0% found this document useful (0 votes)
39 views46 pages

ITC593 Topic 1

Uploaded by

Moazzam Ch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views46 pages

ITC593 Topic 1

Uploaded by

Moazzam Ch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

Charles Sturt

University

ITC 593 Network Security & Cryptography

Week 1 – Topic 1

Subject Coordinator: Dr. Syed Usman Jamil


School of Computing, Mathematics, and Engineering
Email: [email protected]
Charles Sturt University Panel Discussion

Guest Speaker 1: Moazzam Ali


Affiliations: Diyar United Company Middle East |
CEH, Cyber Security Certified (ISC2), CCIE-
SP,CCNP, CCNA

Guest Speaker 2: Dr. Khurram Shahzad


Affiliations: Engineers Australia / Charles Sturt
University Australia

William Stallings (2023). Cryptography and Network Security: Principles and Practice, 8th Ed, Pearson.
Charles Sturt
University

Topic 1 - Outline

1. Subject Introduction
2. Topic 1
3. Panel Discussion

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography 2
Charles Sturt
University

Subject Introduction
Subject Textbook
William Stallings (2023). Cryptography and Network Security:
Principles and Practice, 8th Ed, Pearson.

Subject Schedule
Follow subject schedule in Brightspace

Recommended reading/resources
• Kizza, J. M. (2024). Guide to Computer Network Security (6th ed. 2024.). Springer international Publishing.
• Vacca, J. R. (Ed.). (2025). Computer and Information Security Handbook. Volume 1Fourth edition. Morgan Kaufmann.
• McClure, S., Scambray J., and Kurtz G. (2012), Hacking Exposed: Network Security Secrets & Solutions, 7th Ed.,McGraw Hill Professional.
• Stallings, W., & Brown, L. (2012). Computer security: Principles and practice. Boston: Pearson.
• Easttom, W (2011). Computer security fundamentals. 2nd Ed. Pearson.
Additional reading/resources for practice will be advised by weekly announcements on the subject Brightspace site.

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography
Charles Sturt
University

Subject Overview

 The subject can be considered to be in 2 parts


 A study of the various core algorithms/techniques –
encryption and cryptographic hashing

 Its applications to confidentiality, authentication, and


integrity for both data in store and in transit.

 Data security and exchange (e.g. AES, RSA),


 User and data authentication (digital signatures for
verifying public keys called digital certificates and HMAC
for verifying data )
 All these intertwined into applications such as Kerberos,
SSH, HTTPS, S/MIME, IPSec

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography 4
Consultation Procedure

E-mail : [email protected]

 Weekly Interact Forum

Weekly Online Meeting

Need Advice?

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography 5
Recommendations

 Do the weekly exercises


 Attend or view the Online Meetings
 Complete the MCQ as part of A1
 Don’t ignore the subject readings
 Learn about referencing and avoid plagiarism
 Work on the assessments as you go
 If in doubt about something, speak to your subject coordinator

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography 6
Charles Sturt
University

Introduction to Network Security

Chapter 1

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography 7
Charles Sturt
University

Lecture Outline

 Computer and Network Security Concepts


 Computer Security Challenges
 OSI Security Architecture
 Security Attack
 Security Mechanisms
 Security Services
 Security Design Principles
 Attack Surfaces and Trees
 Network Security and Network Security Access Model

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography 8
Cybersecurity

Cybersecurity is the collection of tools, policies, security concepts, security safeguards,


guidelines, risk management approaches, actions, training, best practices, assurance, and
technologies that can be used to protect the cyberspace environment and organization and
users’ assets. Organization and users’ assets include connected computing devices, personnel,
infrastructure, applications, services, telecommunications systems, and the totality of
transmitted and/or stored information in the cyberspace environment. Cybersecurity strives to
ensure the attainment and maintenance of the security properties of the organization and users’
assets against relevant security risks in the cyberspace environment. The general security
objectives comprise the following: availability; integrity, which may include data authenticity and
nonrepudiation; and confidentiality

