0% found this document useful (0 votes)
34 views15 pages

Chap1 - Network Security - 2023

asdasdddaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaassssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss

Uploaded by

Mark Mamdouh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views15 pages

Chap1 - Network Security - 2023

asdasdddaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaassssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss

Uploaded by

Mark Mamdouh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

08

E3
N
C
U
AC

Cryptography and Network Security


Overview
1
Dr. Abdellatif Elkouny
Roadmap 2

08
symmetric ciphers
Cryptographic

E3
asymmetric encryption
algorithms hash functions

N
Mutual Trust C
U
AC

Network Security

Dr. Abdellatif Elkouny


Confidentiality
• Data confidentiality
• Assures that private or confidential information
is not made available or disclosed to
unauthorized individuals
• Privacy
• Assures that individual's control or influence

08
what information related to them may be
collected and stored and by whom and to

E3
whom that information may be disclosed

Integrity

N
Network • Data integrity

Security C • Assures that information changed only in a


U
specified and authorized manner
• System integrity
AC

Objectives • Assures that a system performs its intended


function in an unimpaired manner, free from
deliberate or inadvertent unauthorized
manipulation of the system
Availability
• Assures that systems work promptly, and service is
Dr. Abdellatif Elkouny not denied to authorized users 3
Levels of Impact 4

08
can define 3 levels of impact

E3
from a security breach
 Low

N
 Moderate
 High C
U
AC

Dr. Abdellatif Elkouny


Aspects of Security 5

08
consider 3 aspects of information security:

E3
• security attack

N
• security service
• security mechanism
C
U
AC

note terms

• threat – a potential for violation of security


• attack – an assault on system security, a deliberate attempt to
evade security services

Dr. Abdellatif Elkouny


08
E3
N
C
U
AC

Passive Attacks
6
Dr. Abdellatif Elkouny
08
E3
N
C
U
AC

Active Attacks
7
Dr. Abdellatif Elkouny
Security Service 8

08
E3
N
• Enhance security of data processing systems and
information transfers of an organization
C
U
• Intended to counter security attacks using one
or more security mechanisms
AC

Dr. Abdellatif Elkouny


Security Services 9

08
E3
N
X.800: C RFC 2828:
U
“a service provided by a protocol “a processing or communication
AC

layer of communicating open service provided by a system to


systems, which ensures adequate give a specific kind of protection
security of the systems or of to system resources”
data transfers”

Dr. Abdellatif Elkouny


Security Services (X.800) 10

08
• Authentication - assurance that communicating entity is the
one claimed

E3
• have both peer-entity & data origin authentication
• Access Control - prevention of unauthorized use of a resource

N
• Data Confidentiality –protection of data from unauthorized
disclosure
C
U
• Data Integrity - assurance that data received is as sent by an
AC

authorized entity
• Non-Repudiation - protection against denial by one of the
parties in a communication
• Availability – resource accessible/usable

Dr. Abdellatif Elkouny


Security Mechanism 11

08
• feature designed to detect, prevent, or recover from a

E3
security attack
• no single mechanism that will support all services

N
required

C
• However, one element underlies many of the security
U
mechanisms in use:
• CRYPTOGRAPHIC TECHNIQUES
AC

• hence our focus on this topic

Dr. Abdellatif Elkouny


Security 12
Mechanisms (X.800)

08
• specific security mechanisms:

E3
• encipherment, digital signatures,
access controls, data integrity,

N
authentication exchange, traffic

C padding, routing control.


U
• general security mechanisms:
AC

• trusted functionality, security


labels, event detection, security
audit trails, security recovery

Dr. Abdellatif Elkouny


13

08
E3
N
C
U
AC

Trust Model for Network Security (PKI)

Dr. Abdellatif Elkouny


Model for Network
Security

08
 using this model requires us to:
1. design a suitable algorithm for the

E3
security transformation
2. generate the secret information

N
(keys) used by the algorithm

C
3. develop methods to distribute and
share the secret information
U
4. specify a protocol enabling the
AC

principals to use the transformation


and secret information for a
security service

Dr. Abdellatif Elkouny 14


Summary 15

08
• topic roadmap & standards organizations

E3
• security concepts:
• confidentiality, integrity, availability

N
• X.800 security architecture
C
U
• security attacks, services, mechanisms
AC

• models for network (access) security

Dr. Abdellatif Elkouny

You might also like