SlideShare a Scribd company logo
Chapter 1:
Introduction

1
Technology History
Technology History
Security Use
Security Use
Security Layer
Security Layer
Why Security?
Why Security?

Attack/Hack
Attack/Hack
2
A Technology play role
and
influence in community service

3
Consumer Market
First, Let us look at the Evolution of Communications

4
Extracted from : Next Generation Home Networks: Driving a New Society?
Consumer Market
80-90s: A New World Called Internet

•
•

The start of the Internet
for masses using dial-up:
Phone line is shared
between the PC and the
phone
– Emergence of the ISP
concept with AOL,…
New concept:
Content available to
everybody

•
•

Modem

•
•

First Internet boom:
“New economy concept”

Phone Line
28 – 56kbps

5
Extracted from : Next Generation Home Networks: Driving a New Society?
Consumer Market
2000 – 2003: The Beginning of the Always-On Concept
•

Emergence of the ADSL
technology:
– Higher bandwidth than
dial-up: typically 64k to
384kbps
– “Always on” concept; i.e.,
no busy signal

•

Device per service
– One phone
– One PC

ADSL
64 – 384 kbps
6
Extracted from : Next Generation Home Networks: Driving a New Society?
Consumer Market
2003 – 2005: Emergence of Basic Home Networks and Triple Play Services
•

•

xDSL
20+ Mbps

Emergence of the new
DSL and xPON
technologies:
– Higher bandwidth than
ADSL: typically 20Mbps
per home
First signs of home
networks with the
digitalization of the Home:
– Digital Camera,
Camcorder, Playstation,
DVD, iPOD…

7
Extracted from : Next Generation Home Networks: Driving a New Society?
Consumer Market
2005 – 2015: The Digital Connected Home
•

Many multi-service devices
in the home:
– All using IP as a
foundation

•

Virtualization of Content:
– Access content
anywhere/anytime,
whether it is home-based
(Personal) or networkbased (Public)

•

Communications and
Entertainment

8
Extracted from : Next Generation Home Networks: Driving a New Society?
Example of Network Infrastructure
BTU

Residential Gateway (RG)
Broadband Termination Unit (BTU)

9
Technology History
Technology History
Security Use
Security Use
Security Layer
Security Layer
Why Security?
Why Security?

Attack/Hack
Attack/Hack
10
We will see now where a security mechanism is
mbed on technology.

Security use in daily basis.

11
Services

DATA

VOICE

IMAGE
12
Security use in daily basis 1 - biometric

13
Security use in daily basis 2 - Business

14
Security use in daily basis 3 – Voice Communication

15
Security use in daily basis 4 – Integration Operation

16
Security use in daily basis 5 – Operating System

17
Security use in daily basis 6 – WEB

18
Technology History
Technology History
Security Use
Security Use
Security Layer
Security Layer
Why Security?
Why Security?

Attack/Hack
Attack/Hack
19
Let me share with you on OSI layers
and
Internet layers
20
Seventh layers OSI Model
Application

Application
OSI Model

Network process to application

Presentation

Data Unit

Layer

Function

Application

Application

Application

Network process to application

Presentation
Host
Layers
Session

Presentation
Data

Presentation

Data representation and encryption

Session

Interhost communication

Segments

Transport

End-to-end communications and
reliability (TCP)

Network

Packets

Network

Path determination and logical
addressing (IP)

Media
Data Link
Layers

Frames

Data Link

Physical addressing (MAC & LLC)

Bits

Physical

Media, Signal and binary
transmission
21
Five Layers TCP/IP Model

Application

Transport

Application
DHCP • DNS • FTP • Gopher • HTTP • IMAP4 • IRC • NNTP • XMPP • MIME •
POP3 • SIP • SMTP • SNMP • SSH • TELNET • RPC • RTP • RTCP • TLS/SSL •
SDP • SOAP • VPN • PPTP • L2TP • GTP •
Presentation

TCP • UDP • DCCP • SCTP •

Internet

IP (IPv4 • IPv6) • IGMP • ICMP • RSVP • BGP • RIP • OSPF • ISIS • IPsec •
ARP • RARP •

Data Link

802.11 • ATM • DTM • Ethernet • FDDI • Frame Relay •
GPRS • EVDO • HSPA • HDLC • PPP •

Physical

Ethernet physical layer • ISDN • Modems • PLC •
SONET/SDH • G.709 • Wireless •

22
Five Layers TCP/IP Model

Refer to the TCP/IP Presentation Slides

23
Before I explain to you on security layer
Let review back the slides that presenting on
“security use in daily basis”
24
What is behind of these applications?
What is a mechanism that make it secure?

