0% found this document useful (0 votes)
156 views

Accomplished By: Supervised By: Mr. AFAK

This document summarizes key concepts in computer security including: 1) Vulnerabilities, threats, and attacks are discussed as well as security objectives like authentication, authorization, and data integrity. 2) The importance of security policies is explained and what elements they should contain such as risk analysis, roles, and protection/detection/response procedures. 3) Major network attacks are covered including the difference between active and passive attacks and examples like interception, modification, and denial of service. 4) Common security mechanisms are outlined including antivirus software, firewalls, cryptography, and web security techniques.

Uploaded by

Yassine Abb
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
156 views

Accomplished By: Supervised By: Mr. AFAK

This document summarizes key concepts in computer security including: 1) Vulnerabilities, threats, and attacks are discussed as well as security objectives like authentication, authorization, and data integrity. 2) The importance of security policies is explained and what elements they should contain such as risk analysis, roles, and protection/detection/response procedures. 3) Major network attacks are covered including the difference between active and passive attacks and examples like interception, modification, and denial of service. 4) Common security mechanisms are outlined including antivirus software, firewalls, cryptography, and web security techniques.

Uploaded by

Yassine Abb
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 53

Ecole National Des Sciences Appliquées

Marrakech
Departement Networks & Telecoms

Supervised by: Mr. AFAK


Accomplished by: Laila ASRI
Imane BENTOTO
Yassine ABIBOU
Ismail RAJALLAH
Jamal BERAHIM
PLAN
INTRODUCTION
What is Security?
Computer Security is the ability of a system to
protect information and system resources with
respect to confidentiality and integrity.
Principal terminology of
Security

 Vulnerability ;
 Threats ;
 Attacks .
 Vulnerability

 It refers to the security flaws in a system that allow an


attack to be successful.
 Two primary vulnerabilities or weaknesses:
 Technology weaknesses ;
 Configuration weaknesses.
 Vulnerability
Tecknology
weaknesses

Software Hardware
 Vulnerability
Configuration weaknesses
Weakness Description

Unsecured user accounts Exposing usenames and passwords to


snoopers

System accounts with easily guessed Poorly selected and easily guessed
passwords user passwords

Misconfigured network equipement Misconfigured routing protocols,


leaving ports open on a switch
 Threats

 Malicious action that allows the breach of system security


by exploiting its vulnerabilities.

 Primary classes of threats:

 Unstructured threat ;
 Structured threat ;
 External threat ;
 Internat threat.
 Threats
 Attacks

 Attempt by a cracker to break into a computer.


 It contain 4 phases:

Reconnaissance ;
Scan of the system ;
Ganning access to the system ;
Successfull attack.
SECURITY
OBJECTIVES
Security Objectives

 Authentification ;
 Authentication ;
 Authorization ;
 Data Integrity ;
 Confidentiality ;
 Non-repudiation.
 Authentification

 The process of verifying the identity of a user.

Typically based on :

 Something user knows (Password)

Something user have (smart card…)

Something user is (Fingerprint…)


 Authentication
Authentication procedure :

Two-Party Authentication (One-Way Two-Way)

Third-Party Authentication (Kerberos)

Single Sign ON
 Authorization

The process of assigning access right to user.


 Data Integrity

Assurance that the data that arrives is


the same as when it was sent.
 Confidentiality

Assurance that sensitive information is


not visible to an eavesdropper. This is usually
achieved using encryption.
Non-repudiation

Assurance that any transaction


that takes place can subsequently be proved
to have taken place. Both the sender and
the receiver agree that the exchange took
place.
SECURITY
POLICY
Cycle safety
Security Policy
 The basic starting point of any security project;
 It is a structure around which a body built
all aspects of securing its computer system;
 It must define the rules representing the
acceptable access to resources of computer
system.
Security Policy
It is recommended to deal the following points:
 Diagnosis of existing:
 Identification of resources to be protected;
 Identification of the infrastructure network;
 Inventory of existing security tools;
 Organizational aspects.
Security Policy
 Risk analysis:
 Vulnerability assessment;
 Identification of potential threats;
 Estimated direct and indirect losses that
may result from each threat;
 Setting priorities for resource protection.
Security Policy
 Definition of roles:
 Chaining of responsibility within the security
team ;
 Role of the end user (employee, customer
or supplier) ;

 Estimated cost / budget for security.


