightsTwo basic questions to access rights: Who and
how?Who do you give access rights to? No one, group of users,
entire set of users?How does a user or group of users have
access? Read, write, delete, print, copy, execute?Most network
operating systems have a powerful system for assigning access
rights
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Access Rights (continued)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
AuditingCreating a computer or paper audit can help detect
wrongdoingAuditing can also be used as a deterrentMany
network operating systems allow the administrator to audit most
types of transactionsMany types of criminals have been caught
because of computer-based audits
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Auditing (continued)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Basic Encryption and Decryption TechniquesCryptography –
study of creating and using encryption and decryption
techniquesPlaintext – data before any encryption has been
performedCiphertext – data after encryption has been
performedThe key is the unique piece of information that is
used to create ciphertext and decrypt the ciphertext back into
plaintext
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Basic Encryption and Decryption Techniques (continued)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Monoalphabetic Substitution-Based CiphersMonoalphabetic
substitution-based ciphers replace a character or characters with
a different character or characters, based upon some
keyReplacing: abcdefghijklmnopqrstuvwxyz
with: POIUYTREWQLKJHGFDSAMNBVCXZThe
message: how about lunch at noon
encodes into: EGVPO GNMKN HIEPM HGGH
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Polyalphabetic Substitution-Based CiphersSimilar to
monoalphabetic ciphers except multiple alphabetic strings are
used to encode the plaintextExample – matrix of strings, 26
rows by 26 characters or columns can be usedA key such as
COMPUTERSCIENCE is placed repeatedly over the
plaintextCOMPUTERSCIENCECOMPUTERSCIENCECOMPUT
ERthisclassondatacommunicationsisthebest
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Polyalphabetic Substitution-Based Ciphers (continued)To
encode the message, take the first letter of the plaintext, t, and
the corresponding key character immediately above it, CGo to
row C column t in the 26x26 matrix and retrieve the ciphertext
character VContinue with the other characters in plaintext
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Polyalphabetic Substitution-Based Ciphers (continued)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Transposition-Based CiphersIn a transposition-based cipher, the
order of the plaintext is not preservedAs a simple example,
select a key such as COMPUTERNumber the letters of the word
COMPUTER in the order they appear in the alphabet
1 4 3 5 8 7 2 6
C O M P U T E R
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Transposition-Based Ciphers (continued)Now take the plaintext
message and write it under the key
1 4 3 5 8 7 2 6
C O M P U T E R
t h i s i s t h
e b e s t c l a
s s i h a v e e
v e r t a k e n
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Transposition-Based Ciphers (continued)Then read the
ciphertext down the columns, starting with the column
numbered 1, followed by column number 2
TESVTLEEIEIRHBSESSHTHAENSCVKITAA
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Public Key CryptographyVery powerful encryption technique in
which two keys are usedFirst key (the public key) encrypts the
message Second key (the private key) decrypts the messageNot
possible to deduce one key from the otherNot possible to break
code given public keyIf you want someone to send you secure
data, give them your public key, you keep the private keySecure
Sockets Layer on the Internet is a common example of public
key cryptography
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Data Encryption Standard and Advanced Encryption
StandardCreated in 1977 and in operation into the 1990s, the
Data Encryption Standard took a 64-bit block of data and
subjected it to 16 levels of encryptionThe choice of encryption
performed at each of the 16 levels depends on the 56-bit key
appliedEven though 56 bits provides over 72 quadrillion
combinations, a system using this standard has been cracked (in
1998 by Electronic Frontier Foundation in 3 days)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Data Encryption Standard and Advanced Encryption Standard
(continued)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Data Encryption Standard and Advanced Encryption Standard
(continued)Triple-DES More powerful data encryption
standardData is encrypted using DES three times: First time by
the first keySecond time by a second keyThird time by the first
key again Can also have 3 unique keysWhile virtually
unbreakable, triple-DES is CPU intensiveWith more smart
cards, cell phones, and PDAs, a faster (and smaller) piece of
code is highly desirable
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Data Encryption Standard and Advanced Encryption Standard
(continued)Advanced Encryption Standard (AES) Selected by
the U.S. government to replace DESNational Institute of
Standards and Technology selected the algorithm Rijndael
(pronounced rain-doll) in October 2000 as the basisHas more
elegant mathematical formulas, requires only one pass, and was
designed to be fast, unbreakable, and able to support even the
smallest computing device
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Data Encryption Standard and Advanced Encryption Standard
(continued)Advanced Encryption Standard (AES)
(continued)Key size of AES: 128, 192, or 256 bitsEstimated
time to crack (assuming a machine could crack a DES key in 1
