Cryptography and Network Security Overview & Chapter 1
Cryptography and Network Security Overview & Chapter 1
Cryptography and
Network Security The art of war teaches us to rely not on the
Overview & Chapter 1 likelihood of the enemy's not coming, but
on our own readiness to receive him; not
on the chance of his not attacking, but
Fifth Edition rather on the fact that we have made our
by William Stallings position unassailable.
Lecture slides by Lawrie Brown The Art of War, Sun Tzu
(with edits by RHB)
Examples of Security
Computer Security Challenges
Requirements
confidentiality student grades 1. not simple
2. must consider potential attacks
integrity patient information 3. procedures used counter-intuitive
availability authentication service 4. involve algorithms and secret info
5. must decide where to deploy mechanisms
6. battle of wits between attacker / admin
7. not perceived of benefit until fails
8. requires regular monitoring
9. too often an after-thought
10. regarded as impediment to using system
OSI Security Architecture Aspects of Security
ITU-T X.800 Security Architecture for OSI consider 3 aspects of information security:
defines a systematic way of defining and security attack
providing security requirements security mechanism
security service
for us it provides a useful, if abstract,
overview of concepts we will study note terms
threat a potential for violation of security
attack an assault on system security, a
deliberate attempt to evade security services
Passive Attacks
Active Attacks
Security Service
enhance security of data processing systems
and information transfers of an organization
intended to counter security attacks
using one or more security mechanisms
often replicates functions normally associated
with physical documents
which, for example, have signatures, dates; need
protection from disclosure, tampering, or
destruction; be notarized or witnessed; be
recorded or licensed
Security Services Security Services (X.800)
Authentication - assurance that communicating
X.800: entity is the one claimed
a service provided by a protocol layer of have both peer-
peer-entity & data origin authentication
communicating open systems, which ensures Access Control - prevention of the
adequate security of the systems or of data unauthorized use of a resource
transfers Data Confidentiality - protection of data from
unauthorized disclosure
RFC 2828: Data Integrity - assurance that data received is
a processing or communication service as sent by an authorized entity
provided by a system to give a specific kind of Non-Repudiation - protection against denial by
protection to system resources one of the parties in a communication
Availability - resource accessible/usable
Model for Network Access Security Model for Network Access Security
using this model requires us to:
1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated
information or resources