Introduction To Network Security: L. Tahani Al Jehani
Introduction To Network Security: L. Tahani Al Jehani
NETWORK SECURITY
L. Tahani Al jehani
COMPUTER SECURITY CONCEPTS
Information security :
Beforethe widespread use of data processing
equipment, the security of information felt to be
valuable to an organization was provide primarily by
physical and administrative means.
An example of the former is the use of rugged filing
cabinets with a combination lock for storing sensitive
documents.
computer security (cyber security)
With the introduction of the computer, the need for
automated tools for protecting files and other
information stored on the computer became evident.
Replay.
modification of messages.
denial of service.
Masquerade
A masquerade attack usually includes one of the
other forms of active attack.
For example, authentication sequences can be
captured and replayed after a valid authentication
sequence has taken place, thus enabling an
authorized entity with few privileges to obtain extra
privileges by impersonating an entity that has those
privileges.
Masquerade
Replay
Replay involves the passive capture of a data
unit and its subsequent retransmission to produce
an unauthorized effect
Modification of messages
Modification of messages simply means that
some portion of a legitimate message is altered,
or that messages are delayed or reordered, to
produce an unauthorized effect
For example, a message meaning “Allow John
Smith to read confidential file accounts” is modified
to mean “Allow Fred Brown to read confidential file
accounts.”
denial of service
prevents or inhibits the normal use or management
of communications facilities
the communication channel between the ATM and the bank must be encrypted
the PIN must be encrypted (wherever it is stored)
Integrity requirements:
the actions performed via the ATM must be associated to the account
associated with the card
Availability requirements:
the system must be able to serve at least X concurrent users at any given time
the system must be available 99.9% of the time
Assignment#1
Choose one of internet protocol (TCP/IP , UDP ,..)
Then give an example of integrity , availability and
confidentiality