second) : 149 trillion yearsVery fast execution with very good
use of resources
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Digital SignaturesDocument to be signed is sent through a
complex mathematical computation that generates a hashHash is
encoded with owner’s private key then storedTo prove future
ownership, stored hash is decoded using the owner’s public key
and that hash is compared with a current hash of the documentIf
the two hashes agree, document belongs to the ownerU.S.
accepts digitally signed documents as legal proof (for some
types of documents)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
Pretty Good Privacy (PGP)Encryption software created by
Philip Zimmermann Can be used to secure email and other data
filesEmploys public key cryptography and digital signatures
*
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
KerberosAn authentication protocol designed to work on
client/server networksEmploys both private key cryptography
(one key both encrypts and decrypts) and public key
cryptography (two separate keys)Another free software for use
in the U.S.Many operating systems provide Kerberos for
authentication of users and services
*
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
Public Key InfrastructureCombination of encryption techniques,
software, and services that involves all the necessary pieces to
support digital certificates, certificate authorities, and public
key generation, storage, and managementA certificate, or digital
certificate, is an electronic document, similar to a passport, that
establishes your credentials when you are performing
transactions
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Public Key Infrastructure (continued)A digital certificate
contains your name, serial number, expiration dates, copy of
your public key, and digital signature of certificate-issuing
authority.Certificates are usually kept in a registry so other
users may check them for authenticity.
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Public Key Infrastructure (continued)Certificates are issued by
a certificate authority (CA)A CA is either specialized software
on a company network or a trusted third party Let’s say you
want to order something over the InternetThe Web site wants to
make sure you are legit, so the Web server requests your
browser to sign the order with your private key (obtained from
your certificate)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Public Key Infrastructure (continued)Let’s say you want to
order something over the Internet (continued)The Web server
then requests your certificate from the third party CA, validates
that certificate by verifying third party’s signature, then uses
that certificate to validate the signature on your orderThe user
can do the same procedure to make sure the Web server is not a
bogus operationA certificate revocation list is used to
“deactivate” a user’s certificate
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Public Key Infrastructure (continued)Applications that could
benefit from PKI:Web transactionsVirtual private
networksElectronic mailClient-server applicationsBanking
transactions
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
SteganographyThe art and science of hiding information inside
other, seemingly ordinary messages or documentsUnlike
sending an encrypted message, you do not know when
steganography is hiding a secret message within a
documentExamples include creating a watermark over an image
or taking “random” pixels from an image and replacing them
with the hidden data
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Securing CommunicationsSo far we have examined standard
system attacks, physical protection, controlling access, and
securing dataNow let’s examine securing communicationsOne
way to secure the transfer of data is to scramble the signal as it
is being transmittedThis is called spread spectrum technology
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Spread Spectrum TechnologyA secure encoding technique that
uses multiple frequencies or codes to transmit data.Two basic
spread spectrum technologies:Frequency hopping spread
spectrumDirect sequence spread spectrum
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Spread Spectrum Technology (continued)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Spread Spectrum Technology (continued)Direct sequence spread
spectrum This technology replaces each binary 0 and binary 1
with a unique pattern, or sequence, of 1s and 0sFor example,
one transmitter may transmit the sequence 10010100 for each
binary 1, and 11001010 for each binary 0Another transmitter
may transmit the sequence 11110000 for each binary 1, and
10101010 for each binary 0
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Spread Spectrum Technology (continued)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Guarding Against VirusesSignature-based scanners look for
particular virus patterns or signatures and alert the
userTerminate-and-stay-resident programs run in the
background constantly watching for viruses and their
actionsMulti-level generic scanning is a combination of
antivirus techniques including intelligent checksum analysis and
expert system analysis
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
FirewallsA system or combination of systems that supports an
access control policy between two networksCan limit the types
of transactions that enter a system, as well as the types of
transactions that leave a systemCan be programmed to stop
certain types or ranges of IP addresses, as well as certain types
of TCP port numbers (applications)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Three Basic Types of Firewalls