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Cybersecurity

Information Security Network Security


This term refers to preservation This term refers to protection of
of confidentiality, integrity, and networks and their service from
availability of information. In unauthorized modification,
addition, other properties, such destruction, or disclosure, and
as authenticity, accountability, provision of assurance that the
nonrepudiation, and reliability network performs its critical
can also be involved functions correctly and there are
no harmful side effects

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Security Objectives

The cybersecurity definition introduces three key objectives that are


at the heart of information and network security:
 Confidentiality: This term covers two related concepts:
 Data confidentiality: Assures that private or confidential information is not made
available or disclosed to unauthorized individuals
 Privacy: Assures that individuals control or influence what information
related to them may be collected and stored and by whom and to whom
that information may be disclosed

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Security Objectives

 Integrity: This term covers two related concepts:


 Data integrity: Assures that data and programs are changed only in a specified
and authorized manner. This concept also encompasses data authenticity,
which means that a digital object is indeed what it claims to be or what it is
claimed to be, and nonrepudiation, which is assurance that the sender of
information is provided with proof of delivery and the recipient is provided
with proof of the sender’s identity, so neither can later deny having processed
the information
 System integrity: Assures that a system performs its intended function in an
unimpaired manner, free from deliberate or inadvertent unauthorized
manipulation of the system

 Availability: Assures that systems work promptly and service is


not denied to authorized users

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Computer Security Challenges

 Security is not simple  Security mechanisms typically


involve more than a
 Potential attacks on the particular algorithm or
security features need to be protocol
considered
 Security is essentially a battle
 Procedures used to provide of wits between a
particular services are often perpetrator and the designer
counter-intuitive
 Little benefit from security
 It is necessary to decide investment is perceived until
where to use the various a security failure occurs
security mechanisms
 Strong security is often
 Requires constant monitoring viewed as an impediment to
efficient and user-friendly
 Is too often an afterthought operation

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
OSI Security Architecture

Security
Security attack Security service
mechanism

A processing or
A process (or a device communication Intended to counter
Any action that incorporating such a service that enhances security attacks, and
compromises the process) that is they make use of one
the security of the
security of designed to detect, data processing or more security
information owned prevent, or recover systems and the mechanisms to
by an organization from a security attack information transfers provide the service
of an organization

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Threats and Attacks

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Security Attacks

A means of classifying security attacks, used both in


X.800 and RFC 4949, is in terms of passive attacks and
active attacks

A passive attack attempts to learn or make use of


information from the system but does not affect
system resources

An active attack attempts to alter system resources or


affect their operation

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Passive Attacks
Are in the nature of
eavesdropping on, or
monitoring of, transmissions

Goal of the opponent is


to obtain information that  Two types of passive
is being transmitted attacks are:
 The release of message
contents
 Traffic analysis

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Active Attacks

 Involve some modification of • Takes place when one entity


pretends to be a different entity
the data stream or the creation Masquerade • Usually includes one of the other
forms of active attack
of a false stream
 Difficult to prevent because of
the wide variety of potential • Involves the passive capture of a
data unit and its subsequent
physical, software, and network Replay retransmission to produce an
vulnerabilities unauthorized effect

 Goal is to detect attacks and to


recover from any disruption or • Some portion of a legitimate
delays caused by them Data message is altered, or messages
are delayed or reordered to
Modification produce an unauthorized effect

Denial of • Prevents or inhibits the normal use


or management of
service communications facilities

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Authentication
 Concerned with assuring that a communication is
authentic
 In the case of a single message, assures the recipient that the
message is from the source that it claims to be from
 In the case of ongoing interaction, assures the two entities are
authentic and that the connection is not interfered with in
such a way that a third party can masquerade as one of the
two legitimate parties

Two specific authentication services are defined in


X.800:
• Peer entity authentication
• Data origin authentication

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Authentication
 Peer entity authentication
 Provides for the corroboration of the identity of a peer entity in an
association. Two entities are considered peers if they implement the
same protocol in different systems. Peer entity authentication is
provided for use at the establishment of, or at times during the data
transfer phase of, a connection. It attempts to provide confidence
that an entity is not performing either a masquerade or an
unauthorized replay of a previous connection

