SlideShare a Scribd company logo
NETWORK SECURITY
Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D).,
Head, Dept. of CA
Bon Secours College For Women
Thanjavur.
Class : II MSc., CS
Semester : III
Unit : I
2/15/2019 1
ELECTIVE III – NETWORK SECURITY
Unit I
Overview-Symmetric Ciphers: Classical Encryption Techniques
Unit II
Symmetric Ciphers: Block ciphers and the Data Encryption Standards Public
key Encryption and Hash Functions: Public-Key Cryptography and RSA
Unit III
Network Security Practices: Authentication applications-Electronic Mail
Security
Unit IV
Network Security Practices: IP Security-Web Security
Unit V
System Security: Intruders-Malicious Software-Firewalls
Text Book(s) 1. William Stallings, Cryptography and Network Security-
Principles and Practices, Prentice-Hall, Third edition, 2003
References 1. Johannes A. Buchaman , Introduction to cryptography,
Springer-Verlag.
2. Atul kahate , Cryptography and Network Security, TMH
Definitions
• Computer Security - also known as cyber security or
IT security, is the protection of computer systems
from the theft or damage to their hardware,
software or information, as well as from disruption
or misdirection of the services they provide.
• Network Security - measures to protect data during
their transmission
• Internet Security - measures to protect data
during their transmission over a collection of
interconnected networks.
• which consists of measures to deter, prevent,
detect, and correct security violations that
involve the transmission & storage of
information
5
Goals of Computer Security
1.CONFIDENTIALITY
• Confidentiality refers to protecting information
from being accessed by unauthorized parties. In
other words, only the people who are authorized
to do so can gain access to sensitive data.
• Imagine your bank records. You should be able to
access them, of course, and employees at the bank
who are helping you with a transaction should be
able to access them, but no one else should.
2. INTEGRITY
• The second goal of Network Security is "Integrity".
Integrity aims at maintaining and assuring the accuracy
and consistency of data.
• The function of Integrity is to make sure that the data
is accurate and reliable and is not changed by
unauthorized persons or hackers.
• The data received by the recipient must be exactly
same as the data sent from the sender, without
change in even single bit of data.
• cryptography plays a very major role
in ensuring data integrity.
3. AVAILABILITY
Availability: The third goal of network security is
"Availability".
Availability of information refers to ensuring that
authorized parties are able to access the information
when needed.
Information only has value if the right people can access
it at the right times. Denying access to information has
become a very common attack nowadays.
How does one ensure data availability? Backup is key.
Regularly doing off-site backups can limit the damage
caused by damage to hard drives or natural disasters.
Levels of Impact
We can define 3 levels of impact from a
security breach
Low
Moderate
High
Low Impact
• The loss could be expected to have a limited adverse effect
on organizational operations, organizational assets, or
individuals.
• The loss of confidentiality, integrity, or availability might
– (i) minor damage to organizational assets;
– (ii) minor financial loss; or
– (iii) minor harm to individuals.
Moderate Impact
• The loss could be expected to have a serious adverse effect on
organizational operations, organizational assets, or individuals.
• A serious adverse effect means that, for example, the loss might
– (i) the functions is significantly reduced;
– (ii) result in significant damage to organizational assets;
– (iii) result in significant financial loss; or
– (iv) result in significant harm to individuals that does not
involve loss of life or serious, life-threatening injuries.
High Impact
• The loss could be expected to have a severe or catastrophic
adverse effect on organizational operations, organizational
assets, or individuals.
• A severe or catastrophic adverse effect means that, for
example, the loss might
– (i) cause a severe degradation
– (ii) result in major damage to organizational assets;
– (iii) result in major financial loss; or
– (iv) result in severe or catastrophic harm to individuals
involving loss of life or serious life threatening injuries.
Challenges of Computer Security
1. Computer security is not simple
2. One must consider potential (unexpected) attacks
3. Procedures used are often counter-intuitive
4. Must decide where to deploy mechanisms
5. Involve algorithms and secret info (keys)
6. A battle of wits between attacker / admin
7. It is not perceived on benefit until fails
8. Requires constant monitoring
9. Too often an after-thought (not integral)
10. Regarded as impediment to using system
Aspects of Security
The 3 aspects of information security:
– Security Attack
– Security Mechanism
– Security Service
• Security attack: Any action that compromises the security of
information owned by an organization.
• • Security mechanism: A process (or a device) that is designed to
detect, prevent, or recover from a security attack.
• • Security service: A processing or communication service that
enhances the security of the data processing systems and the
information transfers of an organization.
• Attack - An assault on system security that
derives from an intelligent threat; that is, an
intelligent act that is a deliberate attempt
(especially in the sense of a method or
technique) to evade security services and
violate the security policy of a system. There
are two types of attacks.
• 1. Passive Attack 2. Active Attack
Handling Attacks
• Passive attacks – A passive attack
attempts to learn or make use of
information from the system but does not
affect system resources.
• Passive attacks are in the nature of
eavesdropping on, or monitoring of,
transmissions.
• These attacks are difficult to detect
because they do not involve any alteration
of the data.
Passive Attack - Interception
release of message contents
Passive Attack: Traffic Analysis
Observe traffic pattern
Traffic analysis - monitor traffic flow to determine location
and identity of communicating hosts and could observe the
frequency and length of messages being exchanged
Active Attack
Active attacks involve some modification of the data
stream or the creation of a false stream
It can be subdivided into four categories:
masquerade, replay, modification of messages, and
denial of service:
• Masquerade of one entity as some other
• Replay previous messages
• Modify/alter (part of) messages in transit to
produce an unauthorized effect
• Denial of service - prevents or inhibits the normal
use or management of communications facilities
Active Attack: Interruption
Block delivery of message
Active Attack: Fabrication
Fabricate message
Active Attack: Replay
Active Attack: Modification
Modify message
Model for Network Security
This general model shows that there are four basic tasks in
designing a particular security service.
1. Design a suitable algorithm for the security transformation
2. Generate the secret information (keys) used by the
algorithm
3. Develop methods to distribute and share the secret
information
4. Specify a protocol enabling the principles to use the
transformation and secret information for a security
service
Model for Network Access Security
using this model requires us to:
1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated information
or resources

