SlideShare a Scribd company logo
CSC8 – NETWORK
SECURITY
KABUL EDUCATION UNIVERSITY
C O M P U T E R S C I E N C E D E P A R T M E N T
L E C T U R E R : I S L A H U D D I N J A L A L
M A S T E R I N C Y B E R S E C U R I T Y
9/16/2017 KABUL EDUCATION UNIVERSITY 1
First week course outlines
Overview of network security
◦ Network security background
◦ Definitions
◦ How security became an issue
◦ Areas of security
◦ Security as a process
◦ Attacks, services and mechanisms
◦ Security goals
◦ Network models
9/16/2017 KABUL EDUCATION UNIVERSITY 2
Class Policy
A student must reach the class-room in time. Late comers may join the class but are not entitled
to be marked present.
Attendance shall be marked at the start of the class and students failing to secure 75%
attendance will not be allowed to sit in final exam.
The assignment submission deadline must be observed. In case of late submission, ten percent
may be deducted from each day.
Those who are absent on the announcement date of the assignment/test. Must get the
topic/chapter of test/assignment confirmed through their peers.
Mobile phones must be switched-off in the class-rooms.
9/16/2017 KABUL EDUCATION UNIVERSITY 3
Grading Evaluation for Network Security
Internal Evaluation
Midterm Exam 20%
Attendance 5%
Assignment/Presentations 5%
Quizzes/Tests 10%
Total Internal Evaluation 40%
Final-term Examination
Final-term Exam 60%
Total Marks 100%
9/16/2017 KABUL EDUCATION UNIVERSITY 4
What is Security?
Dictionary.com says:
◦ 1. Freedom from risk or danger; safety.
◦ 2. Freedom from doubt, anxiety, or fear; confidence.
◦ 3. Something that gives or assures safety, as:
◦ 1. A group or department of private guards: Call building security if a visitor acts suspicious.
◦ 2. Measures adopted by a government to prevent espionage, sabotage, or attack.
◦ 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary
or assault: Security was lax at the firm's smaller plant.
…etc.
9/16/2017 KABUL EDUCATION UNIVERSITY 5
Why Do We Need Network Security?
Protect vital information while still allowing access to those who need it
◦ Trade secrets, medical records, etc.
Provide authentication and access control for resources
Guarantee availability of resources
◦ Ex: 5 9’s (99.999% reliability)
Safeguard Network from threats include internal and external threats. Internal threats are the
most serious. These threats often occur because best practices are not followed. For example,
blank or default passwords are used, or in-house developers use insecure programming
practices. External threats typically rely on technical methods to attack the network
9/16/2017 KABUL EDUCATION UNIVERSITY 6
Network Security Background
Information Security requirements have changed in recent times
Traditionally provided by physical and administrative mechanisms
◦ Such as file locked in a file room
◦ Access only for authorized user
Now, computer requires automated tools to protect files and other stored information
The use of networks requires measures to protect data during transmission
9/16/2017 KABUL EDUCATION UNIVERSITY 7
Definitions
Network Security is the process of taking physical and software preventative measures to
protect the underlying networking infrastructure from unauthorized access, misuse,
malfunction, modification, destruction, or improper disclosure, thereby creating a secure
platform for computers, users and programs to perform their permitted critical functions within
a secure environment.
Networking infrastructure:
◦ Server
◦ Database/Information (files, data, communication media)
◦ User accounts/passwords
◦ Configurations/settings
◦ etc
9/16/2017 KABUL EDUCATION UNIVERSITY 8
How Security Became an Issue
People and businesses depend greatly on computer technology and automation in many
different aspects of their lives.
Examples:
◦ public utilities,
◦ military defense systems,
◦ financial institutions,
◦ medical equipment,
9/16/2017 KABUL EDUCATION UNIVERSITY 9
How Security Became an Issue
With the increasing exposure to computing and processing, the individuals who used computers
learned more about using the technology and getting the most out of it.
However, the good things in life often have a darker side. Taking technology down from the
pedestal of the mainframe and putting it into so many individuals’ hands led to a lot of issues
that never had to be dealt with in the mainframe days.
9/16/2017 KABUL EDUCATION UNIVERSITY 10
How Security became an Issue
Now there were thousands of people not versed and experienced in computing who had much
more access to important data and processes.
