Network Security
Network Security
An Overview
Presented By:
Dr. S. S. Bedi
Department of CSIT,
MJP Rohilkhsnd University, Bareilly
Dr. S. S. Bedi 1
READER’S GUIDE
The art of war teaches us to rely not on the
likelihood of the enemy's not coming, but on
our own readiness to receive him; not on the
chance of his not attacking, but rather on the
fact that we have made our position
unassailable.
Dr. S. S. Bedi 3
WHAT IS SECURITY?
“The quality or state of being secure--to be free from
danger”.
To be protected from adversaries.
A successful organization should have multiple layers of
security in place:
– Physical security
– Personal security
– Operations security
– Communications security
– Network security Dr. S. S. Bedi 4
BACKGROUND
Dr. S. S. Bedi 5
DEFINITIONS
Dr. S. S. Bedi 6
WHAT IS INFORMATION SECURITY?
Dr. S. S. Bedi 8
Figure 1-3 – NSTISSC Security
Model
– Low
– Moderate
– High
Dr. S. S. Bedi 10
LOW IMPACT
The loss could be expected to have a limited adverse effect on
organizational operations, organizational assets, or individuals.
A limited adverse effect means that, for example, the loss of
confidentiality, integrity, or availability might.
– (i) cause a degradation in mission capability to an extent
and duration that the organization is able to perform its
primary functions, but the effectiveness of the functions is
noticeably reduced;
– (ii) result in minor damage to organizational assets;
– (iii) result in minor financial loss; or
– (iv) result in minor harm to individuals.
Dr. S. S. Bedi 11
MODERATE IMPACT
The loss could be expected to have a serious adverse effect
on organizational operations, organizational assets, or
individuals.
A serious adverse effect means that, for example, the loss
might
– (i) cause a significant degradation in mission capability to
an extent and duration that the organization is able to
perform its primary functions, but the effectiveness of the
functions is significantly reduced;
– (ii) result in significant damage to organizational assets;
– (iii) result in significant financial loss; or
– (iv) result in significant harm to individuals that does not
involve loss of life or serious, life-threatening injuries.
Dr. S. S. Bedi 12
HIGH IMPACT
The loss could be expected to have a severe or catastrophic
(causing sudden great damage) adverse effect on organizational operations,
Dr. S. S. Bedi 15
ASPECTS OF SECURITY
Need systematic way to define requirements.
Consider 3 aspects of information security:
– Security attack
– Security mechanism (control)
– Security service
note terms
– Threat: a potential for violation of security.
– Vulnerability: a way by which loss can happen.
– Attack: an assault on system security, a deliberate
attempt to evade (avoid something especially by trickery) security services.
Dr. S. S. Bedi 16
SECURITY ATTACKS
Dr. S. S. Bedi 17
SECURITY ATTACK
Dr. S. S. Bedi 20
Passive Attack - Interception
Dr. S. S. Bedi 21
Passive Attack: Traffic Analysis
Dr. S. S. Bedi 22
Active Attack: Interruption
Dr. S. S. Bedi 23
Active Attack: Fabrication
Fabricate message
Dr. S. S. Bedi 24
Active Attack: Replay
Dr. S. S. Bedi 25
Active Attack: Modification
Modify message
Dr. S. S. Bedi 26
HANDLING ATTACKS
Easy to stop
Hard to detect
Hard to stop
Easy to detect
Dr. S. S. Bedi 27
SECURITY MECHANISM
Dr. S. S. Bedi 28
SECURITY MECHANISM
Dr. S. S. Bedi 30
SECURITY SERVICES
Dr. S. S. Bedi 31
SECURITY SERVICE
RFC 2828:
“a processing or communication service
provided by a system to give a specific kind of
protection to system resources”.
Dr. S. S. Bedi 33
SECURITY SERVICES (X.800)
X.800 defines it in 5 major categories:
Dr. S. S. Bedi 35
MODEL FOR NETWORK
SECURITY
Dr. S. S. Bedi 36
Model for Network Security
Dr. S. S. Bedi 37
MODEL FOR NETWORK SECURITY
Dr. S. S. Bedi 39
Model for Network Access Security
Dr. S. S. Bedi 40
SUMMARY
Security concepts:
Dr. S. S. Bedi 41
STANDARDS ORGANIZATIONS
William Stalling,
Dr. S. S. Bedi 43