21
1 Network Security Network Security Ola Flygt Växjö University http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49

1 Network Security Ola Flygt Växjö University [email protected] +46 470 70 86 49

Embed Size (px)

Citation preview

1

Network Network SecuritySecurity

Ola FlygtVäxjö University

http://w3.msi.vxu.se/users/ofl/[email protected]

+46 470 70 86 49

2

OutlineOutline

Attacks, services and mechanismsSecurity attacksSecurity servicesMethods of DefenceModels for Internetwork SecurityInternet standards and RFCs

3

SecuritySecurity

“When we know our surroundings and have tools to protect ourselves, we can feel more secure.”

“It makes me feel secure to be around my dog. He will always warn me if something is wrong.”

“Knowing someone is looking out for me is what security means to me.”

“If we did not have security, our world would be a very bad place.”

(“What Security Means To Me” essays at www.panasonic.com/security.)

4

Information SecurityInformation Security

5

The Security LandscapeThe Security Landscape

IT realmPhysical realm

AirportFood security, etc.

Political realmInternational etc.

Monetary realmFinancial, etc.

6

The IT Security The IT Security LandscapeLandscape

Computing security Data security Application security Information security Network security

7

Attacks, Services and Attacks, Services and MechanismsMechanisms

Security Attack: Any action that compromises the security of information.

Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack.

8

Security AttacksSecurity Attacks

9

Security AttacksSecurity Attacks

Interruption: This is an attack on availability

Interception: This is an attack on confidentiality

Modification: This is an attack on integrity

Fabrication: This is an attack on authenticity

10

Security GoalsSecurity Goals

Integrity

Confidentiality

Availability

11

Threats and AttacksThreats and Attacks

Threat: A potential for violation of security, which exists when there is a circumstance, capability,action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability.

Attack: An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system.

12

13

Security Services Security Services (X.800)(X.800)

Confidentiality (privacy)

Authentication (who created or sent the data)

Integrity (has not been altered)

Non-repudiation (you can not deny sending or receiving some information)

Access control (prevent misuse of resources)

Availability (permanence, non-erasure)

Denial of Service Attacks

Virus that deletes files

14

Security Service vs Security Service vs AttackAttack

15

Security Mechanisms Security Mechanisms (X.800)(X.800)

EnciphermentDigital SignatureAccess ControlAuthentication ExchangeTraffic Padding

And more…..

16

Service vs MechanismsService vs Mechanisms

17

18

19

Methods of DefenceMethods of Defence

EncryptionSoftware Controls (access

limitations in a data base, in operating system protect each user from other users)

Hardware Controls (smartcard)Policies (frequent changes of

passwords)Physical Controls

20

Internet standards and Internet standards and RFCsRFCs

The Internet societyInternet Architecture Board (IAB)Internet Engineering Task Force

(IETF)Internet Engineering Steering Group

(IESG)

21

Internet RFC Internet RFC Publication ProcessPublication Process