Barriers and protection mechanisms were not in place to protect employees and systems from
mistakes, so important data got corrupted accidentally, and individual mistakes affected many
other systems instead of just one.
9/16/2017 KABUL EDUCATION UNIVERSITY 11
Network Models
According to the IT security terms, there are two network models:
1. Closed network model
2. Open network model
9/16/2017 KABUL EDUCATION UNIVERSITY 12
Closed Network Model
Advantages:
◦ Strong security
◦ Strict security policy
◦ Typically implemented in corporate environments
◦ Easy support and monitoring
Disadvantages:
◦ Low flexibility (no WLANs, no external connection)
◦ No external access for business partner
◦ No connection from public networks
9/16/2017 KABUL EDUCATION UNIVERSITY 13
Open Network Model
Advantages:
◦ External access
◦ Business advantages
◦ Flexible for users
◦ Internet access
Disadvantages:
◦ This is the required model for modern enterprise
◦ Hard to support, secure, and monitor
◦ Many potential threats
◦ Require strict security policy and disaster recovery
plan
9/16/2017 KABUL EDUCATION UNIVERSITY 14
Needed Balance
The need for e-business, mobile commerce, wireless communication and Internet applications
continue to grow
Finding the balance between being isolated and being open, will be critical, along with the
ability to distinguish the good guys from the bad guys.
9/16/2017 KABUL EDUCATION UNIVERSITY 15
Security Goals
9/16/2017 KABUL EDUCATION UNIVERSITY 16
Confidentiality
AvailabilityIntegrity
Security Goals
Confidentiality: prevent unauthorized access
Integrity: prevent unauthorized modification
Availability: prevent a loss of access to resources by the authorized user
9/16/2017 KABUL EDUCATION UNIVERSITY 17
Security as a Process
•A single product cannot provide complete security for an organization. Usually more than one
security mechanisms are used and integrated in an organization:
1. Every computer system should be capable of restricting access to files based on the ID of the
user
– Authorization
2. An anti-virus software
– Help to detect/clean the system from malicious software that want to gain access to a system
9/16/2017 KABUL EDUCATION UNIVERSITY 18
Security as a Process
3. Firewalls are access control devices for a network.
– Exist between the internal and external networks.
– However, they will not prevent an attacker, using an allowed connection, from attacking a system, for
example an attacker from the inside.
4. Intrusion detection systems (IDS) could identify when someone is doing something wrong
and stop them.
– However, they will not detect legitimate users who may have access to inappropriate information.
9/16/2017 KABUL EDUCATION UNIVERSITY 19
Security as a Process
5. Smartcards can be used for authentication
– but cannot prevent misuse if lost or stolen.
6. Biometric systems can be used to reduce the risk of someone guessing a password.
– There are biometric scanners for verifying fingerprints, retina/iris, palm vein, hand geometry, facial
geometry, and voice.
– Issues on the precision of the devices
9/16/2017 KABUL EDUCATION UNIVERSITY 20
Examples of Biometric Technologies
9/16/2017 KABUL EDUCATION UNIVERSITY 21
 Fingerprint
Identification
• Iris Recognition • Retina Scan• Palm Vein
Identification
• Hand Geometry
Identification
• Speaker
Identification
(voice recognition)
• Face
Identification
Security as a Process
7. With a policy management system, an organization can be made aware of any system that
does not conform to policy.
– However, policy management may not consider vulnerabilities in systems or misconfigurations of
application software.
9/16/2017 KABUL EDUCATION UNIVERSITY 22
Security as a Process
8. Vulnerability scanning can help identify potential entry points of intruders.
– However, it will not detect legitimate users with inappropriate access or intruders already in the system.
9. Encryption will protect information in storage and in transit.
– However, encryption systems will not differentiate between legitimate and illegitimate users, if both
present the same keys to the encryption algorithm.
10. Physical security will not protect the system from attacks by those using legitimate access or
attacks through the network
9/16/2017 KABUL EDUCATION UNIVERSITY 23
Attacks, Services and Mechanisms
•Three aspects of Information Security:
1. Security Attack: Any action that compromise the security of information
2. Security Mechanisms: A mechanism that is designed to detect, prevent, or recover from a
security attack
3. Security Service: A service that enhances the security of data processing systems and
information transfers. A security service makes use of one or more security mechanisms
9/16/2017 KABUL EDUCATION UNIVERSITY 24
Security Attack Categories
Interruption
- Attack on availability
- An asset of the system is destroyed or becomes unavailable or unusable
- Examples: The destruction of hardware (disk or wire),
the cutting of a communication line, or swamping/flooding a
computer communication link with packets.
