Network Security and SWOT analysis
Network Security and SWOT analysis
Trudy
Eavesdropping - Message Interception
(Attack on Confidentiality)
• Unauthorized access to information
• Packet sniffers and wiretappers
• Illicit copying of files and programs
A B
Eavesdropper
Integrity Attack - Tampering With Messages
A B
Perpetrator
Authenticity Attack - Fabrication
• Unauthorized assumption of other’s identity
• Generate and distribute objects under this
identity
A B
Masquerader: from A
Attack on Availability
• Destroy hardware (cutting fiber) or software
• Modify software in a subtle way (alias commands)
• Corrupt packets in transit
A B
Public-key encryption
Public Key Ciphers
• An important additional property of public-key ciphers is
that the private “decryption” key can be used with the
encryption algorithm to encrypt messages so that they
can only be decrypted using the public “encryption” key.
• This property clearly wouldn’t be useful for confidentiality
since anyone with the public key could decrypt such a
message.
• This property is, however, useful for authentication since it
tells the receiver of such a message that it could only have
been created by the owner of the keys.
Public Key Ciphers
A challenge-response protocol
• Public Key Authentication Protocols
Kerberos Authentication
Diffie-Hellman Key Agreement
• Example Systems
Pretty Good Privacy (PGP)
• Pretty Good Privacy (PGP) is a widely used approach to providing
security for electronic mail. It provides authentication, confidentiality,
data integrity, and nonrepudiation.
• Originally devised by Phil Zimmerman, it has evolved into an IETF
standard known as OpenPGP
• PGP’s confidentiality and receiver authentication depend on the
receiver of an email message having a public key that is known to the
sender.
• To provide sender authentication and nonrepudiation, the sender
must have a public key that is known by the receiver.
• These public keys are pre-distributed using certificates and a web-of-
trust PKI.
• PGP supports RSA and DSS for public key certificates.
PGP’s steps to prepare a message for
emailing from Alice to Bob
Secure Shell (SSH)
• The Secure Shell (SSH) protocol is used to provide a remote login
service, and is intended to replace the less-secure Telnet and rlogin
programs used in the early days of the Internet.
• SSH is most often used to provide strong client/server authentication/
message integrity—where the SSH client runs on the user’s desktop
machine and the SSH server runs on some remote machine that the
user wants to log into—but it also supports confidentiality.
• Telnet and rlogin provide none of these capabilities.
• Note that “SSH” is often used to refer to both the SSH protocol and
applications that use it; you need to figure out which from the context.
Using SSH port forwarding to secure other
TCP-based applications
Transport Layer Security (TLS, SSL, HTTPS)