Packet filter firewall – essentially a router that has been
programmed to filter out or allow to pass certain IP addresses or
TCP port numbers
Proxy server – more advanced firewall that acts as a doorman
into a corporate networkAny external transaction that requests
something from the corporate network must enter through the
proxy serverProxy servers are more advanced but make external
accesses slower
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Three Basic Types of Firewalls (continued)
Application layer – inspects all packets coming into or leaving a
connection using the application layer of the TCP/IP protocol
suiteGoes beyond IP addresses and TCP port numbers and
inspects packet to see to which application it belongs
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Firewalls (continued)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Firewalls (continued)
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Wireless SecurityHow do you make a wireless LAN
secure?WEP (Wired Equivalency Protocol) was the first
security protocol used with wireless LANsIt had weak 40-bit
static keys and was too easy to breakWPA (Wi-Fi Protected
Access) replaced WEPMajor improvement including dynamic
key encryption and mutual authentication for wireless clients
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Wireless Security (continued)Both of these should eventually
give way to a new protocol created by the IEEE IEEE 802.11i,
or WPA2WPA2 allows keys, encryption algorithms, and
negotiation to be dynamically assignedAlso, AES encryption
based on the Rijndael algorithm with 128-, 192-, or 256-bit keys
is incorporated
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Security Policy Design IssuesWhat is the company’s desired
level of security?How much money is the company willing to
invest in security?If the company is serious about restricting
access through an Internet link, what about restricting access
through all other entry ways?The company must have a well-
designed security policy
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Network Security In Action:
Making Wireless LANs SecureRecall Hannah the network
administrator from Chapters Seven, Eight, and Nine – Now her
company wants to add a wireless LAN to their system and make
it secureShe needs to protect herself from war driversShould she
use WEP?What about Cisco’s LEAP (Lightweight Extensible
Authentication Protocol)?
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Network Security In Action:
Making Wireless LANs Secure (continued)What about WPA? If
she decides to use WPA, where does she have to install the
WPA software? In the user’s laptop? At the wireless access
point? At the network server? All the above?What about
WPA2?Too new? Compatible software and hardware systems?
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
SummaryNetwork security continues to be an increasingly
important topic, particularly with increase in network
interconnectivityTwo most common system attacks are: Socially
engineered attacksAttacking known OS and application software
vulnerabilitiesNetwork personnel and users must take physical
protection measuresControlling access to computer system and
its network is an essential aspect of network security
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Summary (continued)Passwords and other ID systems are very
common access-controlling security techniquesPasswords can
be stolen and used by unscrupulous partiesMost computer
systems apply access rights to resources of the system and
usersSoftware that conducts continuous audit of network
transactions creates electronic trail that companies can use
when trying to catch malicious usersProviding security for
system data is just as important as securing the system itself
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Summary (continued)Public key cryptography uses two keysOne
key to encode messages Second key to decode messagesData
Encryption Standard was created in 1977 and uses a 56-bit key
to encrypt data transmitted between two business
locationsDigital signatures use public key cryptography and can
be used to verify that a given document belongs to given
personPretty Good Privacy is free encryption software that
allows regular users as well as commercial users to encrypt and
decrypt everyday transmissions
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Summary (continued)Kerberos is public or private key
encryption technique that can be used by commercial
application programs to verify that a user is who he or she
claims to bePublic key infrastructure uses public key
cryptography, digital signatures, and digital certificates to
enable secure passage of data over unsecured
networksSteganography is study of hiding secret data within an
unrelated document, for example, hiding bits of a message
within pixels of an imageAlong with securing network data, it is
imperative to secure network communications
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
*
Summary (continued)In order to secure communications,
network administrators and users must be aware of standard
computer attacks and viruses that can damage computer
systemsAnother means of securing communications is a
firewall, a system or combination of systems that supports an
access control policy between two networksSecuring wireless
networks is a new and exciting field of studyA proper network
security design helps corporate network staff by clearly
delineating which network transactions are acceptable
Data Communications and Computer Networks: A Business
User's Approach, Eighth Edition
© 2016. Cengage Learning. All Rights Reserved.
*
Network Security Chapter - Passwords, Biometrics, Firewalls & More