9/16/2017 KABUL EDUCATION UNIVERSITY 25
Security attack categories
Interception
- Attack on confidentiality
- This happens when any unauthorized unit gains access to an
asset
- Examples: Wiretapping to capture data in a network
and the unauthorized copying of files or programs
9/16/2017 KABUL EDUCATION UNIVERSITY 26
Security Attack categories
Modification
- Attack on integrity
- An unauthorized party gain access to the asset and
make some changes to it
- Examples: Changing data files, altering a
program so that it performs differently, modifying
the contents of a message
9/16/2017 KABUL EDUCATION UNIVERSITY 27
Security Attack Categories
Fabrication
- Attack on authenticity
- If an unauthorized party gains access to the asset and
insert a counterfeit object into the system
- Examples: The insertion of spurious messages in a
network or the insertion of records in data files.
9/16/2017 KABUL EDUCATION UNIVERSITY 28
Security Attacks
•Passive attacks: This is an attack on the network in the nature of eavesdropping or monitoring of
transmission of data
– Aims to learn or make use of information from the system but does not affect system resources.
– Difficult to detect, measures are available to prevent their success.
• Active attacks: This involves modification of the data in transmission or the creation of a false
stream.
– Attempts to alter system resources or a affect their operation
– Difficult to prevent, measures available to detect and recover from destruction
9/16/2017 KABUL EDUCATION UNIVERSITY 29
• Active and passive security threats
Security Attacks
9/16/2017 KABUL EDUCATION UNIVERSITY 30
Passive threats
Release of
message content
Traffic
analysis
Active threats
Masquerade
Replay
Modification of
Message content DoS
 Active and passive security threats
Passive attacks
Release of message content:
◦ Content of a message are read.
◦ A message may be carrying sensitive or confidential data.
◦ For example: A telephone conversation, email messages, or confidential information
9/16/2017 KABUL EDUCATION UNIVERSITY 31
Passive attacks
Traffic analysis:
◦ An intruder makes inferences by observing message patterns
◦ Can be done even if messages are encrypted
◦ Inferences: Location and identity of hosts
9/16/2017 KABUL EDUCATION UNIVERSITY 32
Active Attacks
Masquerade: An entity pretends to be some other entity.
◦ Example: An entity captures an authentication sequence and replays it later to impersonate the original
entity
Replay: Involves the passive capture of a data unit and its subsequent retransmission to produce
an unauthorized effect
Modification: A portion of a legitimate message altered to produce an undesirable effect
Denial of service: Inhibits normal use of computer and communications resources and facilities
9/16/2017 KABUL EDUCATION UNIVERSITY 33
Security Mechanisms
In order to detect, prevent, or recover from these security attacks, we use security mechanisms
There is no single mechanism which will provide all the services or perform all the functions
mentioned
A variety of mechanisms are used to detect and prevent certain attacks, and to provide certain
functions and services
9/16/2017 KABUL EDUCATION UNIVERSITY 34
Security Mechanisms
Encryption
Software Controls (access limitations in a database, in operating system protect each user from
other users)
Hardware Controls (smart card)
Policies (frequent changes of passwords)
Physical Controls
Information flowing over an secure communications channel, for example: Virtual Private
Network (VPN)
9/16/2017 KABUL EDUCATION UNIVERSITY 35
9/16/2017 KABUL EDUCATION UNIVERSITY 36
Security Services
Enhance security of data processing systems and information transfers of an
organization
Intended to counter security attacks
Using one or more security mechanisms
Often replicates functions normally associated with physical documents, for
example:
◦ signatures, dates, protection from disclosure, tampering, destruction; be notarized or
witnessed; be recorded or licensed
9/16/2017 KABUL EDUCATION UNIVERSITY 37
Security Services
A classification of security services:
- Confidentiality (privacy)
- Authentication (who created or sent the data)
- Integrity (has not been altered)
- Non-repudiation (the order is final)
- Access control (prevent misuse of resources)
- Availability (permanence, non-erasure)
• Denial of Service Attacks, Virus that deletes files
9/16/2017 KABUL EDUCATION UNIVERSITY 38
Other Issues: Legal Issues and Privacy Concerns
For many businesses today, one of the biggest reasons to create and follow a security policy is
compliance with the law.