More Related Content

PPTX
What is Cryptography and Types of attacks in it
PPT
Symmetric & Asymmetric Cryptography
PPTX
Types of attacks
PPTX
Intrusion detection
 
PPT
Email Security : PGP & SMIME
PPTX
Osi security architecture in network.pptx
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
System security
What is Cryptography and Types of attacks in it
Symmetric & Asymmetric Cryptography
Types of attacks
Intrusion detection
 
Email Security : PGP & SMIME
Osi security architecture in network.pptx
Network security (vulnerabilities, threats, and attacks)
System security

What's hot (20)

PDF
Network security & cryptography full notes
PPT
Pretty good privacy
PPTX
Double DES & Triple DES
PDF
2. public key cryptography and RSA
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Application layer security protocol
PPTX
Symmetric and asymmetric key
PPTX
Network security
PPTX
MAC-Message Authentication Codes
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Message Authentication Code & HMAC
PPTX
Network security
PPTX
Social engineering presentation
PPTX
Network security
PDF
Block Ciphers and the Data Encryption Standard
PPT
DES (Data Encryption Standard) pressentation
PPTX
System Security-Chapter 1
PPTX
Social Engineering new.pptx
Network security & cryptography full notes
Pretty good privacy
Double DES & Triple DES
2. public key cryptography and RSA
CRYPTOGRAPHY AND NETWORK SECURITY
Application layer security protocol
Symmetric and asymmetric key
Network security
MAC-Message Authentication Codes
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Message Authentication Code & HMAC
Network security
Social engineering presentation
Network security
Block Ciphers and the Data Encryption Standard
DES (Data Encryption Standard) pressentation
System Security-Chapter 1
Social Engineering new.pptx
Ad

Similar to Chapter- I introduction (20)