25
Security Layer *

Applications

Protocol

Cryptography

Applications:
Web, email, any application use security
mechanism

Protocol:
SSL, TLS

Algorithm:
Symmetric, Asymmetric (i.e.:Cipher, DES, AES)

* This approach is totally under my knowledge and experience, is not a standard, just to understand
26
the layer concept.
Security versus OSI & TCP/IP Model
OSI

TCP/IP

Application

Application

Presentation

Application
Presentation

Security

Applications

Session
Transport

Transport

Network

Internet

Data Link

Data Link

Physical

Physical

Protocol

Cryptography
27
Technology History
Technology History
Security Use
Security Use
Security Layer
Security Layer
Why Security?
Why Security?

Attack/Hack
Attack/Hack
28
Concept

Why we want security?
Let review back the slides that presenting on
“security use in daily basis”

29
Could you explain to me why we need security?

30
Why We Need Security
Privacy

The protection of data from unauthorized disclosure.

Integrity

The assurance that data received are exactly as sent by an
authorized entity (i.e., contain no modification, insertion,
deletion.

Authentication

The assurance that the communicating entity is the one that it
claims to be.

Provides protection against denial by one of the entities
Nonrepudation involved in a communication of having participated in all
or part of the communication.
Security Services (X.800)

31
Technology History
Technology History
Security Use
Security Use
Security Layer
Security Layer
Why Security?
Why Security?

Attack/Hack
Attack/Hack
32
Hacking - 1

33
Hacking - 2

DATA CENTER

34
Type of Attacks

Passive

Active

Passive attacks are in the nature of eavesdropping on,
or monitoring of, transmissions. The goal of the opponent
is to obtain information that is being transmitted. Two types
of passive attacks are release of message contents and
traffic analysis.

Active attacks involve some modification of the data stream
or the creation of a false stream and can be subdivided into
four categories: masquerade, replay, modification of
messages, and denial of service.

35
Passive Attack
Release of Message Contents

Read contents of
message from Bob
to Alice

Traffic Analysis

Observe pattern of
messages from Bob
to Alice

36
Active Attack - 1
Masquerade

Message from Hacker
that appears to be from Bob

Replay*

Capture message from
Bob to Alice; later
replay message to Alice

* An attack in which a service already authorized and completed is forged by
another "duplicate request" in an attempt to repeat authorized commands.

37
Active Attack - 2
Modification of messages

Modifies message from Bob to Alice

Denial of Service

disrupts service provided by server

38
How Do You Want Protect Your Network System

Thank You
See You Next Week

39

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber security
Cyber securityCyber security
Cyber security
Sakib Sami
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mostafa Elgamala
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
AYESHA JAVED
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
Vansh Bathla
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
PranjalShah18
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
hamzakareem2
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
Sandip Juthani
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal Auditors
Jim Kaplan CIA CFE
 
Cyber Threat Simulation
Cyber Threat SimulationCyber Threat Simulation
Cyber Threat Simulation
Tonex
 
Cyber security
Cyber securityCyber security
Cyber security
TaimoorArshad5
 
Network security
Network securityNetwork security
Network security
mena kaheel
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal Auditors
 
Cyber Threat Simulation
Cyber Threat SimulationCyber Threat Simulation
Cyber Threat Simulation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 

Similar to SYSTEM SECURITY - Chapter 1 introduction

Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
saag-3.ppt
saag-3.pptsaag-3.ppt
saag-3.ppt
HazemElabed2
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
JM code group
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
Tushar Rajput
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
It 241 Week 1 Cp Essay
It 241 Week 1 Cp EssayIt 241 Week 1 Cp Essay
It 241 Week 1 Cp Essay
Deborah Gastineau
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
Hitesh Mohapatra
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, Abstract
Victoria Burke
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
Usman Arshad
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
Samantha Randall
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
Lindsey Jones
 
Lecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptxLecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptx
SurendraBasnet6
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Editor IJCATR
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsGordon Haff
 
Wireless Security
Wireless SecurityWireless Security
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 

Similar to SYSTEM SECURITY - Chapter 1 introduction (20)

Cyber security
Cyber securityCyber security
Cyber security
 
saag-3.ppt
saag-3.pptsaag-3.ppt
saag-3.ppt
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
It 241 Week 1 Cp Essay
It 241 Week 1 Cp EssayIt 241 Week 1 Cp Essay
It 241 Week 1 Cp Essay
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, Abstract
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
Lecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptxLecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptx
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 

Recently uploaded

Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
datarid22
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
SriSurya50
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
amberjdewit93
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
scholarhattraining
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

SYSTEM SECURITY - Chapter 1 introduction

  • 2. Technology History Technology History Security Use Security Use Security Layer Security Layer Why Security? Why Security? Attack/Hack Attack/Hack 2
  • 3. A Technology play role and influence in community service 3
  • 4. Consumer Market First, Let us look at the Evolution of Communications 4 Extracted from : Next Generation Home Networks: Driving a New Society?
  • 5. Consumer Market 80-90s: A New World Called Internet • • The start of the Internet for masses using dial-up: Phone line is shared between the PC and the phone – Emergence of the ISP concept with AOL,… New concept: Content available to everybody • • Modem • • First Internet boom: “New economy concept” Phone Line 28 – 56kbps 5 Extracted from : Next Generation Home Networks: Driving a New Society?
  • 6. Consumer Market 2000 – 2003: The Beginning of the Always-On Concept • Emergence of the ADSL technology: – Higher bandwidth than dial-up: typically 64k to 384kbps – “Always on” concept; i.e., no busy signal • Device per service – One phone – One PC ADSL 64 – 384 kbps 6 Extracted from : Next Generation Home Networks: Driving a New Society?
  • 7. Consumer Market 2003 – 2005: Emergence of Basic Home Networks and Triple Play Services • • xDSL 20+ Mbps Emergence of the new DSL and xPON technologies: – Higher bandwidth than ADSL: typically 20Mbps per home First signs of home networks with the digitalization of the Home: – Digital Camera, Camcorder, Playstation, DVD, iPOD… 7 Extracted from : Next Generation Home Networks: Driving a New Society?
  • 8. Consumer Market 2005 – 2015: The Digital Connected Home • Many multi-service devices in the home: – All using IP as a foundation • Virtualization of Content: – Access content anywhere/anytime, whether it is home-based (Personal) or networkbased (Public) • Communications and Entertainment 8 Extracted from : Next Generation Home Networks: Driving a New Society?
  • 9. Example of Network Infrastructure BTU Residential Gateway (RG) Broadband Termination Unit (BTU) 9
  • 10. Technology History Technology History Security Use Security Use Security Layer Security Layer Why Security? Why Security? Attack/Hack Attack/Hack 10
  • 11. We will see now where a security mechanism is mbed on technology. Security use in daily basis. 11
  • 13. Security use in daily basis 1 - biometric 13
  • 14. Security use in daily basis 2 - Business 14
  • 15. Security use in daily basis 3 – Voice Communication 15
  • 16. Security use in daily basis 4 – Integration Operation 16
  • 17. Security use in daily basis 5 – Operating System 17
  • 18. Security use in daily basis 6 – WEB 18
  • 19. Technology History Technology History Security Use Security Use Security Layer Security Layer Why Security? Why Security? Attack/Hack Attack/Hack 19
  • 20. Let me share with you on OSI layers and Internet layers 20