If a business is running a publicly held e-business and a catastrophic attack seriously impairs the
business, a lawsuit is possible.
9/16/2017 KABUL EDUCATION UNIVERSITY 39
Other Issues: Wireless Access and Wirless LANs
WiFi connections do not respect firewalls the way wired connections do.
Implementation of Wireless LANs or other wireless technologies bring additional security
threats.
9/16/2017 KABUL EDUCATION UNIVERSITY 40
IT staff-shortage
The IT staffing shortage is especially evident in the security field.
To solve this problem, many enterprises are increasingly outsourcing day-to-day security
management tasks.
Clearly, there is a demand for skilled network security professionals.
9/16/2017 KABUL EDUCATION UNIVERSITY 41
Information Security Organizations
CERT/CC
US-CERT
SANS Institute
(ISC)2
Common Criteria
FIPS
ICSA Labs
9/16/2017 KABUL EDUCATION UNIVERSITY 42
References
Pfleeger, C. Security in Computing. Prentice Hall, 1997.
Certified Information Systems Security Professional (CISSP), All-in-One Exam Guide, Fifth Edition
Network Management- Prof. Dr.-Ing. Alexandru Soceanu
9/16/2017 KABUL EDUCATION UNIVERSITY 43
END
Thanks for hearing…………………….
9/16/2017 KABUL EDUCATION UNIVERSITY 44

More Related Content

PDF
How to Build the Perfect Team
PPT
CCNA Security 02- fundamentals of network security
PDF
Introduction to Database Management Systems: Structure, Applications, and Key...
PPTX
Jig Boring Machine
PPTX
communication-protocols
PPTX
Image noise reduction
PPTX
Security Operation Center - Design & Build
PPT
Visual programming lecture
How to Build the Perfect Team
CCNA Security 02- fundamentals of network security
Introduction to Database Management Systems: Structure, Applications, and Key...
Jig Boring Machine
communication-protocols
Image noise reduction
Security Operation Center - Design & Build
Visual programming lecture

What's hot (20)

PPTX
HONEYPOTS: Definition, working, advantages, disadvantages
PPT
Network security
PPTX
Physical Layer
PPT
Distributed objects & components of corba
PPT
Cyber security for an organization
PPTX
Network security (vulnerabilities, threats, and attacks)
PPT
Addressing
PPTX
Substitution techniques
PPTX
Honeypots (Ravindra Singh Rathore)
PPSX
Physical layer ppt
PPT
Intrusion detection system ppt
PPTX
Computer security concepts
PPTX
Introduction to Cybersecurity Fundamentals
PPTX
Message and Stream Oriented Communication
PPTX
Information flow
PPT
Weka presentation
PPTX
TCP/IP Introduction
PPTX
Man in The Middle Attack
PPTX
Transport layer
HONEYPOTS: Definition, working, advantages, disadvantages
Network security
Physical Layer
Distributed objects & components of corba
Cyber security for an organization
Network security (vulnerabilities, threats, and attacks)
Addressing
Substitution techniques
Honeypots (Ravindra Singh Rathore)
Physical layer ppt
Intrusion detection system ppt
Computer security concepts
Introduction to Cybersecurity Fundamentals
Message and Stream Oriented Communication
Information flow
Weka presentation
TCP/IP Introduction
Man in The Middle Attack
Transport layer
Ad

Similar to Network security # Lecture 1 (20)

DOCX
GUL Network Infrastructure
PPTX
4b - Security Management - Cyber Security Mgt (1).pptx
PPT
CCNA_Security_01.ppt
PDF
Network Security-Module_1.pdf
PPT
Chapter 1 overview
PDF
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
PDF
Ch1-Modern Network Security Threats - CCNA SEC.pdf
PDF