More Related Content

Similar to Network Security Chapter - Passwords, Biometrics, Firewalls & More

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docxalinainglis
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking - Mark - Fullbright
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Jennifer Letterman
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docxjuliennehar
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
Survey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetijctet
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 

Similar to Network Security Chapter - Passwords, Biometrics, Firewalls & More (20)

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docx
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Data security
Data securityData security
Data security
 
Survey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manet
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 

More from mccormicknadine86

Option #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docxOption #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docxmccormicknadine86
 
Option 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxOption 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxmccormicknadine86
 
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxOption Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxmccormicknadine86
 
Option A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docxOption A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docxmccormicknadine86
 
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docxOption 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docxmccormicknadine86
 
OPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxOPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxmccormicknadine86
 
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxOption 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxmccormicknadine86
 
Option A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docxOption A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docxmccormicknadine86
 
Option #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docxOption #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docxmccormicknadine86
 
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docxOption 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docxmccormicknadine86
 
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxOption 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxmccormicknadine86
 
Option #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxOption #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxmccormicknadine86
 
Option A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docxOption A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docxmccormicknadine86
 
opic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docxopic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docxmccormicknadine86
 
Option 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docxOption 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docxmccormicknadine86
 
Option #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxOption #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxmccormicknadine86
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxmccormicknadine86
 
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docxOpen the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docxmccormicknadine86
 
onsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docxonsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docxmccormicknadine86
 
Operations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docxOperations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docxmccormicknadine86
 

More from mccormicknadine86 (20)

Option #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docxOption #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docx
 
Option 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxOption 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docx
 
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxOption Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
 
Option A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docxOption A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docx
 
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docxOption 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
 
OPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxOPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docx
 
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxOption 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
 
Option A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docxOption A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docx
 
Option #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docxOption #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docx
 
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docxOption 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
 
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxOption 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
 
Option #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxOption #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docx
 
Option A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docxOption A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docx
 
opic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docxopic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docx
 
Option 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docxOption 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docx
 
Option #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxOption #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docx
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
 
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docxOpen the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
 
onsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docxonsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docx
 
Operations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docxOperations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docx
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 