PDF
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
PDF
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
PPTX
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
PPT
M.Florence Dayana/Cryptography and Network security
PPT
cryptographic security
PDF
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
PDF
BAIT1103 Chapter 1
PPT
Module-1.ppt cryptography and network security
PPTX
Information system security Unit 1.pptx
PPTX
information security (network security methods)
PPTX
Information security ist lecture
PPTX
CNS Module 1 in cryptography and network security
PPTX
Unit 1 Network Fundamentals and Security .pptx
PPTX
Unit 1-NETWORK Security.pptx............
PDF
Data information and security unit 1.pdf
PDF
OPERATING SYSTEM SECURITY
ODP
Network Security Topic 1 intro
PPT
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
PPT
ch01_overview_nemo.ppt
PPT
ch01_overview_nemo.ppt
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
M.Florence Dayana/Cryptography and Network security
cryptographic security
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
BAIT1103 Chapter 1
Module-1.ppt cryptography and network security
Information system security Unit 1.pptx
information security (network security methods)
Information security ist lecture
CNS Module 1 in cryptography and network security
Unit 1 Network Fundamentals and Security .pptx
Unit 1-NETWORK Security.pptx............
Data information and security unit 1.pdf
OPERATING SYSTEM SECURITY
Network Security Topic 1 intro
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo.ppt
ch01_overview_nemo.ppt
Ad

More from Dr.Florence Dayana (20)

PDF
Dr.M.Florence Dayana-Cloud Computing Architecture.pdf
PDF
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
PDF
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
PPTX
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
PDF
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
PDF
M.FLORENCE DAYANA/electronic mail security.pdf
PDF
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
PPTX
Professional English - Reading
PPTX
Professional English - Speaking
PPTX
Professional English - Listening
PDF
INPUT AND OUTPUT DEVICES.pdf
PPTX
NETWORK SECURITY-SET.pptx
PPTX
Network Security- Secure Socket Layer
PPT
M.florence dayana dream weaver
PDF
M.florence dayana computer networks transport layer
PDF
M.Florence Dayana Computer Networks Types
PDF
M.Florence Dayana Computer Networks Introduction
PPTX
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
PDF
M.Florence Dayana
PPT
M.Florence Dayana / Basics of C Language
Dr.M.Florence Dayana-Cloud Computing Architecture.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M.FLORENCE DAYANA/electronic mail security.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
Professional English - Reading
Professional English - Speaking
Professional English - Listening
INPUT AND OUTPUT DEVICES.pdf
NETWORK SECURITY-SET.pptx
Network Security- Secure Socket Layer
M.florence dayana dream weaver
M.florence dayana computer networks transport layer
M.Florence Dayana Computer Networks Types
M.Florence Dayana Computer Networks Introduction
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M.Florence Dayana
M.Florence Dayana / Basics of C Language

Recently uploaded (20)

PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
master seminar digital applications in india
PDF
Classroom Observation Tools for Teachers
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Cell Types and Its function , kingdom of life
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Pre independence Education in Inndia.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Microbial disease of the cardiovascular and lymphatic systems
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
STATICS OF THE RIGID BODIES Hibbelers.pdf
Anesthesia in Laparoscopic Surgery in India
master seminar digital applications in india
Classroom Observation Tools for Teachers
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Week 4 Term 3 Study Techniques revisited.pptx
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
O7-L3 Supply Chain Operations - ICLT Program
Cell Types and Its function , kingdom of life
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
TR - Agricultural Crops Production NC III.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Renaissance Architecture: A Journey from Faith to Humanism
Pre independence Education in Inndia.pdf
01-Introduction-to-Information-Management.pdf
Cell Structure & Organelles in detailed.
Microbial diseases, their pathogenesis and prophylaxis
Microbial disease of the cardiovascular and lymphatic systems

