Lecture 01
Lecture 01
and Network
Security
Sixth Edition
by William Stallings
Chapter 1
Overview
“The combination of space, time, and strength that must be
considered as the basic elements of this theory of defense makes
this a fairly complicated matter. Consequently, it is not easy to find
a fixed point of departure.”
— On War,
Carl Von Clausewitz
Cryptographic algorithms and protocols can
be grouped into four main areas:
Symmetric encryption
• Used to conceal the contents of blocks or streams of data of any size, including
messages, files, encryption keys, and passwords
Asymmetric encryption
• Used to conceal small blocks of data, such as encryption keys and hash function
values, which are used in digital signatures
Authentication protocols
measures to deter,
prevent, detect, and
correct security violations
that involve the
transmission of
information
Computer Security
Confidentiality
• Data confidentiality
• Assures that private or confidential information is not made available or disclosed to
unauthorized individuals
• Privacy
• Assures that individuals control or influence what information related to them may be
collected and stored and by whom and to whom that information may be disclosed
Integrity
• Data integrity
• Assures that information and programs are changed only in a specified and
authorized manner
• System integrity
• Assures that a system performs its intended function in an unimpaired manner, free
from deliberate or inadvertent unauthorized manipulation of the system
Availability
• Assures that systems work promptly and service is not denied to authorized
users
CIA Triad
Possible additional concepts:
Authenticity Accountability
• Verifying that users are • The security goal that
who they say they are generates the
and that each input requirement for
arriving at the system actions of an entity to
came from a trusted be traced uniquely to
source that entity
Breach of Security
Levels of Impact
• Security attack
• Any action that compromises the security of information owned by an
organization
• Security mechanism
• A process (or a device incorporating such a process) that is designed to
detect, prevent, or recover from a security attack
• Security service
• A processing or communication service that enhances the security of the
data processing systems and the information transfers of an organization
• Intended to counter security attacks, and they make use of one or more
security mechanisms to provide the service
Table 1.1
Threats and Attacks (RFC 4949)
Security Attacks
• The ability to limit and control the access to host systems and
applications via communications links
• To achieve this, each entity trying to gain access must first be
indentified, or authenticated, so that access rights can be tailored to
the individual
Data Confidentiality
Security
Services
(X.800)
Security Mechanisms (X.800)
Security
Mechanisms
(X.800)
Model for Network Security
Network Access Security Model
Unwanted Access