Network Security Chapter - Passwords, Biometrics, Firewalls & More

  • 1. Chapter Twelve Network Security Data Communications and Computer Networks: A Business User’s Approach Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * After reading this chapter, you should be able to:Recognize the basic forms of system attacksRecognize the concepts underlying physical protection measuresCite the techniques used to control access to computers and networksDiscuss the strengths and weaknesses of passwordsList the techniques used to make data secure Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. *
  • 2. * After reading this chapter, you should be able to (continued):Explain the difference between a substitution-based cipher and a transposition-based cipherOutline the basic features of public key cryptography, Advanced Encryption Standard, digital signatures, and the public key infrastructureCite the techniques used to secure communicationsDescribe the differences between the frequency hopping spread spectrum technique and the direct sequence spread spectrum technique Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * After reading this chapter, you should be able to (continued):Recognize the importance of a firewall and be able to describe the two basic types of firewall protectionRecognize the techniques used to secure wireless communicationsList the advantages to a business of having a security policy Data Communications and Computer Networks: A Business User's Approach, Eighth Edition
  • 3. © 2016. Cengage Learning. All Rights Reserved. * * IntroductionWhile computer systems today have some of the best security systems ever, they are more vulnerable than ever beforeThis vulnerability stems from the world-wide access to computer systems via the InternetComputer and network security comes in many forms, including encryption algorithms, access to facilities, digital signatures, and using fingerprints and face scans as passwords Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Standard System AttacksVirusesComputer virus – small
  • 4. program that alters the way a computer operates and often does various types of damage by deleting and corrupting data and program files, or by altering operating system components, so that computer operation is impaired or even haltedMany different types of viruses, such as parasitic, boot sector, stealth, polymorphic, and macro Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Standard System Attacks (continued)WormsComputer worm – program that copies itself from one system to another over a network, without the assistance of a human beingWorms usually propagate themselves by transferring from computer to computer via e-mailTypically, a virus or a worm is transported as a Trojan horseIn other words, hiding inside a harmless- looking piece of code such as an e-mail or an application macro Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. *
  • 5. * Standard System Attacks (continued)Two popular forms of attacks:Socially engineered attack – a bogus link in a web page that leads to no goodExploiting known vulnerabilities in operating systems and application softwareFor both of these, software company issues a patchPatch may fix it, or introduce even more holesEither way, bad guys find new holes and exploit Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Standard System Attacks (continued)Very common way to attack vulnerability is via an e-mail attachmentYou open the attachment and you launch the virusSecond common way to attack is to simply scan your computer ports while you are connected to the Internet (either dial-up or non-dial-up)If you have an open port, hacker will download malicious software to your machine Data Communications and Computer Networks: A Business
  • 6. User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Standard System Attacks (continued)Other standard attacksDenial of service attacks, or distributed denial of service attacksBombard computer site with so many messages that site is incapable of answering valid requestE-mail bombingUser sends an excessive amount of unwanted e-mail to someoneBotnetsMalicious programs that take over operations on a comprised computer Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * *
  • 7. Standard System Attacks (continued)Other standard attacks (continued)Smurfing Nasty technique in which a program attacks a network by exploiting IP broadcast addressing operationsPing storm Condition in which the Internet ping program is used to send a flood of packets to a server Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Standard System Attacks (continued) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * *
  • 8. Standard System Attacks (continued)Other standard attacks (continued)Spoofing When a user creates a packet that appears to be something else or from someone elseTrojan Horse Malicious piece of code hidden inside a seemingly harmless piece of code.Stealing, guessing, and intercepting passwords is also a tried and true form of attack Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Standard System Attacks (continued)Other standard attacks (continued)Phishing Hackers create emails which look as if they are coming from a legit source when in reality the hacker is trying to get the user to give up ID and password infoPharming Hacker redirects unknowing user to bogus look-alike website Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. *
  • 9. * Standard System Attacks (continued)Other standard attacks (continued)Rootkit A program that has been installed deep within a user’s operating system; defies detection and takes over the user’s computerKeylogger A software system that secretly captures and records keystrokes made at a user’s keyboard Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Physical ProtectionProtection from environmental damage such as floods, earthquakes, and heatPhysical security such as locking rooms, locking down computers, keyboards, and other devicesElectrical protection from power surgesNoise protection from placing computers away from devices that generate electromagnetic interference Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved.
