Lecture01: Network Security Overview

Download Report

Transcript Lecture01: Network Security Overview

NETE0519 & ITEC4614
Computer Network Security
Asst.Prof.Supakorn Kungpisdan, Ph.D.
[email protected]
Supakorn Kungpisdan, Ph.D.
 Assistant Professor of Information Technology
 Education
 PhD (Computer Science and Software Engineering), Monash University,
Australia
 M.Eng. (Computer Engineering), KMUTT
 Specializations
 Information and Network Security, Electronic Commerce, Formal Methods,
Computer Networking
NETE0519-ITEC4614
2
Course Descriptions
 Textbook
 W. Stallings: Cryptography and Network Security, 4th Edition,
Pearson Prentice Hall, ISBN 0-13-202322-9 or later
 Supplementary materials
 M. E. Whitman and H. J. Mattord, Principles of Information
Security, 3rd Edition, Thomson, ISBN 1-4239-0177-0
 G. De Laet and G. Schauwers: Network Security Fundamentals,
Cisco Press, ISBN 1-58705-167-2
 http://www.msit.mut.ac.th/media
NETE0519-ITEC4614
3
Evaluation Criteria




Quizzes 10%
Lab 30%
Midterm exam 20%
Final exam 40%
NETE0519-ITEC4614
4
Course Outlines
 Network Security Overview
 Information Security
 Symmetric Cryptography, Public-key Cryptography, Hash Functions and MAC
 Network Security
 IP Security, Web Security, Email Security, Firewalls, Intrusion Detection
Systems
 Security Management
 Security Standards and Policy
NETE0519-ITEC4614
5
Lecture 01
Network Security Overview
Supakorn Kungpisdan, Ph.D.
[email protected]
What is Security?
 “The quality or state of being secure—to be free from
danger”
 A successful organization should have multiple layers of
security in place:





Information Security
Systems Security
Network Security
Security Management
Physical security
NETE0519-ITEC4614
7
Source: http://www.technewsworld.com/story/76109.html
NETE0519-ITEC4614
8
Source:
http://www.networkworld.com/research/2012/100812-security-manager39s-journal-i-hired-263130.html?source=nww_rss
NETE0519-ITEC4614
9
Security Trends
NETE0519-ITEC4614
10
C.I.A Triangle
 Confidentiality
 Integrity
 Availability
NETE0519-ITEC4614
11
Vulnerabilities, Threats, and Attacks
 Vulnerability
 Threat
 Attack
NETE0519-ITEC4614
12
NETE0519-ITEC4614
13
NETE0519-ITEC4614
14
How Hackers Exploit Weaknesses
NETE0519-ITEC4614
15
Types of Attacks
 Interruption
 Attack on Availability
 Interception
 Attack on Confidentiality
NETE0519-ITEC4614
16
Types of Attacks (cont.)
 Modification
 Attack on Integrity
 Tampering a resource
 Fabrication
 Attack on Authenticity
 Impersonation,
masquerading
NETE0519-ITEC4614
17
Passive VS Active Attacks
 Passive Attacks
 To obtain information that is
being transmitted.
 E.g. Release of confidential
information and Traffic analysis
 Difficult to detect
 Initiative to launch an active
attack
 Interception
 Relieved by using encryption
NETE0519-ITEC4614
 Active Attacks
 Involve modification of the data
stream or creation of a false
stream
 E.g. Masquerade, replay,
message modification, denial of
services
 Potentially detected by security
mechanisms
 Interruption, Modification,
Fabrication
18
Hackers





NETE0519-ITEC4614
White Hat Hackers
Grey Hat Hackers
Script Kiddies
Hacktivists
Crackers or Black Hat Hackers
19
Malicious Codes
 Viruses
 A destructive program code
that attaches itself to a host
and copies itself and spreads
to other hosts
 Viruses replicates and
remains undetected until
being activated.
 Trojans
 Externally harmless program
but contains malicious code
 Spyware
 Software installed on a target
machine sending information
back to an owning server
 Worms
 Unlike viruses, worms is
independent of other
programs or files. No trigger is
needed.
NETE0519-ITEC4614
20
Security at Each Layer
NETE0519-ITEC4614
21
A Model for Network Security
NETE0519-ITEC4614
22
A Model for Network Access Security
NETE0519-ITEC4614
23
Security Controls
NETE0519-ITEC4614
24
NETE0519-ITEC4614
25
NSTISSC Security Model
The National Security Telecommunications and Information Systems Security Committee
NETE0519-ITEC4614
26
Balancing Information Security and Access
NETE0519-ITEC4614
27
Approaches to Information Security
Implementation
NETE0519-ITEC4614
28
Approaches to Information Security
Implementation: Bottom-Up Approach
 Grassroots effort: systems administrators attempt to improve
security of their systems
 Key advantage: technical expertise of individual administrators
 Seldom works, as it lacks a number of critical features:
 Participant support
 Organizational staying power
NETE0519-ITEC4614
29
Approaches to Information Security
Implementation: Top-Down Approach
 Initiated by upper management
 Issue policy, procedures, and processes
 Dictate goals and expected outcomes of project
 Determine accountability for each required action
 The most successful also involve formal development
strategy referred to as systems development life cycle
NETE0519-ITEC4614
30
Security as a Social Science
 Social science examines the behavior of individuals
interacting with systems
 Security begins and ends with the people that interact
with the system
 Security administrators can greatly reduce levels of risk
caused by end users, and create more acceptable and
supportable security profiles
NETE0519-ITEC4614
31
Questions?
Next week
Symmetric Cryptography and Applications