 Data origin authentication


 Provides for the corroboration of the source of a data unit. It does
not provide protection against the duplication or modification of data
units. This type of service supports applications like electronic mail,
where there are no ongoing interactions between the
communicating entities

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Access Control
 The ability to limit and control the access to host
systems and applications via communications
links

 To achieve this, each entity trying to gain access


must first be indentified, or authenticated, so
that access rights can be tailored to the
individual

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Data Confidentiality
 The protection of transmitted data from passive
attacks
 Broadest service protects all user data transmitted between
two users over a period of time
 Narrower forms of service includes the protection of a single
message or even specific fields within a message

 The protection of traffic flow from analysis


 This requires that an attacker not be able to observe the
source and destination, frequency, length, or other
characteristics of the traffic on a communications facility

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Data Integrity

Can apply to a stream of messages, a single


message, or selected fields within a message

Connection-oriented integrity service, one that


deals with a stream of messages, assures that
messages are received as sent with no duplication,
insertion, modification, reordering, or replays

A connectionless integrity service, one that deals


with individual messages without regard to any
larger context, generally provides protection
against message modification only

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Nonrepudiation

 Prevents either sender or receiver from denying a transmitted


message

 When a message is sent, the receiver can prove that the alleged
sender in fact sent the message

 When a message is received, the sender can prove that the


alleged receiver in fact received the message

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Availability Service

 Protects a system to ensure its availability

 This service addresses the security concerns raised


by denial-of-service attacks

 It depends on proper management and control of


system resources and thus depends on access
control service and other security services

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Security Mechanisms
 Cryptographic algorithms: We can distinguish between reversible cryptographic mechanisms and
irreversible cryptographic mechanisms. A reversible cryptographic mechanism is simply an encryption
algorithm that allows data to be encrypted and subsequently decrypted. Irreversible cryptographic mechanisms
include hash algorithms and message authentication codes, which are used in digital signature and message
authentication applications.

 Data integrity: This category covers a variety of mechanisms used to assure the integrity of a data unit
or stream of data units.

 Digital signature: Data appended to, or a cryptographic transformation of, a data unit that allows a recipient
of the data unit to prove the source and integrity of the data unit and protect against forgery.

 Authentication exchange: A mechanism intended to ensure the identity of an entity by means of


information exchange.

 Traffic padding: The insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
 Routing control: Enables selection of particular physically or logically secure routes for certain data and
allows routing changes, especially when a breach of security is suspected.

 Notarization: The use of a trusted third party to assure certain properties of a data exchange
 Access control: A variety of mechanisms that enforce access rights to resources.

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Keyless Algorithms
 Deterministic functions that have certain properties
useful for cryptography
 One type of keyless algorithm is the cryptographic hash
function
 A hash function turns a variable amount of text into a small, fixed- length
value called a hash value, hash code, or digest
 A cryptographic hash function is one that has additional properties that
make it useful as part of another cryptographic algorithm, such as a
message authentication code or a digital signature

 A pseudorandom number generator produces a


deterministic sequence of numbers or bits that has the
appearance of being a truly random sequence

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Single-Key Algorithms
Encryption
algorithms that use a Symmetric
Single-key encryption takes the
cryptographic single key are
referred to as following forms:
algorithms depend
on the use of a symmetric encryption
secret key algorithms
Block cipher
•A block cipher operates on
With symmetric encryption, an data as a sequence of blocks
encryption algorithm takes as •In most versions of the block
input some data to be protected cipher, known as modes of
and a secret key and produces an operation, the transformation
unintelligible transformation on depends not only on the
that data current data block and the
secret key but also on the
content of preceding blocks
A corresponding decryption
algorithm takes the
transformed data and the
same secret key and recovers
Stream cipher
the original data •A stream cipher operates on data
as a sequence of bits
•As with the block cipher, the
transformation depends on a
secret key