  • 10. * * Physical Protection (continued)Surveillance Proper placement of security cameras can deter theft and vandalismCameras can also provide a record of activitiesIntrusion detection is a field of study in which specialists try to prevent intrusion and try to determine if a computer system has been violatedHoneypot is an indirect form of surveillanceNetwork personnel create a trap, watching for unscrupulous activity Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Controlling AccessDeciding who has access to whatLimiting time of day accessLimiting day of week accessLimiting access
  • 11. from a location, such as not allowing a user to use a remote login during certain periods of time Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Controlling Access (continued) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Passwords and ID SystemsPasswords are the most common form of security and the most abusedSimple rules help support safe
  • 12. passwords, including:Change your password oftenPick a good, random password (minimum 8 characters, mixed symbols)Don’t share passwords or write them downDon’t select names and familiar objects as passwords Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Passwords and ID Systems (continued) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * *
  • 13. Passwords and ID Systems (continued)Many new forms of “passwords” are emerging (biometrics):FingerprintsFace printsRetina scans and iris scansVoice printsEar prints (?) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Access RightsTwo basic questions to access rights: Who and how?Who do you give access rights to? No one, group of users, entire set of users?How does a user or group of users have access? Read, write, delete, print, copy, execute?Most network operating systems have a powerful system for assigning access rights Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * *
  • 14. Access Rights (continued) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * AuditingCreating a computer or paper audit can help detect wrongdoingAuditing can also be used as a deterrentMany network operating systems allow the administrator to audit most types of transactionsMany types of criminals have been caught because of computer-based audits Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * *
  • 15. Auditing (continued) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Basic Encryption and Decryption TechniquesCryptography – study of creating and using encryption and decryption techniquesPlaintext – data before any encryption has been performedCiphertext – data after encryption has been performedThe key is the unique piece of information that is used to create ciphertext and decrypt the ciphertext back into plaintext Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. *
  • 16. * Basic Encryption and Decryption Techniques (continued) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Monoalphabetic Substitution-Based CiphersMonoalphabetic substitution-based ciphers replace a character or characters with a different character or characters, based upon some keyReplacing: abcdefghijklmnopqrstuvwxyz with: POIUYTREWQLKJHGFDSAMNBVCXZThe message: how about lunch at noon encodes into: EGVPO GNMKN HIEPM HGGH Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved.
  • 17. * * Polyalphabetic Substitution-Based CiphersSimilar to monoalphabetic ciphers except multiple alphabetic strings are used to encode the plaintextExample – matrix of strings, 26 rows by 26 characters or columns can be usedA key such as COMPUTERSCIENCE is placed repeatedly over the plaintextCOMPUTERSCIENCECOMPUTERSCIENCECOMPUT ERthisclassondatacommunicationsisthebest Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Polyalphabetic Substitution-Based Ciphers (continued)To encode the message, take the first letter of the plaintext, t, and the corresponding key character immediately above it, CGo to row C column t in the 26x26 matrix and retrieve the ciphertext
  • 18. character VContinue with the other characters in plaintext Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Polyalphabetic Substitution-Based Ciphers (continued) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Transposition-Based CiphersIn a transposition-based cipher, the order of the plaintext is not preservedAs a simple example, select a key such as COMPUTERNumber the letters of the word
  • 19. COMPUTER in the order they appear in the alphabet 1 4 3 5 8 7 2 6 C O M P U T E R Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Transposition-Based Ciphers (continued)Now take the plaintext message and write it under the key 1 4 3 5 8 7 2 6 C O M P U T E R t h i s i s t h e b e s t c l a s s i h a v e e v e r t a k e n Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. *
  • 20. * Transposition-Based Ciphers (continued)Then read the ciphertext down the columns, starting with the column numbered 1, followed by column number 2 TESVTLEEIEIRHBSESSHTHAENSCVKITAA Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Public Key CryptographyVery powerful encryption technique in which two keys are usedFirst key (the public key) encrypts the message Second key (the private key) decrypts the messageNot possible to deduce one key from the otherNot possible to break code given public keyIf you want someone to send you secure data, give them your public key, you keep the private keySecure Sockets Layer on the Internet is a common example of public key cryptography Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved.
  • 21. * * Data Encryption Standard and Advanced Encryption StandardCreated in 1977 and in operation into the 1990s, the Data Encryption Standard took a 64-bit block of data and subjected it to 16 levels of encryptionThe choice of encryption performed at each of the 16 levels depends on the 56-bit key appliedEven though 56 bits provides over 72 quadrillion combinations, a system using this standard has been cracked (in 1998 by Electronic Frontier Foundation in 3 days) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Data Encryption Standard and Advanced Encryption Standard
  • 22. (continued) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Data Encryption Standard and Advanced Encryption Standard (continued)Triple-DES More powerful data encryption standardData is encrypted using DES three times: First time by the first keySecond time by a second keyThird time by the first key again Can also have 3 unique keysWhile virtually unbreakable, triple-DES is CPU intensiveWith more smart cards, cell phones, and PDAs, a faster (and smaller) piece of code is highly desirable Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * *
  • 23. Data Encryption Standard and Advanced Encryption Standard (continued)Advanced Encryption Standard (AES) Selected by the U.S. government to replace DESNational Institute of Standards and Technology selected the algorithm Rijndael (pronounced rain-doll) in October 2000 as the basisHas more elegant mathematical formulas, requires only one pass, and was designed to be fast, unbreakable, and able to support even the smallest computing device Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Data Encryption Standard and Advanced Encryption Standard (continued)Advanced Encryption Standard (AES) (continued)Key size of AES: 128, 192, or 256 bitsEstimated time to crack (assuming a machine could crack a DES key in 1 second) : 149 trillion yearsVery fast execution with very good use of resources Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved.
  • 24. * * Digital SignaturesDocument to be signed is sent through a complex mathematical computation that generates a hashHash is encoded with owner’s private key then storedTo prove future ownership, stored hash is decoded using the owner’s public key and that hash is compared with a current hash of the documentIf the two hashes agree, document belongs to the ownerU.S. accepts digitally signed documents as legal proof (for some types of documents) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * Pretty Good Privacy (PGP)Encryption software created by Philip Zimmermann Can be used to secure email and other data filesEmploys public key cryptography and digital signatures * Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved.
  • 25. KerberosAn authentication protocol designed to work on client/server networksEmploys both private key cryptography (one key both encrypts and decrypts) and public key cryptography (two separate keys)Another free software for use in the U.S.Many operating systems provide Kerberos for authentication of users and services * Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * Public Key InfrastructureCombination of encryption techniques, software, and services that involves all the necessary pieces to support digital certificates, certificate authorities, and public key generation, storage, and managementA certificate, or digital certificate, is an electronic document, similar to a passport, that establishes your credentials when you are performing transactions Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. *
  • 26. * Public Key Infrastructure (continued)A digital certificate contains your name, serial number, expiration dates, copy of your public key, and digital signature of certificate-issuing authority.Certificates are usually kept in a registry so other users may check them for authenticity. Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Public Key Infrastructure (continued)Certificates are issued by a certificate authority (CA)A CA is either specialized software on a company network or a trusted third party Let’s say you want to order something over the InternetThe Web site wants to make sure you are legit, so the Web server requests your browser to sign the order with your private key (obtained from your certificate) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition
  • 27. © 2016. Cengage Learning. All Rights Reserved. * * Public Key Infrastructure (continued)Let’s say you want to order something over the Internet (continued)The Web server then requests your certificate from the third party CA, validates that certificate by verifying third party’s signature, then uses that certificate to validate the signature on your orderThe user can do the same procedure to make sure the Web server is not a bogus operationA certificate revocation list is used to “deactivate” a user’s certificate Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * *
  • 28. Public Key Infrastructure (continued)Applications that could benefit from PKI:Web transactionsVirtual private networksElectronic mailClient-server applicationsBanking transactions Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * SteganographyThe art and science of hiding information inside other, seemingly ordinary messages or documentsUnlike sending an encrypted message, you do not know when steganography is hiding a secret message within a documentExamples include creating a watermark over an image or taking “random” pixels from an image and replacing them with the hidden data Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. *
  • 29. * Securing CommunicationsSo far we have examined standard system attacks, physical protection, controlling access, and securing dataNow let’s examine securing communicationsOne way to secure the transfer of data is to scramble the signal as it is being transmittedThis is called spread spectrum technology Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Spread Spectrum TechnologyA secure encoding technique that uses multiple frequencies or codes to transmit data.Two basic spread spectrum technologies:Frequency hopping spread spectrumDirect sequence spread spectrum Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved.
  • 30. * * Spread Spectrum Technology (continued) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Spread Spectrum Technology (continued)Direct sequence spread spectrum This technology replaces each binary 0 and binary 1 with a unique pattern, or sequence, of 1s and 0sFor example,
  • 31. one transmitter may transmit the sequence 10010100 for each binary 1, and 11001010 for each binary 0Another transmitter may transmit the sequence 11110000 for each binary 1, and 10101010 for each binary 0 Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Spread Spectrum Technology (continued) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * *
