SlideShare a Scribd company logo
1 of 14
EE-476 Communication and network security Lecture 1 Introduction Ayesha Naureen
Text Book and Reference Books Network Security Essentials: Applications and Standards - William Stallings Cryptography and Network Security Principles and Practices -William Stallings Network security: PRIVATE communication in a PUBLIC world - Kaufman, Perlman, and Speciner
Assessment & Grading Assignments (3-4) – 10% Quizzes (4-5) – 10%  Mid-Term Exam – 30% Final Exam – 50%
Course Outline (1/2) Introduction Cryptography Secret key cryptography Conventional Encryption Techniques Block Ciphers : DES, AES Hashes and message digests: SHA-1 , MD5 Public key cryptography: RSA
Course Outline (2/2) Network and system security applications  Authentication Applications: Kerberos Email security: PGP (Pretty Good Privacy) IP security: IPSEC Web and E-commerce: Secure Socket Layer Firewalls  Intrusion detection Malicious Software
Information Security Protection of information from theft, corruption, or collapse by unauthorized activities/untrustworthy individuals and unplanned events respectively, while allowing the information and property to remain accessible to its intended users.
Information Security – Computer Security & Network Security Computer Security A collection of tools designed to protect data stored on a machine. Network Security Security measures needed to protect data during transmission. No distinct boundaries between the two.
Understanding the Terminology through Example (1/5) User A transmits a file to user B. The file contains sensitive information that is to be protected from disclosure. User C, who is not authorized to read the file, is able to monitor the transmission and capture a copy of the file during its transmission. CONFIDENTIALITY Assuring information will be kept secret, with access limited to appropriate (authorized) persons.
Understanding the Terminology through Example (2/5) A network manager, D, transmits a message to a computer, E, under its management. The message instructs computer E to update a file to include the identities of a number of new users who are to be given access to that computer. User F intercepts the message, alter its contents to add or delete entries, and then forwards the message to E, which accepts the message as coming from manager D and updates its authorization file accordingly. INTEGRITY (MESSAGE INTEGRITY) Assuring information will not be accidentally or maliciously altered or destroyed.
Understanding the Terminology through Example (3/5) Denial of Service (DoS) attacks can bring down networks, servers, or applications.  A hacker or disgruntled employee could delete important data. AVAILABILITY Assuring information and communications services will be ready for use when expected.
Understanding the Terminology through Example (4/5) In continuation with example 2, rather than intercepting a message, user F constructs its own message with the desired entries and transmits that message to E as if it had come from manager D. Computer E accepts that message as coming from manager D and updates its authorization file accordingly. AUTHENTICATION (ORIGIN INTEGRITY) To positively verify the identity of an entity, often as a prerequisite to allowing access to resources in a system.
Understanding the Terminology through Example (5/5) A message is sent from a customer to a stockbroker with instructions for various transactions. Subsequently, the investments lose value and the customer denies sending the message. NON-REPUDIATION Method by which the sender of data is provided with proof of delivery and the recipient is assured of the sender’s identity, so that neither can later deny having processed the data.
Revisiting the Definition Protection of information from theft, corruption, or collapse by unauthorized activities/untrustworthy individuals and unplanned events respectively, while allowing the information and property to remain accessible to its intended users. CONFIDENTIALITY, INTEGRITY & AVAILABILITY
Basic Security Components Confidentiality Integrity Availability Authentication Non-repudiation Authorization

More Related Content

What's hot

Security communication
Security communicationSecurity communication
Security communication
Say Shyong
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
rahul kundu
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
limsh
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 

What's hot (17)

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Security communication
Security communicationSecurity communication
Security communication
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
Itc chapter # 11
Itc   chapter # 11Itc   chapter # 11
Itc chapter # 11
 
1 ijaems sept-2015-3-different attacks in the network a review
1 ijaems sept-2015-3-different attacks in the network  a review1 ijaems sept-2015-3-different attacks in the network  a review
1 ijaems sept-2015-3-different attacks in the network a review
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
Electrnic mail
Electrnic mailElectrnic mail
Electrnic mail
 
internet security
internet securityinternet security
internet security
 
Internet security
Internet securityInternet security
Internet security
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
1 security goals
1   security goals1   security goals
1 security goals
 

