Lecture01: Network Security Overview
Download
Report
Transcript Lecture01: Network Security Overview
NETE0519 & ITEC4614
Computer Network Security
Asst.Prof.Supakorn Kungpisdan, Ph.D.
[email protected]
Supakorn Kungpisdan, Ph.D.
Assistant Professor of Information Technology
Education
PhD (Computer Science and Software Engineering), Monash University,
Australia
M.Eng. (Computer Engineering), KMUTT
Specializations
Information and Network Security, Electronic Commerce, Formal Methods,
Computer Networking
NETE0519-ITEC4614
2
Course Descriptions
Textbook
W. Stallings: Cryptography and Network Security, 4th Edition,
Pearson Prentice Hall, ISBN 0-13-202322-9 or later
Supplementary materials
M. E. Whitman and H. J. Mattord, Principles of Information
Security, 3rd Edition, Thomson, ISBN 1-4239-0177-0
G. De Laet and G. Schauwers: Network Security Fundamentals,
Cisco Press, ISBN 1-58705-167-2
http://www.msit.mut.ac.th/media
NETE0519-ITEC4614
3
Evaluation Criteria
Quizzes 10%
Lab 30%
Midterm exam 20%
Final exam 40%
NETE0519-ITEC4614
4
Course Outlines
Network Security Overview
Information Security
Symmetric Cryptography, Public-key Cryptography, Hash Functions and MAC
Network Security
IP Security, Web Security, Email Security, Firewalls, Intrusion Detection
Systems
Security Management
Security Standards and Policy
NETE0519-ITEC4614
5
Lecture 01
Network Security Overview
Supakorn Kungpisdan, Ph.D.
[email protected]
What is Security?
“The quality or state of being secure—to be free from
danger”
A successful organization should have multiple layers of
security in place:
Information Security
Systems Security
Network Security
Security Management
Physical security
NETE0519-ITEC4614
7
Source: http://www.technewsworld.com/story/76109.html
NETE0519-ITEC4614
8
Source:
http://www.networkworld.com/research/2012/100812-security-manager39s-journal-i-hired-263130.html?source=nww_rss
NETE0519-ITEC4614
9
Security Trends
NETE0519-ITEC4614
10
C.I.A Triangle
Confidentiality
Integrity
Availability
NETE0519-ITEC4614
11
Vulnerabilities, Threats, and Attacks
Vulnerability
Threat
Attack
NETE0519-ITEC4614
12
NETE0519-ITEC4614
13
NETE0519-ITEC4614
14
How Hackers Exploit Weaknesses
NETE0519-ITEC4614
15
Types of Attacks
Interruption
Attack on Availability
Interception
Attack on Confidentiality
NETE0519-ITEC4614
16
Types of Attacks (cont.)
Modification
Attack on Integrity
Tampering a resource
Fabrication
Attack on Authenticity
Impersonation,
masquerading
NETE0519-ITEC4614
17
Passive VS Active Attacks
Passive Attacks
To obtain information that is
being transmitted.
E.g. Release of confidential
information and Traffic analysis
Difficult to detect
Initiative to launch an active
attack
Interception
Relieved by using encryption
NETE0519-ITEC4614
Active Attacks
Involve modification of the data
stream or creation of a false
stream
E.g. Masquerade, replay,
message modification, denial of
services
Potentially detected by security
mechanisms
Interruption, Modification,
Fabrication
18
Hackers
NETE0519-ITEC4614
White Hat Hackers
Grey Hat Hackers
Script Kiddies
Hacktivists
Crackers or Black Hat Hackers
19
Malicious Codes
Viruses
A destructive program code
that attaches itself to a host
and copies itself and spreads
to other hosts
Viruses replicates and
remains undetected until
being activated.
Trojans
Externally harmless program
but contains malicious code
Spyware
Software installed on a target
machine sending information
back to an owning server
Worms
Unlike viruses, worms is
independent of other
programs or files. No trigger is
needed.
NETE0519-ITEC4614
20
Security at Each Layer
NETE0519-ITEC4614
21
A Model for Network Security
NETE0519-ITEC4614
22
A Model for Network Access Security
NETE0519-ITEC4614
23
Security Controls
NETE0519-ITEC4614
24
NETE0519-ITEC4614
25
NSTISSC Security Model
The National Security Telecommunications and Information Systems Security Committee
NETE0519-ITEC4614
26
Balancing Information Security and Access
NETE0519-ITEC4614
27
Approaches to Information Security
Implementation
NETE0519-ITEC4614
28
Approaches to Information Security
Implementation: Bottom-Up Approach
Grassroots effort: systems administrators attempt to improve
security of their systems
Key advantage: technical expertise of individual administrators
Seldom works, as it lacks a number of critical features:
Participant support
Organizational staying power
NETE0519-ITEC4614
29
Approaches to Information Security
Implementation: Top-Down Approach
Initiated by upper management
Issue policy, procedures, and processes
Dictate goals and expected outcomes of project
Determine accountability for each required action
The most successful also involve formal development
strategy referred to as systems development life cycle
NETE0519-ITEC4614
30
Security as a Social Science
Social science examines the behavior of individuals
interacting with systems
Security begins and ends with the people that interact
with the system
Security administrators can greatly reduce levels of risk
caused by end users, and create more acceptable and
supportable security profiles
NETE0519-ITEC4614
31
Questions?
Next week
Symmetric Cryptography and Applications