Lecture 7 2
Lecture 7 2
Information
Security LECTURE 7:
Network
Security
Dr. Esam A. Alwagait
[email protected]
Agenda: Security in networks
• Network concepts
• Network threats
• Network security controls
• Firewalls
• Intrusion Detection/Prevention Systems (IDS/IPS)
• Session hijacking
• TCP sessions
• TCP protocol sets up state at sender and receiver end nodes and uses this state while
exchanging packets (using e.g., sequence numbers for detecting lost packets)
• Attacker can hijack such a session and masquerade as one of the endpoints
• Web servers sometimes have client store cookies to re-identify client for future
visits
• Attacker can sniff or steal cookie and masquerade as client
• Replay attack
• Attacker captures data and resent it at a later time
End-to-End encryption
• the encryption/
decryption is performed
at the highest levels
(layer 7, application, or
perhaps at layer 6,
presentation) of the OSI
model
• Can be HW or SW
• SSL for secure browsing
• S/MIME for secure email