ACN - Security
ACN - Security
NETWORKS (ICTW485)
Overview
Overview of Security
Tenets of Network Security
Risk, threat and vulnerability
Cryptographic Principles, concepts & Terminologies
Types of Ciphers
What is Security?
“The quality or state of being secure—to be free from danger”
A successful organization should have multiple layers of security in place:
◦ Physical security
◦ Personal security
◦ Operations security
◦ Communications security
◦ Network security
◦ Information security
NETWORK SECURITY
oIs a set of rules and configurations designed to
protect the integrity, confidentiality and accessibility
of computer networks and data using both software
and hardware technologies.
oNetwork security protects your network and data
from breaches, intrusions and other threats.
Model for Network Security
Model for Network Security
• using this model requires us to:
– design a suitable algorithm for the security transformation
– generate the secret information (keys) used by the
algorithm
– develop methods to distribute and share the secret
information
– specify a protocol enabling the principals to use the
transformation and secret information for a security service
Network Access Security
Network Access Security
◦ EXPLOIT
◦ An “exploit” is a an attack using known vulnerabilities
◦ “Zero-day” attack refers to attacks taking place before the vulnerability
becomes known to software
Cont.
RISK
‘A potential problem’, consisting of a
◦ Vulnerability
◦ Threat (attack rate)
◦ Extent of the consequences.
TRUST
‘A relationship between two entities where one entity allows the other to perform certain
actions.’
Tenets of Network Security
(also referred to as security goals)
Confidentiality
• It means guarding information from everyone except those with rights
to it.
The original message from Alice to Bob is called plaintext; the message that is sent through the channel is called the
ciphertext. To create the ciphertext from the plaintext, Alice uses an encryption algorithm and a shared secret key. To
create the plaintext from ciphertext, Bob uses a decryption algorithm and the same secret key.
Kerckhoff’s Principle
Encryption/Decryption
C = f (Kpublic , P) P = g(Kprivate , C)
RSA Cryptosystem
The most common public-key algorithm is the RSA cryptosystem, named for its
inventors (Rivest, Shamir, and Adleman).
Encryption, Decryption and Key Generation in RSA
CONT.
RSA Encryption
RSA Decryption
TRIAL QUESTION