Similar to Lecture 1

Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud security
Asmaa Ibrahim
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
Shu Shin
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
AfiqEfendy Zaen
 

Similar to Lecture 1 (20)

Data security & cryptography
Data security & cryptography Data security & cryptography
Data security & cryptography
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 
Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud security
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
New PPT Presentation.pptx
New PPT Presentation.pptxNew PPT Presentation.pptx
New PPT Presentation.pptx
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
 
Survey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information SecuritySurvey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information Security
 
Security
SecuritySecurity
Security
 
Unit 1
Unit 1Unit 1
Unit 1
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Unit 1
Unit 1Unit 1
Unit 1
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
cryptographic security
cryptographic securitycryptographic security
cryptographic security
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 

Lecture 1

  • 1. EE-476 Communication and network security Lecture 1 Introduction Ayesha Naureen
  • 2. Text Book and Reference Books Network Security Essentials: Applications and Standards - William Stallings Cryptography and Network Security Principles and Practices -William Stallings Network security: PRIVATE communication in a PUBLIC world - Kaufman, Perlman, and Speciner
  • 3. Assessment & Grading Assignments (3-4) – 10% Quizzes (4-5) – 10% Mid-Term Exam – 30% Final Exam – 50%
  • 4. Course Outline (1/2) Introduction Cryptography Secret key cryptography Conventional Encryption Techniques Block Ciphers : DES, AES Hashes and message digests: SHA-1 , MD5 Public key cryptography: RSA
  • 5. Course Outline (2/2) Network and system security applications Authentication Applications: Kerberos Email security: PGP (Pretty Good Privacy) IP security: IPSEC Web and E-commerce: Secure Socket Layer Firewalls Intrusion detection Malicious Software
  • 6. Information Security Protection of information from theft, corruption, or collapse by unauthorized activities/untrustworthy individuals and unplanned events respectively, while allowing the information and property to remain accessible to its intended users.
  • 7. Information Security – Computer Security & Network Security Computer Security A collection of tools designed to protect data stored on a machine. Network Security Security measures needed to protect data during transmission. No distinct boundaries between the two.
  • 8. Understanding the Terminology through Example (1/5) User A transmits a file to user B. The file contains sensitive information that is to be protected from disclosure. User C, who is not authorized to read the file, is able to monitor the transmission and capture a copy of the file during its transmission. CONFIDENTIALITY Assuring information will be kept secret, with access limited to appropriate (authorized) persons.
  • 9. Understanding the Terminology through Example (2/5) A network manager, D, transmits a message to a computer, E, under its management. The message instructs computer E to update a file to include the identities of a number of new users who are to be given access to that computer. User F intercepts the message, alter its contents to add or delete entries, and then forwards the message to E, which accepts the message as coming from manager D and updates its authorization file accordingly. INTEGRITY (MESSAGE INTEGRITY) Assuring information will not be accidentally or maliciously altered or destroyed.
  • 10. Understanding the Terminology through Example (3/5) Denial of Service (DoS) attacks can bring down networks, servers, or applications. A hacker or disgruntled employee could delete important data. AVAILABILITY Assuring information and communications services will be ready for use when expected.
  • 11. Understanding the Terminology through Example (4/5) In continuation with example 2, rather than intercepting a message, user F constructs its own message with the desired entries and transmits that message to E as if it had come from manager D. Computer E accepts that message as coming from manager D and updates its authorization file accordingly. AUTHENTICATION (ORIGIN INTEGRITY) To positively verify the identity of an entity, often as a prerequisite to allowing access to resources in a system.
  • 12. Understanding the Terminology through Example (5/5) A message is sent from a customer to a stockbroker with instructions for various transactions. Subsequently, the investments lose value and the customer denies sending the message. NON-REPUDIATION Method by which the sender of data is provided with proof of delivery and the recipient is assured of the sender’s identity, so that neither can later deny having processed the data.
  • 13. Revisiting the Definition Protection of information from theft, corruption, or collapse by unauthorized activities/untrustworthy individuals and unplanned events respectively, while allowing the information and property to remain accessible to its intended users. CONFIDENTIALITY, INTEGRITY & AVAILABILITY
  • 14. Basic Security Components Confidentiality Integrity Availability Authentication Non-repudiation Authorization