Lecture1

Lecture1 - Lecture 1 Introduction and Overview CNT 5412...

Info iconThis preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Lecture 1 Introduction and Overview CNT 5412 Network Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Course Overview • Introduction to network security – Secure network services – Security mechanisms – Threats, attacks, countermeasures – Introduction to cryptography, encryption / decryption – Authentication – Cryptographic Protocols • Strong authentication, key exchange
Background image of page 2
3 Course Overview (cont) • Analysis of protocols • Standards – SSL/TLS – SSH – IPSEC, IKE – Kerberos, S/Key • Public Key Infrastructures – PKI: X.509 – PGP
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Course Overview (cont) • Elements of packet filtering/firewalls • Traffic monitoring and intrusion detection • Routing protocols • Distributed Denial of Service attacks • Network forensics/ vulnerability assessment
Background image of page 4
5 Course Overview (if time) • Web security – Java, cookies, HTTP/HTTPS – Web objects • DNS security • Email Security • Privacy • Wireless security
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 What is Security? • Definitions from the Amer. Herit. Dict. : – Freedom from risk or danger; safety – Measures adopted … to prevent a crime such as burglary or assault. • Network security measures: – Mechanisms to prevent , detect , and recover from network attacks , or for auditing purposes. – Keeping operations within the network secure for users of the network
Background image of page 6
7 Difficulties in Achieving Security • If absolute security was attainable, we would only have to discuss prevention techniques. • Since security measures are bound to eventually fail or, more likely, be circumvented, the ``remedial’’ functions of detection and recovery are necessary. • Audit is more than a remedial function -- it provides accountability and permits review, maintenance and planning support.
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Terminology Policies Security breeches Threats Vulnerabilities Attacks Threat Intensity Security attack: a threat Security services: eg. data confidentiality Security mechanisms; eg. encryption
Background image of page 8
9 A Secure d Network • A network is “secured” if it has deployed adequate measures for prevention of, detection of, and recovery from attacks. – Adequate = commensurate with the value of the network’s assets and liabilities, and the perceived threat intensity.
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Security Goals • C onfidentiality • I ntegrity • A vailability Other important security goals include auditability
Background image of page 10
11 Security Services • Authentication – entity is who it claims to be. • Access control – resources that can be used • Data confidentiality – protection from unauthorized disclosure • Data integrity – no modification, insertion, deletion, replay, etc. • Nonrepudiation – protection against party to transaction claiming “it wasn’t me” • Availability
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
12 Security Mechanisms • Encipherment • Digital signature • Access control mechanisms • Hashing for data integrity • Traffic padding • Audit trail • Event detection (breeches) & recovery
Background image of page 12
13 Security operations
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/20/2012 for the course CNT 5412 taught by Professor Sudhir during the Spring '12 term at FSU.

Page1 / 47

Lecture1 - Lecture 1 Introduction and Overview CNT 5412...

This preview shows document pages 1 - 14. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online