Network Security: Presented By: Dr. Munam Ali Shah
Network Security: Presented By: Dr. Munam Ali Shah
Lecture 4
protection.
To understand access privileges and create access right
metrix.
To understand how different security tools be used.
There is never a free lunch
Means don’t go for free software, free wallpapers etc.
No one is going to give you anything free
Security through obscurity … ?
Security through obscurity – hiding design
or implementation details to gain security:
keeping secret not the key, but the encryption
algorithm,
hiding a DB server under a name different from “db”, etc.
The idea doesn’t work
it’s difficult to keep secrets (e.g. source code gets stolen)
if security of a system depends on one secret, then,
once it’s no longer a secret, the whole system is compromised
secret algorithms, protocols etc. will not get reviewed flaws
won’t be spotted and fixed less security
Systems should be secure by design, not by obfuscation
Security Attacks
Repudiation
Threat to Integrity
Passive Versus Active Attacks
Bob
Alice
15
Protection
In one protection model, computer consists of a
collection of objects, hardware or software
19
Access Matrix