Kel1 Computer security - UC Santa Cruz's.pdf
PDF
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
PPT
Network Security for Computer science and Engineering.ppt
PDF
Cyber Security
PDF
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
PDF
Paper Titled Information Security in an organization
PDF
PDF
Concept Of Cyber Security.pdf
DOCX
Securing Wearable Device Data
PDF
RFC 2196 Site Security Handbook
PDF
Cybersecurity Interview Questions and Answers.pdf
PPTX
Cyber Security and the CEO
PDF
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
GUL Network Infrastructure
4b - Security Management - Cyber Security Mgt (1).pptx
CCNA_Security_01.ppt
Network Security-Module_1.pdf
Chapter 1 overview
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
Ch1-Modern Network Security Threats - CCNA SEC.pdf
Kel1 Computer security - UC Santa Cruz's.pdf
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Network Security for Computer science and Engineering.ppt
Cyber Security
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
Paper Titled Information Security in an organization
Concept Of Cyber Security.pdf
Securing Wearable Device Data
RFC 2196 Site Security Handbook
Cybersecurity Interview Questions and Answers.pdf
Cyber Security and the CEO
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Ad

More from Kabul Education University (20)

PPTX
Cryptography and Network security # Lecture 8
PPTX
ITIL # Lecture 9
PPTX
Cryptography and Network security # Lecture 7
PPTX
ITIL # Lecture 8
PPTX
Cryptography and Network security # Lecture 6
PPTX
ITIL # Lecture 7
PPTX
Cryptography and Network security # Lecture 5
PPTX
Cyber Security # Lec 5
PPTX
ITIL # Lecture 6
PPTX
Cyber Security # Lec 4
PPTX
ITIL # Lecture 5
PPTX
Cyber Security # Lec 3
PPTX
ITIL # Lecture 4
PPTX
Cryptography and Network security # Lecture 4
PPTX
Cyber Security # Lec 2
PPTX
ITIL # Lecture 3
PPTX
Cryptography and Network security # Lecture 3
PPTX
ITIL # Lecture 2
PPTX
Cryptography and Network Security # Lecture 2
PPTX
ITIL # Lecture 1
Cryptography and Network security # Lecture 8
ITIL # Lecture 9
Cryptography and Network security # Lecture 7
ITIL # Lecture 8
Cryptography and Network security # Lecture 6
ITIL # Lecture 7
Cryptography and Network security # Lecture 5
Cyber Security # Lec 5
ITIL # Lecture 6
Cyber Security # Lec 4
ITIL # Lecture 5
Cyber Security # Lec 3
ITIL # Lecture 4
Cryptography and Network security # Lecture 4
Cyber Security # Lec 2
ITIL # Lecture 3
Cryptography and Network security # Lecture 3
ITIL # Lecture 2
Cryptography and Network Security # Lecture 2
ITIL # Lecture 1

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Spectroscopy.pptx food analysis technology
PDF
Encapsulation theory and applications.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Big Data Technologies - Introduction.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
Teaching material agriculture food technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectroscopy.pptx food analysis technology
Encapsulation theory and applications.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Big Data Technologies - Introduction.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
Dropbox Q2 2025 Financial Results & Investor Presentation
Per capita expenditure prediction using model stacking based on satellite ima...
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf
Cloud computing and distributed systems.

