Transcript Introduction (Pres.)
COEN 350 Network Security Introduction Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer OSI Reference Model Useful to establish terminology Not implemented Upper layer implemented in terms of lower layer. OSI Reference Model Application Layer Locus of applications that use networking P2P HTTP ftp Presentation Layer Encodes application data into a canonical form Decodes it into system-dependent format at the receiving end. OSI Reference Model Session Layer Extra functions over reliable one-to-one connection RPC Transport Layer Reliable communication stream between a pair of systems. IP, UDP, TCP, ICMP OSI Reference Model Network Layer Computes paths across an interconnected mesh of links and packet switches Forwards packets over multiple links from source to destination OSI Reference Model Data Link Layer Organizes physical layer’s bits into packets and controls who on a shared link gets each packet. Physical Layer Delivers an unstructured stream of bits across a single link of some sort. TCP/IP Suite Protocol Layers and Security Security measures often layer network protocols. Protect contents of packages is protection at layer 2. Still allows traffic analysis. IPSec protects (encrypts) packages at layer 4 Does not work with NAT. Goals Authentication Authorization Are you allowed to do that? Integrity Who are you? Is this the real message? Privacy Does anyone else know about it? Zone of Control The zone that needs to be secured in order to prevent eavesdropping. Physical access needs to be prevented. Tempest program (US military) Legal Issues Patent Law First inventor has the right to invention. Patents issued based on what inventors present regarding Novelty ( Prior Art) Importance (“Aha” effect) Patent process flawed since Reagan underfunding, but slowly getting better Many cryptography algorithms are moving into the public domain. Legal Issues Export Control Cryptographic algorithms and tools were considered to be restricted technology. Treated like ammunition. Taking a laptop to Mexico for a week-end could be a violation of export control. Government gave up after PGP fiasco Legal Issues Key Escrow Cryptography algorithms became unbreakable in the nineties. Prevent wiretaps, computer forensics, etc. National security efforts sponsored Clipper: Encryption chip Two different agencies needed to cooperate to recover secret key. Government gave up.