Chap1 - Network Security - 2023
Chap1 - Network Security - 2023
E3
N
C
U
AC
08
symmetric ciphers
Cryptographic
E3
asymmetric encryption
algorithms hash functions
N
Mutual Trust C
U
AC
Network Security
08
what information related to them may be
collected and stored and by whom and to
E3
whom that information may be disclosed
Integrity
N
Network • Data integrity
08
can define 3 levels of impact
E3
from a security breach
Low
N
Moderate
High C
U
AC
08
consider 3 aspects of information security:
E3
• security attack
N
• security service
• security mechanism
C
U
AC
note terms
Passive Attacks
6
Dr. Abdellatif Elkouny
08
E3
N
C
U
AC
Active Attacks
7
Dr. Abdellatif Elkouny
Security Service 8
08
E3
N
• Enhance security of data processing systems and
information transfers of an organization
C
U
• Intended to counter security attacks using one
or more security mechanisms
AC
08
E3
N
X.800: C RFC 2828:
U
“a service provided by a protocol “a processing or communication
AC
08
• Authentication - assurance that communicating entity is the
one claimed
E3
• have both peer-entity & data origin authentication
• Access Control - prevention of unauthorized use of a resource
N
• Data Confidentiality –protection of data from unauthorized
disclosure
C
U
• Data Integrity - assurance that data received is as sent by an
AC
authorized entity
• Non-Repudiation - protection against denial by one of the
parties in a communication
• Availability – resource accessible/usable
08
• feature designed to detect, prevent, or recover from a
E3
security attack
• no single mechanism that will support all services
N
required
C
• However, one element underlies many of the security
U
mechanisms in use:
• CRYPTOGRAPHIC TECHNIQUES
AC
08
• specific security mechanisms:
E3
• encipherment, digital signatures,
access controls, data integrity,
N
authentication exchange, traffic
08
E3
N
C
U
AC
08
using this model requires us to:
1. design a suitable algorithm for the
E3
security transformation
2. generate the secret information
N
(keys) used by the algorithm
C
3. develop methods to distribute and
share the secret information
U
4. specify a protocol enabling the
AC
08
• topic roadmap & standards organizations
E3
• security concepts:
• confidentiality, integrity, availability
N
• X.800 security architecture
C
U
• security attacks, services, mechanisms
AC