Network security # Lecture 1

  • 1. CSC8 – NETWORK SECURITY KABUL EDUCATION UNIVERSITY C O M P U T E R S C I E N C E D E P A R T M E N T L E C T U R E R : I S L A H U D D I N J A L A L M A S T E R I N C Y B E R S E C U R I T Y 9/16/2017 KABUL EDUCATION UNIVERSITY 1
  • 2. First week course outlines Overview of network security ◦ Network security background ◦ Definitions ◦ How security became an issue ◦ Areas of security ◦ Security as a process ◦ Attacks, services and mechanisms ◦ Security goals ◦ Network models 9/16/2017 KABUL EDUCATION UNIVERSITY 2
  • 3. Class Policy A student must reach the class-room in time. Late comers may join the class but are not entitled to be marked present. Attendance shall be marked at the start of the class and students failing to secure 75% attendance will not be allowed to sit in final exam. The assignment submission deadline must be observed. In case of late submission, ten percent may be deducted from each day. Those who are absent on the announcement date of the assignment/test. Must get the topic/chapter of test/assignment confirmed through their peers. Mobile phones must be switched-off in the class-rooms. 9/16/2017 KABUL EDUCATION UNIVERSITY 3
  • 4. Grading Evaluation for Network Security Internal Evaluation Midterm Exam 20% Attendance 5% Assignment/Presentations 5% Quizzes/Tests 10% Total Internal Evaluation 40% Final-term Examination Final-term Exam 60% Total Marks 100% 9/16/2017 KABUL EDUCATION UNIVERSITY 4
  • 5. What is Security? Dictionary.com says: ◦ 1. Freedom from risk or danger; safety. ◦ 2. Freedom from doubt, anxiety, or fear; confidence. ◦ 3. Something that gives or assures safety, as: ◦ 1. A group or department of private guards: Call building security if a visitor acts suspicious. ◦ 2. Measures adopted by a government to prevent espionage, sabotage, or attack. ◦ 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant. …etc. 9/16/2017 KABUL EDUCATION UNIVERSITY 5
  • 6. Why Do We Need Network Security? Protect vital information while still allowing access to those who need it ◦ Trade secrets, medical records, etc. Provide authentication and access control for resources Guarantee availability of resources ◦ Ex: 5 9’s (99.999% reliability) Safeguard Network from threats include internal and external threats. Internal threats are the most serious. These threats often occur because best practices are not followed. For example, blank or default passwords are used, or in-house developers use insecure programming practices. External threats typically rely on technical methods to attack the network 9/16/2017 KABUL EDUCATION UNIVERSITY 6
  • 7. Network Security Background Information Security requirements have changed in recent times Traditionally provided by physical and administrative mechanisms ◦ Such as file locked in a file room ◦ Access only for authorized user Now, computer requires automated tools to protect files and other stored information The use of networks requires measures to protect data during transmission 9/16/2017 KABUL EDUCATION UNIVERSITY 7
  • 8. Definitions Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment. Networking infrastructure: ◦ Server ◦ Database/Information (files, data, communication media) ◦ User accounts/passwords ◦ Configurations/settings ◦ etc 9/16/2017 KABUL EDUCATION UNIVERSITY 8
  • 9. How Security Became an Issue People and businesses depend greatly on computer technology and automation in many different aspects of their lives. Examples: ◦ public utilities, ◦ military defense systems, ◦ financial institutions, ◦ medical equipment, 9/16/2017 KABUL EDUCATION UNIVERSITY 9
  • 10. How Security Became an Issue With the increasing exposure to computing and processing, the individuals who used computers learned more about using the technology and getting the most out of it. However, the good things in life often have a darker side. Taking technology down from the pedestal of the mainframe and putting it into so many individuals’ hands led to a lot of issues that never had to be dealt with in the mainframe days. 9/16/2017 KABUL EDUCATION UNIVERSITY 10
  • 11. How Security became an Issue Now there were thousands of people not versed and experienced in computing who had much more access to important data and processes. Barriers and protection mechanisms were not in place to protect employees and systems from mistakes, so important data got corrupted accidentally, and individual mistakes affected many other systems instead of just one. 9/16/2017 KABUL EDUCATION UNIVERSITY 11
  • 12. Network Models According to the IT security terms, there are two network models: 1. Closed network model 2. Open network model 9/16/2017 KABUL EDUCATION UNIVERSITY 12
  • 13. Closed Network Model Advantages: ◦ Strong security ◦ Strict security policy ◦ Typically implemented in corporate environments ◦ Easy support and monitoring Disadvantages: ◦ Low flexibility (no WLANs, no external connection) ◦ No external access for business partner ◦ No connection from public networks 9/16/2017 KABUL EDUCATION UNIVERSITY 13