  • 32. Guarding Against VirusesSignature-based scanners look for particular virus patterns or signatures and alert the userTerminate-and-stay-resident programs run in the background constantly watching for viruses and their actionsMulti-level generic scanning is a combination of antivirus techniques including intelligent checksum analysis and expert system analysis Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * FirewallsA system or combination of systems that supports an access control policy between two networksCan limit the types of transactions that enter a system, as well as the types of transactions that leave a systemCan be programmed to stop certain types or ranges of IP addresses, as well as certain types of TCP port numbers (applications) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved.
  • 33. * * Three Basic Types of Firewalls Packet filter firewall – essentially a router that has been programmed to filter out or allow to pass certain IP addresses or TCP port numbers Proxy server – more advanced firewall that acts as a doorman into a corporate networkAny external transaction that requests something from the corporate network must enter through the proxy serverProxy servers are more advanced but make external accesses slower Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Three Basic Types of Firewalls (continued) Application layer – inspects all packets coming into or leaving a connection using the application layer of the TCP/IP protocol
  • 34. suiteGoes beyond IP addresses and TCP port numbers and inspects packet to see to which application it belongs Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Firewalls (continued) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * *
  • 35. Firewalls (continued) Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Wireless SecurityHow do you make a wireless LAN secure?WEP (Wired Equivalency Protocol) was the first security protocol used with wireless LANsIt had weak 40-bit static keys and was too easy to breakWPA (Wi-Fi Protected Access) replaced WEPMajor improvement including dynamic key encryption and mutual authentication for wireless clients Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * *
  • 36. Wireless Security (continued)Both of these should eventually give way to a new protocol created by the IEEE IEEE 802.11i, or WPA2WPA2 allows keys, encryption algorithms, and negotiation to be dynamically assignedAlso, AES encryption based on the Rijndael algorithm with 128-, 192-, or 256-bit keys is incorporated Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Security Policy Design IssuesWhat is the company’s desired level of security?How much money is the company willing to invest in security?If the company is serious about restricting access through an Internet link, what about restricting access through all other entry ways?The company must have a well- designed security policy Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. *
  • 37. * Network Security In Action: Making Wireless LANs SecureRecall Hannah the network administrator from Chapters Seven, Eight, and Nine – Now her company wants to add a wireless LAN to their system and make it secureShe needs to protect herself from war driversShould she use WEP?What about Cisco’s LEAP (Lightweight Extensible Authentication Protocol)? Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Network Security In Action: Making Wireless LANs Secure (continued)What about WPA? If she decides to use WPA, where does she have to install the WPA software? In the user’s laptop? At the wireless access
  • 38. point? At the network server? All the above?What about WPA2?Too new? Compatible software and hardware systems? Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * SummaryNetwork security continues to be an increasingly important topic, particularly with increase in network interconnectivityTwo most common system attacks are: Socially engineered attacksAttacking known OS and application software vulnerabilitiesNetwork personnel and users must take physical protection measuresControlling access to computer system and its network is an essential aspect of network security Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Summary (continued)Passwords and other ID systems are very common access-controlling security techniquesPasswords can be stolen and used by unscrupulous partiesMost computer systems apply access rights to resources of the system and usersSoftware that conducts continuous audit of network
  • 39. transactions creates electronic trail that companies can use when trying to catch malicious usersProviding security for system data is just as important as securing the system itself Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Summary (continued)Public key cryptography uses two keysOne key to encode messages Second key to decode messagesData Encryption Standard was created in 1977 and uses a 56-bit key to encrypt data transmitted between two business locationsDigital signatures use public key cryptography and can be used to verify that a given document belongs to given personPretty Good Privacy is free encryption software that allows regular users as well as commercial users to encrypt and decrypt everyday transmissions Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Summary (continued)Kerberos is public or private key encryption technique that can be used by commercial
  • 40. application programs to verify that a user is who he or she claims to bePublic key infrastructure uses public key cryptography, digital signatures, and digital certificates to enable secure passage of data over unsecured networksSteganography is study of hiding secret data within an unrelated document, for example, hiding bits of a message within pixels of an imageAlong with securing network data, it is imperative to secure network communications Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. * * Summary (continued)In order to secure communications, network administrators and users must be aware of standard computer attacks and viruses that can damage computer systemsAnother means of securing communications is a firewall, a system or combination of systems that supports an access control policy between two networksSecuring wireless networks is a new and exciting field of studyA proper network security design helps corporate network staff by clearly delineating which network transactions are acceptable Data Communications and Computer Networks: A Business User's Approach, Eighth Edition © 2016. Cengage Learning. All Rights Reserved. *