Security Policy

It must offer, in response to the above


points-a sort of plan Director of Security,
which contains details of the following:
Protection procedures
 Login procedures and access to the network ;
 Mechanisms of control and neutralization of
viruses ;
 Backup procedures ;
 Procedures for access to files and directories ;
 Configuration procedures and upgrade tools
installed and corresponding patches.
Detection procedures
 Mechanisms for monitoring the servers (data,
messaging, Web.);
 Mechanisms for monitoring network activity ;
 Procedures 'play' and analysis of daily activities
(reports of certain tools, message alerts,
dashboards).
Response procedures
 Response procedures to an attack by hacker ;
 Response procedures to a virus attack;
 Response procedures to incidents of force
majeure.
Rihabilition procedures

 Crisis management plan;


 Insurance contracts;
 Maintenance contracts.
MAJOR NETWORK
ATTAKS
Security Of
Attacks/Threats
 These are actions that compromise the security
of information owned or transferred by an entity.
 Attacks can be one of 4 forms:
 Interruption ;
 Interception ;
 Modification ;
 Fabrication.
Types Of Attacks/Threats
Active & Passive Attacks
Active & Passive Attacks

 Passive Attacks: Confidentiality of data is


threatened.
 Active Attacks: The Integrity or availability of
data in transmission is threatened.
Active Attacks
 Passive attack can only observe communications
or data. Example: Interception ( also called
eavesdropping or passive wiretapping)
 Active attack can actively modify
communications or data:
 Often difficult to perform, but very powerful
• Mail forgery/modification
• TCP session hijacking /IP spoofing
Examples: Interruption, Modification ( also
called active wiretapping), Fabrication
Types of Active Attacks: masquerade, replay,
modification and denial of service.
Passive Attack
Active Attack
Compare Passive Attacks
& Active Attacks
 Passive attacks eavesdrop ;
 Active attacks change data ;
 Defeating passive attacks should focus on
detection ;
 Active attacks are malicious and will directly
cause damage ;
 Four examples active attacks: masquerade,
replay, denial of service, modification ;
 Active attacks generally are preceded by passive
attacks.
Why do they attack?
The attacker may attack :
 taking it as an intellectual challenge ;
to have thrills by seeing reports of his exploits
in public media.
Or they may be indulging in espionage for financial
gain.
SECURITY
MECHANISMS
Security Mechanisms
 Web Security;
 Cryptographic techniques;
 Firewalls.
Antivirus program is used to prevent, detect, and
remove computer viruses, spyware, and other forms of
malware.
Antispyware program protect your computer
against slow performance, and security threats caused by
spyware and other unwanted software.
Cryptography is the science of secret writing;
encrypts messages to make them secure and immune to
attacks.
Cryptography uses different algorithms which include:
 Secret Key Algorithm;
 Public Key Algorithm;
 Digital Signature;
 Certificate Authority.
Firewall is hardware, software, or a combination of both
that is used to prevent unauthorized programs or Internet
users from accessing a private network and/or a single
computer.
Allow traffic that flows automatically because it has
been deemed as “safe”;
Block traffic that is blocked because it has been
deemed dangerous to your computer;
Ask asks the user whether or not the traffic is allowed
to pass through.
 Packet Filter;
 VLAN;
 ACL;
 Application Proxy;
 NAC.
CONCLUSION
WEBOGRAPHY

• http://www.cisco.com;
• http://www.authorstream.com/Presentation/meetujain-368008-
network-security-science-technology-ppt-powerpoint/;
• http://www.supinfo-projects.com;
• http://www.youtube.com/watch?v=W7AXoVbAPis
• http://en.wikipedia.org/wiki/Network_security;
•http://www.utoronto.ca/security/documentation/policies/policy_5.h
tm
• http://www.crihan.fr/res/syrhano/technique/ipv6;

You might also like