Chapter- I introduction

  • 1. NETWORK SECURITY Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D)., Head, Dept. of CA Bon Secours College For Women Thanjavur. Class : II MSc., CS Semester : III Unit : I 2/15/2019 1
  • 2. ELECTIVE III – NETWORK SECURITY Unit I Overview-Symmetric Ciphers: Classical Encryption Techniques Unit II Symmetric Ciphers: Block ciphers and the Data Encryption Standards Public key Encryption and Hash Functions: Public-Key Cryptography and RSA Unit III Network Security Practices: Authentication applications-Electronic Mail Security Unit IV Network Security Practices: IP Security-Web Security Unit V System Security: Intruders-Malicious Software-Firewalls Text Book(s) 1. William Stallings, Cryptography and Network Security- Principles and Practices, Prentice-Hall, Third edition, 2003 References 1. Johannes A. Buchaman , Introduction to cryptography, Springer-Verlag. 2. Atul kahate , Cryptography and Network Security, TMH
  • 3. Definitions • Computer Security - also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. • Network Security - measures to protect data during their transmission
  • 4. • Internet Security - measures to protect data during their transmission over a collection of interconnected networks. • which consists of measures to deter, prevent, detect, and correct security violations that involve the transmission & storage of information
  • 6. 1.CONFIDENTIALITY • Confidentiality refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data. • Imagine your bank records. You should be able to access them, of course, and employees at the bank who are helping you with a transaction should be able to access them, but no one else should.
  • 7. 2. INTEGRITY • The second goal of Network Security is "Integrity". Integrity aims at maintaining and assuring the accuracy and consistency of data. • The function of Integrity is to make sure that the data is accurate and reliable and is not changed by unauthorized persons or hackers. • The data received by the recipient must be exactly same as the data sent from the sender, without change in even single bit of data. • cryptography plays a very major role in ensuring data integrity.
  • 8. 3. AVAILABILITY Availability: The third goal of network security is "Availability". Availability of information refers to ensuring that authorized parties are able to access the information when needed. Information only has value if the right people can access it at the right times. Denying access to information has become a very common attack nowadays. How does one ensure data availability? Backup is key. Regularly doing off-site backups can limit the damage caused by damage to hard drives or natural disasters.
  • 9. Levels of Impact We can define 3 levels of impact from a security breach Low Moderate High
  • 10. Low Impact • The loss could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. • The loss of confidentiality, integrity, or availability might – (i) minor damage to organizational assets; – (ii) minor financial loss; or – (iii) minor harm to individuals.
  • 11. Moderate Impact • The loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. • A serious adverse effect means that, for example, the loss might – (i) the functions is significantly reduced; – (ii) result in significant damage to organizational assets; – (iii) result in significant financial loss; or – (iv) result in significant harm to individuals that does not involve loss of life or serious, life-threatening injuries.
  • 12. High Impact • The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. • A severe or catastrophic adverse effect means that, for example, the loss might – (i) cause a severe degradation – (ii) result in major damage to organizational assets; – (iii) result in major financial loss; or – (iv) result in severe or catastrophic harm to individuals involving loss of life or serious life threatening injuries.
  • 13. Challenges of Computer Security 1. Computer security is not simple 2. One must consider potential (unexpected) attacks 3. Procedures used are often counter-intuitive 4. Must decide where to deploy mechanisms 5. Involve algorithms and secret info (keys) 6. A battle of wits between attacker / admin 7. It is not perceived on benefit until fails 8. Requires constant monitoring 9. Too often an after-thought (not integral) 10. Regarded as impediment to using system
  • 14. Aspects of Security The 3 aspects of information security: – Security Attack – Security Mechanism – Security Service • Security attack: Any action that compromises the security of information owned by an organization. • • Security mechanism: A process (or a device) that is designed to detect, prevent, or recover from a security attack. • • Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.
  • 15. • Attack - An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. There are two types of attacks. • 1. Passive Attack 2. Active Attack
  • 16. Handling Attacks • Passive attacks – A passive attack attempts to learn or make use of information from the system but does not affect system resources. • Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. • These attacks are difficult to detect because they do not involve any alteration of the data.
  • 17. Passive Attack - Interception release of message contents
  • 18. Passive Attack: Traffic Analysis Observe traffic pattern Traffic analysis - monitor traffic flow to determine location and identity of communicating hosts and could observe the frequency and length of messages being exchanged
  • 19. Active Attack Active attacks involve some modification of the data stream or the creation of a false stream It can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service: • Masquerade of one entity as some other • Replay previous messages • Modify/alter (part of) messages in transit to produce an unauthorized effect • Denial of service - prevents or inhibits the normal use or management of communications facilities
  • 20. Active Attack: Interruption Block delivery of message
  • 24. Model for Network Security This general model shows that there are four basic tasks in designing a particular security service. 1. Design a suitable algorithm for the security transformation 2. Generate the secret information (keys) used by the algorithm 3. Develop methods to distribute and share the secret information 4. Specify a protocol enabling the principles to use the transformation and secret information for a security service
  • 25. Model for Network Access Security using this model requires us to: 1. select appropriate gatekeeper functions to identify users 2. implement security controls to ensure only authorised users access designated information or resources