07Sp_SECB408_01&51_P3 - NetworkSecurityProblems 1

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
    1 Network Security Problems
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
    2 What does security mean: Confidentiality: Information should be accessed by  authorized parties Authentication: Maintain the originality of information Integrity: Only authorized parties can modify  information Access control: Access to information is controlled  and limited Availability: Computer and information assets should  be available to authorized parties all the time Non-repudiation: Undeniable proof of participation by  the sender and/or receiver in a transaction Privacy: individual rights to nondisclosure
Background image of page 2
    3 System Security A system must maintain its correct  functionality in response to attacks Understanding the system behavior becomes  important The Internet consist of thousands of  decentralized systems and we need to look at  its collective behavior The collective behavior can be defined as the  interaction among all systems 
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
    4 Properties of Distributed  Systems Dependability: expected time to system failure; decreases exponentially  with network nodes Availability: percentage of time the system is operational; decreases  exponentially with network nodes Safety: when predefined undesired events never occur (an aspect  of  fault tolerance) Liveness:  a system always return to its desirable state (an aspect  of  fault tolerance) Self stabilization: system ability to recover from any fault. System security: system immune against attacks and misuse 
Background image of page 4
    5 System Disruptions Common daily events (e.g. mistype  password, loss of service due to  congestion) Low level attacks and intrusions ( e.g.  DDoS) High level attacks (e.g. use of  information warfare) 
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
    6 Risks, Threats, and  Vulnerabilities Risk With information security, the risk is that your company's  information will fall prey to outside forces and cause your company  losses in time, money, and reputation. threat for information security, is any activity that represents possible  danger to your information. Threats can take many forms, but any  threat poses a danger to the security system.  vulnerability   is a weakness in your information security that could be exploited  by a threat; that is, a weakness in your systems and network  security, processes, and procedures. 
Background image of page 6
  7 Vulnerability   Exploiting the vulnerability: the person  who does this is an attacker. It can be due to:
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/26/2010 for the course SECB 408 taught by Professor Wassimelhaj during the Spring '07 term at United Arab Emirates University.

Page1 / 49

07Sp_SECB408_01&51_P3 - NetworkSecurityProblems 1

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online