  • 21. Seventh layers OSI Model Application Application OSI Model Network process to application Presentation Data Unit Layer Function Application Application Application Network process to application Presentation Host Layers Session Presentation Data Presentation Data representation and encryption Session Interhost communication Segments Transport End-to-end communications and reliability (TCP) Network Packets Network Path determination and logical addressing (IP) Media Data Link Layers Frames Data Link Physical addressing (MAC & LLC) Bits Physical Media, Signal and binary transmission 21
  • 22. Five Layers TCP/IP Model Application Transport Application DHCP • DNS • FTP • Gopher • HTTP • IMAP4 • IRC • NNTP • XMPP • MIME • POP3 • SIP • SMTP • SNMP • SSH • TELNET • RPC • RTP • RTCP • TLS/SSL • SDP • SOAP • VPN • PPTP • L2TP • GTP • Presentation TCP • UDP • DCCP • SCTP • Internet IP (IPv4 • IPv6) • IGMP • ICMP • RSVP • BGP • RIP • OSPF • ISIS • IPsec • ARP • RARP • Data Link 802.11 • ATM • DTM • Ethernet • FDDI • Frame Relay • GPRS • EVDO • HSPA • HDLC • PPP • Physical Ethernet physical layer • ISDN • Modems • PLC • SONET/SDH • G.709 • Wireless • 22
  • 23. Five Layers TCP/IP Model Refer to the TCP/IP Presentation Slides 23
  • 24. Before I explain to you on security layer Let review back the slides that presenting on “security use in daily basis” 24
  • 25. What is behind of these applications? What is a mechanism that make it secure? 25
  • 26. Security Layer * Applications Protocol Cryptography Applications: Web, email, any application use security mechanism Protocol: SSL, TLS Algorithm: Symmetric, Asymmetric (i.e.:Cipher, DES, AES) * This approach is totally under my knowledge and experience, is not a standard, just to understand 26 the layer concept.
  • 27. Security versus OSI & TCP/IP Model OSI TCP/IP Application Application Presentation Application Presentation Security Applications Session Transport Transport Network Internet Data Link Data Link Physical Physical Protocol Cryptography 27
  • 28. Technology History Technology History Security Use Security Use Security Layer Security Layer Why Security? Why Security? Attack/Hack Attack/Hack 28
  • 29. Concept Why we want security? Let review back the slides that presenting on “security use in daily basis” 29
  • 30. Could you explain to me why we need security? 30
  • 31. Why We Need Security Privacy The protection of data from unauthorized disclosure. Integrity The assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion. Authentication The assurance that the communicating entity is the one that it claims to be. Provides protection against denial by one of the entities Nonrepudation involved in a communication of having participated in all or part of the communication. Security Services (X.800) 31
  • 32. Technology History Technology History Security Use Security Use Security Layer Security Layer Why Security? Why Security? Attack/Hack Attack/Hack 32
  • 34. Hacking - 2 DATA CENTER 34
  • 35. Type of Attacks Passive Active Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are release of message contents and traffic analysis. Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service. 35
  • 36. Passive Attack Release of Message Contents Read contents of message from Bob to Alice Traffic Analysis Observe pattern of messages from Bob to Alice 36
  • 37. Active Attack - 1 Masquerade Message from Hacker that appears to be from Bob Replay* Capture message from Bob to Alice; later replay message to Alice * An attack in which a service already authorized and completed is forged by another "duplicate request" in an attempt to repeat authorized commands. 37
  • 38. Active Attack - 2 Modification of messages Modifies message from Bob to Alice Denial of Service disrupts service provided by server 38
  • 39. How Do You Want Protect Your Network System Thank You See You Next Week 39

Editor's Notes

  1. Liberation : Kebebasan Membebaskan diri dari terikat kepada ASTRO, RTM. Customer boleh download mana2 pun
  2. AOL – American Online. Founded in 1983. Bought over by Time Warner (media company) in 2001 AOL began as a short-lived venture called Quantum Computer Services (or QCS), founded by William von Meister. Its sole product was an online service called Gameline for the Atari 2600 video game console after von Meister's idea of buying music on demand was rejected by Warner Brothers. (Klein, 2003) Subscribers bought a modem from the company for $49.95 and paid a one-time $15 setup fee. Gameline permitted subscribers to temporarily download games and keep track of high scores, at a cost of approximately $1 per hour.
  3. iPOD – portable media player
  4. Explain about having several gadgets connecting all this services, stress on the security part.