  • 14. Open Network Model Advantages: ◦ External access ◦ Business advantages ◦ Flexible for users ◦ Internet access Disadvantages: ◦ This is the required model for modern enterprise ◦ Hard to support, secure, and monitor ◦ Many potential threats ◦ Require strict security policy and disaster recovery plan 9/16/2017 KABUL EDUCATION UNIVERSITY 14
  • 15. Needed Balance The need for e-business, mobile commerce, wireless communication and Internet applications continue to grow Finding the balance between being isolated and being open, will be critical, along with the ability to distinguish the good guys from the bad guys. 9/16/2017 KABUL EDUCATION UNIVERSITY 15
  • 16. Security Goals 9/16/2017 KABUL EDUCATION UNIVERSITY 16 Confidentiality AvailabilityIntegrity
  • 17. Security Goals Confidentiality: prevent unauthorized access Integrity: prevent unauthorized modification Availability: prevent a loss of access to resources by the authorized user 9/16/2017 KABUL EDUCATION UNIVERSITY 17
  • 18. Security as a Process •A single product cannot provide complete security for an organization. Usually more than one security mechanisms are used and integrated in an organization: 1. Every computer system should be capable of restricting access to files based on the ID of the user – Authorization 2. An anti-virus software – Help to detect/clean the system from malicious software that want to gain access to a system 9/16/2017 KABUL EDUCATION UNIVERSITY 18
  • 19. Security as a Process 3. Firewalls are access control devices for a network. – Exist between the internal and external networks. – However, they will not prevent an attacker, using an allowed connection, from attacking a system, for example an attacker from the inside. 4. Intrusion detection systems (IDS) could identify when someone is doing something wrong and stop them. – However, they will not detect legitimate users who may have access to inappropriate information. 9/16/2017 KABUL EDUCATION UNIVERSITY 19
  • 20. Security as a Process 5. Smartcards can be used for authentication – but cannot prevent misuse if lost or stolen. 6. Biometric systems can be used to reduce the risk of someone guessing a password. – There are biometric scanners for verifying fingerprints, retina/iris, palm vein, hand geometry, facial geometry, and voice. – Issues on the precision of the devices 9/16/2017 KABUL EDUCATION UNIVERSITY 20
  • 21. Examples of Biometric Technologies 9/16/2017 KABUL EDUCATION UNIVERSITY 21  Fingerprint Identification • Iris Recognition • Retina Scan• Palm Vein Identification • Hand Geometry Identification • Speaker Identification (voice recognition) • Face Identification
  • 22. Security as a Process 7. With a policy management system, an organization can be made aware of any system that does not conform to policy. – However, policy management may not consider vulnerabilities in systems or misconfigurations of application software. 9/16/2017 KABUL EDUCATION UNIVERSITY 22
  • 23. Security as a Process 8. Vulnerability scanning can help identify potential entry points of intruders. – However, it will not detect legitimate users with inappropriate access or intruders already in the system. 9. Encryption will protect information in storage and in transit. – However, encryption systems will not differentiate between legitimate and illegitimate users, if both present the same keys to the encryption algorithm. 10. Physical security will not protect the system from attacks by those using legitimate access or attacks through the network 9/16/2017 KABUL EDUCATION UNIVERSITY 23
  • 24. Attacks, Services and Mechanisms •Three aspects of Information Security: 1. Security Attack: Any action that compromise the security of information 2. Security Mechanisms: A mechanism that is designed to detect, prevent, or recover from a security attack 3. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms 9/16/2017 KABUL EDUCATION UNIVERSITY 24
  • 25. Security Attack Categories Interruption - Attack on availability - An asset of the system is destroyed or becomes unavailable or unusable - Examples: The destruction of hardware (disk or wire), the cutting of a communication line, or swamping/flooding a computer communication link with packets. 9/16/2017 KABUL EDUCATION UNIVERSITY 25
  • 26. Security attack categories Interception - Attack on confidentiality - This happens when any unauthorized unit gains access to an asset - Examples: Wiretapping to capture data in a network and the unauthorized copying of files or programs 9/16/2017 KABUL EDUCATION UNIVERSITY 26
  • 27. Security Attack categories Modification - Attack on integrity - An unauthorized party gain access to the asset and make some changes to it - Examples: Changing data files, altering a program so that it performs differently, modifying the contents of a message 9/16/2017 KABUL EDUCATION UNIVERSITY 27
