SlideShare a Scribd company logo
1 of 14
Network Security

             Henric Johnson
Blekinge Institute of Technology, Sweden
        www.its.bth.se/staff/hjo/
          henric.johnson@bth.se
              +46 708 250375
             Henric Johnson    1
Outline
•   Attacks, services and mechanisms
•   Security attacks
•   Security services
•   Methods of Defense
•   A model for Internetwork Security
•   Internet standards and RFCs


              Henric Johnson   2
Attacks, Services and
          Mechanisms
• Security Attack: Any action that
  compromises the security of information.
• Security Mechanism: A mechanism that is
  designed to detect, prevent, or recover from a
  security attack.
• Security Service: A service that enhances
  the security of data processing systems and
  information transfers. A security service
  makes use of one or more security mechanisms.

               Henric Johnson      3
Security Attacks




   Henric Johnson   4
Security Attacks
• Interruption: This is an attack on
  availability
• Interception: This is an attack on
  confidentiality
• Modification: This is an attack on
  integrity
• Fabrication: This is an attack on
  authenticity

            Henric Johnson     5
Security Goals

            Confidentiality




Integrity               Avalaibility


       Henric Johnson           6
Henric Johnson   7
Security Services
• Confidentiality (privacy)
• Authentication (who created or sent the data)
• Integrity (has not been altered)
• Non-repudiation (the order is final)
• Access control (prevent misuse of resources)
• Availability (permanence, non-erasure)
   – Denial of Service Attacks
   – Virus that deletes files
                Henric Johnson             8
Henric Johnson   9
Henric Johnson   10
Methods of Defence
• Encryption
• Software Controls (access limitations
  in a data base, in operating system
  protect each user from other users)
• Hardware Controls (smartcard)
• Policies (frequent changes of
  passwords)
• Physical Controls
            Henric Johnson    11
Internet standards and
            RFCs
• The Internet society
  – Internet Architecture Board (IAB)
  – Internet Engineering Task Force (IETF)
  – Internet Engineering Steering Group
    (IESG)




             Henric Johnson      12
Internet RFC Publication
        Process




       Henric Johnson   13
Recommended Reading
• Pfleeger, C. Security in Computing.
  Prentice Hall, 1997.

• Mel, H.X. Baker, D. Cryptography
  Decrypted. Addison Wesley, 2001.



             Henric Johnson    14

More Related Content

What's hot

Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityNeha Raju k
 
Network security
Network securityNetwork security
Network securityRaaz Karkee
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and InvestigationNeha Raju k
 
Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacksVaibhav Khanna
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 
CSCAMP2015 - Mobile Security in the age of APTs
CSCAMP2015 - Mobile Security in the age of APTsCSCAMP2015 - Mobile Security in the age of APTs
CSCAMP2015 - Mobile Security in the age of APTsAnwar Mohamed
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introductionVaibhav Khanna
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Neha Raju k
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challengesVaibhav Khanna
 
Information and network security 2 nist security definition
Information and network security 2 nist security definitionInformation and network security 2 nist security definition
Information and network security 2 nist security definitionVaibhav Khanna
 

What's hot (18)

Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information security
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Network security
Network securityNetwork security
Network security
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
INTRODUCTION TO SECURITY
INTRODUCTION TO SECURITYINTRODUCTION TO SECURITY
INTRODUCTION TO SECURITY
 
Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacks
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
CSCAMP2015 - Mobile Security in the age of APTs
CSCAMP2015 - Mobile Security in the age of APTsCSCAMP2015 - Mobile Security in the age of APTs
CSCAMP2015 - Mobile Security in the age of APTs
 
Network security
Network securityNetwork security
Network security
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introduction
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Computer security
Computer securityComputer security
Computer security
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challenges
 
Information and network security 2 nist security definition
Information and network security 2 nist security definitionInformation and network security 2 nist security definition
Information and network security 2 nist security definition
 

Viewers also liked

SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introductionAfna Crcs
 
Introduction to computer security syllabus
Introduction to computer security syllabusIntroduction to computer security syllabus
Introduction to computer security syllabusAyebazibwe Kenneth
 
Information Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgInformation Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgEric Vanderburg
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherGopal Sakarkar
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - IntroductionWayne Jones Jnr
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 

