Network Security

Network Security - called bridges, gateways, routers, etc....

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
11/07/11 1 Computer Security Network Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/07/11 2 Layered Models The ISO Open Systems Interconnection architecture has seven layers. These are: Application Presentation Session Transport Network Link Physical
Background image of page 2
11/07/11 3 Layered Models The advantage of using such an architecture is that: Security services at the top can be tailored to a specific application. Security services at the bottom can protect traffic from higher layers.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/07/11 4 Sniffing and spoofing Network security is concerned with threats that involve the transmission of messages. To get to its destination a message is relayed to the receiver via intermediary nodes that, depending on their function, are
Background image of page 4
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 6
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 8
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 10
Background image of page 11
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: called bridges, gateways, routers, etc. . Many of these devices have software components. This creates the opportunity to run rogue sniffer software. Other threats come from forged source addresses --spoofing , from entities denying their involvement in a network activity , and from traffic flow analysis. 11/07/11 5 The ISO security requirements Data confidentiality Data Integrity Data origin authentication Peer entity authentication Non repudiation 11/07/11 6 TCP/IP Security 11/07/11 7 IPSEC 11/07/11 8 IPSEC 11/07/11 9 SSL/TLS 11/07/11 10 Network Boundaries 11/07/11 11 Firewalls...
View Full Document

This note was uploaded on 11/07/2011 for the course CIS 4360 taught by Professor Mikeburmester during the Fall '11 term at FSU.

Page1 / 11

Network Security - called bridges, gateways, routers, etc....

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online