0% found this document useful (0 votes)
76 views14 pages

Terminologies Lecture 3d: Compsci 726 Network Defence and Countermeasures

This document discusses network security and related concepts. It defines network security as taking measures to protect networking infrastructure from unauthorized access or misuse. [It outlines the OSI security architecture and describes security attacks like passive attacks such as message disclosure and traffic analysis, and active attacks including masquerade, replay, message modification, and denial of service.] It also discusses security services like authentication, access control, confidentiality, data integrity, non-repudiation, and availability and how they relate to different types of security attacks.

Uploaded by

Michael C
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views14 pages

Terminologies Lecture 3d: Compsci 726 Network Defence and Countermeasures

This document discusses network security and related concepts. It defines network security as taking measures to protect networking infrastructure from unauthorized access or misuse. [It outlines the OSI security architecture and describes security attacks like passive attacks such as message disclosure and traffic analysis, and active attacks including masquerade, replay, message modification, and denial of service.] It also discusses security services like authentication, access control, confidentiality, data integrity, non-repudiation, and availability and how they relate to different types of security attacks.

Uploaded by

Michael C
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

TERMINOLOGIES

Lecture 3d
COMPSCI 726
Network Defence and Countermeasures

Muhammad Rizwan Asghar

July 22, 2021


NETWORK SECURITY

“Network Security is the process of taking physical and


software preventative measures to protect the underlying
networking infrastructure from unauthorized access, misuse,
malfunction, modification, destruction, or improper disclosure,
thereby creating a secure platform for computers, users and
programs to perform their permitted critical functions within a
secure environment.”

Source: SANS

2
THE OSI SECURITY ARCHITECTURE

▪ Security attack
– An action that compromises security of the system and
exchanged information

▪ Security service
– A service that enhances security of the system and
exchanged information

▪ Security mechanism
– A mechanism that is designed to detect, prevent, or recover
from a security attack

3
TYPES OF SECURITY ATTACKS

▪ Passive
– Release of message content (disclosure)
– Traffic analysis

▪ Active
– Masquerade
– Replay
– Message modification
– Denial of Service (DoS)

4
RELEASE OF MESSAGE CONTENT

Source: Network Security Essentials by William Stallings

5
TRAFFIC ANALYSIS

Source: Network Security Essentials by William Stallings

6
MASQUERADE

Source: Network Security Essentials by William Stallings

7
REPLAY

Source: Network Security Essentials by William Stallings

8
MESSAGE MODIFICATION

Source: Network Security Essentials by William Stallings

9
DENIAL OF SERVICE (DOS)

Source: Network Security Essentials by William Stallings

10
SECURITY SERVICES

▪ Authentication
– A process of identifying whether the communicating entity is the one it
claims to be

▪ Access control (or authorisation)


– A technique used to regulate access to resources

▪ Confidentiality
– Protection of the data

▪ Data integrity
– Ensuring received data is not tampered by unauthorised entities

▪ Non-repudiation
– Protection against denial by communicating entities

▪ Availability
– The property of a system being accessible and usable upon demand

11
RELATIONSHIP BETWEEN SECURITY
SERVICES AND ATTACKS

Release of
Traffic Message Denial of
Message Masquerade Replay
Analysis Modification Service
Services Content

Authentication ✓

Access

Control
Confidentiality

(Message)
Confidentiality

(Header)

Data Integrity ✓* ✓

Non-
repudiation

Availability ✓

* Using freshness

12
TO BE CONTINUED

▪ See the next lecture

13
Questions?

Thanks for your attention!

14

You might also like