  • 28. Security Attack Categories Fabrication - Attack on authenticity - If an unauthorized party gains access to the asset and insert a counterfeit object into the system - Examples: The insertion of spurious messages in a network or the insertion of records in data files. 9/16/2017 KABUL EDUCATION UNIVERSITY 28
  • 29. Security Attacks •Passive attacks: This is an attack on the network in the nature of eavesdropping or monitoring of transmission of data – Aims to learn or make use of information from the system but does not affect system resources. – Difficult to detect, measures are available to prevent their success. • Active attacks: This involves modification of the data in transmission or the creation of a false stream. – Attempts to alter system resources or a affect their operation – Difficult to prevent, measures available to detect and recover from destruction 9/16/2017 KABUL EDUCATION UNIVERSITY 29 • Active and passive security threats
  • 30. Security Attacks 9/16/2017 KABUL EDUCATION UNIVERSITY 30 Passive threats Release of message content Traffic analysis Active threats Masquerade Replay Modification of Message content DoS  Active and passive security threats
  • 31. Passive attacks Release of message content: ◦ Content of a message are read. ◦ A message may be carrying sensitive or confidential data. ◦ For example: A telephone conversation, email messages, or confidential information 9/16/2017 KABUL EDUCATION UNIVERSITY 31
  • 32. Passive attacks Traffic analysis: ◦ An intruder makes inferences by observing message patterns ◦ Can be done even if messages are encrypted ◦ Inferences: Location and identity of hosts 9/16/2017 KABUL EDUCATION UNIVERSITY 32
  • 33. Active Attacks Masquerade: An entity pretends to be some other entity. ◦ Example: An entity captures an authentication sequence and replays it later to impersonate the original entity Replay: Involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect Modification: A portion of a legitimate message altered to produce an undesirable effect Denial of service: Inhibits normal use of computer and communications resources and facilities 9/16/2017 KABUL EDUCATION UNIVERSITY 33
  • 34. Security Mechanisms In order to detect, prevent, or recover from these security attacks, we use security mechanisms There is no single mechanism which will provide all the services or perform all the functions mentioned A variety of mechanisms are used to detect and prevent certain attacks, and to provide certain functions and services 9/16/2017 KABUL EDUCATION UNIVERSITY 34
  • 35. Security Mechanisms Encryption Software Controls (access limitations in a database, in operating system protect each user from other users) Hardware Controls (smart card) Policies (frequent changes of passwords) Physical Controls Information flowing over an secure communications channel, for example: Virtual Private Network (VPN) 9/16/2017 KABUL EDUCATION UNIVERSITY 35
  • 36. 9/16/2017 KABUL EDUCATION UNIVERSITY 36
  • 37. Security Services Enhance security of data processing systems and information transfers of an organization Intended to counter security attacks Using one or more security mechanisms Often replicates functions normally associated with physical documents, for example: ◦ signatures, dates, protection from disclosure, tampering, destruction; be notarized or witnessed; be recorded or licensed 9/16/2017 KABUL EDUCATION UNIVERSITY 37
  • 38. Security Services A classification of security services: - Confidentiality (privacy) - Authentication (who created or sent the data) - Integrity (has not been altered) - Non-repudiation (the order is final) - Access control (prevent misuse of resources) - Availability (permanence, non-erasure) • Denial of Service Attacks, Virus that deletes files 9/16/2017 KABUL EDUCATION UNIVERSITY 38
  • 39. Other Issues: Legal Issues and Privacy Concerns For many businesses today, one of the biggest reasons to create and follow a security policy is compliance with the law. If a business is running a publicly held e-business and a catastrophic attack seriously impairs the business, a lawsuit is possible. 9/16/2017 KABUL EDUCATION UNIVERSITY 39
  • 40. Other Issues: Wireless Access and Wirless LANs WiFi connections do not respect firewalls the way wired connections do. Implementation of Wireless LANs or other wireless technologies bring additional security threats. 9/16/2017 KABUL EDUCATION UNIVERSITY 40
  • 41. IT staff-shortage The IT staffing shortage is especially evident in the security field. To solve this problem, many enterprises are increasingly outsourcing day-to-day security management tasks. Clearly, there is a demand for skilled network security professionals. 9/16/2017 KABUL EDUCATION UNIVERSITY 41
  • 42. Information Security Organizations CERT/CC US-CERT SANS Institute (ISC)2 Common Criteria FIPS ICSA Labs 9/16/2017 KABUL EDUCATION UNIVERSITY 42
  • 43. References Pfleeger, C. Security in Computing. Prentice Hall, 1997. Certified Information Systems Security Professional (CISSP), All-in-One Exam Guide, Fifth Edition Network Management- Prof. Dr.-Ing. Alexandru Soceanu 9/16/2017 KABUL EDUCATION UNIVERSITY 43