Viewers also liked (10)

SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
Security
SecuritySecurity
Security
 
Security in the workplace
Security in the workplaceSecurity in the workplace
Security in the workplace
 
Introduction to computer security syllabus
Introduction to computer security syllabusIntroduction to computer security syllabus
Introduction to computer security syllabus
 
Information Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgInformation Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric Vanderburg
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - Introduction
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 

Similar to Chapter 1

Chapter 1
Chapter 1Chapter 1
Chapter 1shivz3
 
Network Security introduction.pdf
Network Security introduction.pdfNetwork Security introduction.pdf
Network Security introduction.pdfssuser3e6464
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1koolkampus
 
network security for ece cse it students
network security for  ece cse it studentsnetwork security for  ece cse it students
network security for ece cse it studentsAnjali shanmugam
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)Stephen Abram
 
Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!Asad Ali
 
Week 1 - Introduction to Information Security.pptx
Week 1 - Introduction to Information Security.pptxWeek 1 - Introduction to Information Security.pptx
Week 1 - Introduction to Information Security.pptxChristianEarlPalason
 
ResearchProjectPPT
ResearchProjectPPTResearchProjectPPT
ResearchProjectPPTdannyboi17
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptxEmanAzam
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.pptPandiya Rajan
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptshahadd2021
 
Review of Information Security Concepts
Review of Information Security ConceptsReview of Information Security Concepts
Review of Information Security Conceptsprimeteacher32
 

Similar to Chapter 1 (20)

Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Network Security introduction.pdf
Network Security introduction.pdfNetwork Security introduction.pdf
Network Security introduction.pdf
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
 
network security for ece cse it students
network security for  ece cse it studentsnetwork security for  ece cse it students
network security for ece cse it students
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 
Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!
 
Week 1 - Introduction to Information Security.pptx
Week 1 - Introduction to Information Security.pptxWeek 1 - Introduction to Information Security.pptx
Week 1 - Introduction to Information Security.pptx
 
ResearchProjectPPT
ResearchProjectPPTResearchProjectPPT
ResearchProjectPPT
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptx
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
Review of Information Security Concepts
Review of Information Security ConceptsReview of Information Security Concepts
Review of Information Security Concepts
 

Chapter 1

  • 1. Network Security Henric Johnson Blekinge Institute of Technology, Sweden www.its.bth.se/staff/hjo/ henric.johnson@bth.se +46 708 250375 Henric Johnson 1
  • 2. Outline • Attacks, services and mechanisms • Security attacks • Security services • Methods of Defense • A model for Internetwork Security • Internet standards and RFCs Henric Johnson 2
  • 3. Attacks, Services and Mechanisms • Security Attack: Any action that compromises the security of information. • Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. • Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms. Henric Johnson 3
  • 4. Security Attacks Henric Johnson 4
  • 5. Security Attacks • Interruption: This is an attack on availability • Interception: This is an attack on confidentiality • Modification: This is an attack on integrity • Fabrication: This is an attack on authenticity Henric Johnson 5
  • 6. Security Goals Confidentiality Integrity Avalaibility Henric Johnson 6
  • 8. Security Services • Confidentiality (privacy) • Authentication (who created or sent the data) • Integrity (has not been altered) • Non-repudiation (the order is final) • Access control (prevent misuse of resources) • Availability (permanence, non-erasure) – Denial of Service Attacks – Virus that deletes files Henric Johnson 8
  • 11. Methods of Defence • Encryption • Software Controls (access limitations in a data base, in operating system protect each user from other users) • Hardware Controls (smartcard) • Policies (frequent changes of passwords) • Physical Controls Henric Johnson 11
  • 12. Internet standards and RFCs • The Internet society – Internet Architecture Board (IAB) – Internet Engineering Task Force (IETF) – Internet Engineering Steering Group (IESG) Henric Johnson 12
  • 13. Internet RFC Publication Process Henric Johnson 13
  • 14. Recommended Reading • Pfleeger, C. Security in Computing. Prentice Hall, 1997. • Mel, H.X. Baker, D. Cryptography Decrypted. Addison Wesley, 2001. Henric Johnson 14