Chapter 8 - Network Security and Network Management
Chapter 8 - Network Security and Network Management
1
Learning Outcome
2
Network Security Attack
3
Security Attacks
Masquerade Replay*
7
Active Attack - 2
8
SECURITY SERVICES
9
Non-repudiation
11
Categories of cryptography
12
Message Confidentiality
(Symmetric Keys)
13
Advantages of using
Symmetric Keys
15
Advantages of using
Asymmetric Keys
17
Note
18
Message and Message
Digest
Note
19
Checking Integrity
20
Criteria of a Hash Function
Strong collision resistance: Ensure that we cannot find two messages that
hash to the same digest.
21
Message Authentication
22
MAC - Created by Alice and
Checked by Bob
23
Message Non-repudiation
Note
24
Using a Trusted Center
for Non-repudiation
25
Digital Signature
Note
26
Entity Authentication
27
Entity Authentication
28
Network Management System
29
Functions of a Network
Management System
30
Configuration Management
31
Fault Management
32
Performance Management
33
Security and Accounting
Management
• Security Management
– Is responsible for controlling access to the network based on
the predefined policy
• Accounting Management
– Is the control of users’ access to network resources through
charges.
– Individual users, departments, divisions are charged for the
services they receive from the network maybe for budgeting
purpose
34