Security Basics

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 11

Computer Networks and

Security
•Introduction to Cryptography
•Security Attacks
•Security Services
•Security Mechanisms
•A Model for Network Security

1
Key Security Concepts

Authentication
Non-repudiation
2
Security Goals
SECURITY GOALS

INTEGRITY AVAILABILITY
CONFIDENTIALITY

3
Security ATTACKS
Security Attacks

Modification
Snooping
Masqueradi
ng Denial of
Traffic Service
Analysis Replaying

Repudiation

Threat to confidentiality Threat to Integrity Threat to Availability

4
Security Attacks
Attacks Passive/Active Threatening

1. Snooping Passive Confidentiality


2. Traffic Analysis

1. Modification Active Integrity


2. Masquerading
3. Replaying
4. Repudiation

1. Denial of Service Active Availability


Security Attacks

• Passive Attack
• Just to obtain information. Does not Modify or harm the
system.

• Active Attack
• May Change the Data and harm the system.

6
Security Services
Security Services

Data Authentication
Data Integrity Non Repudiation Access Control
Confidentiality

Anti Change Peer Entity Proof of Origin


Anti Replay Data Origin Proof of Delivery

7
Security Mechanisms
Encipherment

Data Integrity

Digital Signature

Authentication Exchange
Security
Traffic Padding
Mechanisms
Routing Control

Notarization

Access Control

8
Relation Between Services and
Mechanisms
Security Services Security Mechanism

Data Confidentiality Encipherment, Routing Control

Data Integrity Encipherment, Digital Signature, Data Integrity

Authentication Encipherment, Digital Signature, Authentication


exchanges

Non Repudiation Digital Signature, Data Integrity and Notarization

Access Control Access Control Mechanisms

9
Levels of Impact

We can define 3 levels of impact from a security


attack
Low - The loss is minor
Moderate - The loss is serious
High - The loss severe or catastrophic

10
Three Aspects of Security

• The three aspects of information security are


• security attack
• security mechanism (control)
• security service
• Some terms
• threat – a potential for violation of security
• vulnerability – a way by which loss can happen
• attack – an attempt to avoid security services

11

You might also like