Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Lecture-1 Intro

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Cryptography(UEC633)

(Unit-I:-Introduction)
(UG Course)

Network Security
(UG Course)
Outline

 Basics of Network Security

 Security Attacks

 Security Services

 Security Mechanisms

 Malicious software

 Computer viruses and Warms

 Trojans
Basics of Network Security
 Requirements of information security have changed in today's digital world.

 Use of computer added tools has been increased for protecting the data.

 After introducing Internet, proper and secure installation of communication


links is the first requirement of establishment of any wide area network for
transmitting the data.

 Based on fixed set of rules, Network security models provide the protection
in between of data transmission and at the end points too.

 Internet security models handles the security of interconnected networks


Basics of Network Security
 OSI Security Architecture

 ITU-T X.800 “Security Architecture for OSI (open systems interconnections)”

 It defines proper and standard security services for designing any network
security model.

 It is internationally recognized and verified standard.


Basics of Network Security
 There are three main aspects of network security or information security
models

1. Security attack
2. Security Service
3. Security Mechanism
Security Attack
 Any action or attempt to breach the security, i.e. (leakage the information,
temper the data files, intercept the information etcetera) of any network
without the permission of the owner of that network.

 Network security is about how to prevent any kind of the attacks in network.

 Varity of attacks are possible in network security or information security


field.

 The two most generic types of the attacks will be discussed here
1. Passive attack
2. Active attack
Passive Attacks
 An intruder just observes and copy the data and may use that data for
malicious purpose but does not modify the content of intercepted data.

Fig. Passive attack


Active Attacks
 An intruder tries to alter or modify the in between data of any network and
also tries to disturb the related operations on the same networks .

Fig. Active attack


Security Services
 Security services improves the security of given network related to
transferring or processing the data and channel itself.

 Another task of security services is to apply the counter attack process if


attack has been launched.

 Providing more than one counter attack mechanisms is also a crucial part of
security services.

 X.800 is widely used standard network security architecture model.

 X.800:- “a service provided by a protocol layer of communicating open


systems, which ensures adequate security of the systems or of data transfers”
Security Services
 X.800 standard provides security services on the basis of five categories

 1.Authentication:- Guaranty of communication between the actual parties, those


may be claimed after.

 2.Access control:- Unauthorized entities or users will not use the resources of
particular network before and after the communication establishment.

 3.Data confidentiality:- Protecting the data from unauthorized users or parties.

 4. Data integrity:- To give the guaranty that the data has been sent by actual or
pre established party or authorized party. Error correction protocols are used for
achieving this.

 5. Non-repudiation:- It gives the assurance that no end to end entities may refuse
in between or after the communication establishment.
Security Mechanism
 X.800 security architecture standard also provides security mechanisms in two
categories

 1. Specific security mechanisms:- encipherment, digital signatures, access


controls, data integrity, authentication exchange, traffic padding, routing control,
notarization

 2. Pervasive security mechanisms:- Those mechanisms are included in this


category those are not specifically defined by OSI(open systems interconnections)
model security services or any protocol layer. Like Trusted functionality, security
labels, event detection, security audit trails, security recovery
Malicious Software
 Malicious software is generally known called as Malware.

 Any software or written program file that may harm to particular data content or
single computer or server or whole network.

 Malware is the general term while Worms, Viruses, Trojans, Spyware, Botnets, all
are the types of malware.

 Best solution from preventing the malwares is timely update the operating
system, browsers and plugins.

 Another solution is to remove the softwares those are not in use.

 Anty-malware softwares are also available in markets.


Computer Viruses and Warms
 Viruses:- A computer virus is kind of the malware file which is somehow
attached with other data file of any end user and then user will execute that
particular data file then automatically virus will be executed and may deteriorate
the particular data file as well as computer too.

 Antivirus softwares are also available that can detect and remove the viruses.

 Warms:- This is another type of malware program or software that may develop
the copies of itself and may harm or infected to other computer systems including
host computer or even networks and it spreads rapidly.

 Somehow warms always harm or infect the network severely or slightly while
viruses generally infect the particular system only.
Trojans
 Trojans:- A malicious code or software that looks like a legitimate code file but it
attack severely on computer systems or server.

 Trojan can not replicate itself.

 Once a hacker introduced this Trojan virus in any particular system then hacker
may delete, send or receive the files of targeted computer.

You might also like