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Single-Key Algorithms
Another form of single-key cryptographic
algorithm is the message authentication code (MAC)

A MAC is a data element associated with a data block or message

The MAC is generated by a cryptographic transformation


involving a secret key and, typically, a cryptographic hash
function of the message

The MAC is designed so that someone in possession of the secret


key can verify the integrity of the message

The recipient of the message plus the MAC can perform the same
calculation on the message; if the calculated MAC matches the MAC
accompanying the message, this provides assurance that the
message has not been altered

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Asymmetric Algorithms
 Encryption algorithms that use a single key are referred to
as asymmetric encryption algorithms

 Digital signature algorithm


 A digital signature is a value computed with a cryptographic
algorithm and associated with a data object in such a way that any
recipient of the data can use the signature to verify the data’s origin
and integrity

 Key exchange
 The process of securely distributing a symmetric key to two or more
parties

 User authentication
 The process of authenticating that a user attempting to access an
application or service is genuine and, similarly, that the application or
service is genuine

Copyright © 2023 Pearson Education, Ltd. All Rights


School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Reserved.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Communications Security

 Deals with the protection of communications through


the network, including measures to protect against
both passive and active attacks
 Communications security is primarily implemented
using network protocols
 A network protocol consists of the format and procedures that
governs the transmitting and receiving of data between points in
a network
 A protocol defines the structure of the individual data units and
the control commands that manage the data transfer

 With respect to network security, a security protocol


may be an enhancement that is part of an existing
protocol or a standalone protocol

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Device Security
 The other aspect of network security is the protection of network devices, such as routers
and switches, and end systems connected to the network, such as client systems and
servers

 The primary security concerns are intruders that gain access to the system to perform
unauthorized actions, insert malicious software (malware), or overwhelm system resources
to diminish availability

 Three types of device security are:


 Firewall
A hardware and/or software capability that limits access between a network and device
attached to the network, in accordance with a specific security policy. The firewall acts as a
filter that permits or denies data traffic, both incoming and outgoing, based on a set of
rules based on traffic content and/or traffic pattern
 Intrusion detection
Hardware or software products that gather and analyze information from various areas
within a computer or a network for the purpose of finding, and providing real-time or near-
real-time warning of, attempts to access system resources in an unauthorized manner
 Intrusion prevention
Hardware or software products designed to detect intrusive activity and attempt to stop
the activity, ideally before it reaches its target

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Trust Model

 One of the most widely accepted and most cited definitions of trust is:
“the willingness of a party to be vulnerable to the actions of
another party based on the expectation that the other will perform
a particular action important to the trustor, irrespective of the ability
to monitor or control that other party”

 Three related concepts are relevant to a trust model:


 Trustworthiness: A characteristic of an entity that reflects the degree to which that entity is
deserving of trust

 Propensity to trust: A tendency to be willing to trust others across a broad spectrum of situations
and trust targets. This suggests that every individual has some baseline level of trust that will
influence the person’s willingness to rely on the words and actions of others

 Risk: A measure of the extent to which an entity is threatened by a potential circumstance or


event, and typically a function of 1) the adverse impacts that would arise if the circumstance or
event occurs; and 2) the likelihood of occurrence

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
The Trust Model and Information Security

Trust is confidence that Trust is always restricted


an entity will perform in a to specific functions or
way that will not ways of behavior and is
prejudice the security of meaningful only in the
the user of the system of context of a security
which that entity is a part policy

In this context, the term


Generally, an entity is entity may refer to a
said to trust a second single hardware
entity when the first component or software
entity assumes that the module, a piece of
second entity will behave equipment identified by
exactly as the first entity make and model, a site or
expects location, or an
organization

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Trustworthiness of an Individual
 Organizations need to be concerned about both internal users (employees, on-site
contractors) and external users (customers, suppliers) of their information systems

 With respect to internal users, an organization develops a level of trust in individuals


by policies in the following two areas:

 Human resource security


o Sound security practice dictates that information security requirements be embedded into
each stage of the employment life cycle, specifying security-related actions required during
the induction of each individual, their ongoing management, and termination of their
employment. Human resource security also includes assigning ownership of information
(including responsibility for its protection) to capable individuals and obtaining confirmation
of their understanding and acceptance

 Security awareness and training


o This area refers to disseminating security information to all employees, including IT staff, IT
security staff, and management, as well as IT users and other employees. A workforce that
has a high level of security awareness and appropriate security training for each individual’s
role is as important, if not more important, than any other security countermeasure or
control

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Trustworthiness of an Organization
 Most organizations rely on information system service and information
provided by external organizations, as well as partnerships to accomplish
missions and business functions (examples are cloud service providers
and companies that form part of the supply chain for the organization)

 To manage risk to the organization, it must establish trust relationships


with these external organizations

 NIST SP 800-39 (Managing Information Security Risk, March 2011)


indicates that such trust relationships can be:
 Formally established, for example, by documenting the trust-related
information in contracts, service-level agreements, statements of work,
memoranda of agreement/understanding, or interconnection security
agreements
 Scalable and inter-organizational or intra-organizational in nature
 Represented by simple (bilateral) relationships between two partners or more
complex many-to-many relationships among many diverse partners

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Trustworthiness of Information Systems

 SP 800-39 defines trustworthiness for information


systems as
“the degree to which information systems (including the information
technology products from which the systems are built) can be expected
to preserve the confidentiality, integrity, and availability of the
information being processed, stored, or transmitted by the systems
across the full range of threats”

 Two factors affecting the trustworthiness of


information systems are:
 Security functionality: The security features/functions employed
within the system. These include cryptographic and network
security technologies
 Security assurance: The grounds for confidence that the security
functionality is effective in its application. This area is addressed
by security management techniques, such as auditing and
incorporating security considerations into the system
development life cycle

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Establishing Trust Relationships
Direct historical
Validated trust: trust: Mediated trust: Mandated trust:

• Trust is based • This type of • Mediated trust • An


on evidence trust is based involves the organization
obtained by on the security- use of a third establishes a
the trusting related track party that is level of trust
organization record mutually with another
about the exhibited by an trusted by two organization
trusted organization in parties, with based on a
organization or the past, the third party specific
entity. The particularly in providing mandate
information interactions assurance or issued by a
may include with the guarantee of a third party in a
information organization given level of position of
security policy, seeking to trust between authority
security establish trust the first two
measures, and parties
level of
oversight

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Standards

National Institute of Standards and Technology:


• NIST is a U.S. federal agency that deals with measurement science, standards, and technology related to U.S. government use and
to the promotion of U.S. private-sector innovation. Despite its national scope, NIST Federal Information Processing Standards (FIPS)
and Special Publications (SP) have a worldwide impact

Internet Society:
•ISOC is a professional membership society with worldwide organizational and individual membership. It provides leadership in
addressing issues that confront the future of the Internet and is the organization home for the groups responsible for Internet
infrastructure standards, including the Internet Engineering Task Force (IETF) and the Internet Architecture Board (IAB). These
organizations develop Internet standards and related specifications, all of which are published as Requests for Comments (RFCs).

ITU-T:
•The International Telecommunication Union (ITU) is an international organization within the United Nations System in which
governments and the private sector coordinate global telecom networks and services. The ITU Telecommunication Standardization
Sector (ITU-T) is one of the three sectors of the ITU. ITU-T’s mission is the development of technical standards covering all fields of
telecommunications. ITU-T standards are referred to as Recommendations

ISO:
•The International Organization for Standardization (ISO) is a worldwide federation of national standards bodies from more than 140
countries, one from each country. ISO is a nongovernmental organization that promotes the development of standardization and
related activities with a view to facilitating the international exchange of goods and services and to developing cooperation in the
spheres of intellectual, scientific, technological, and economic activity. ISO’s work results in international agreements that are
published as International Standards

Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.


School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography
Summary
 Describe the key  Provide an overview of the
security requirements of main areas of network
confidentiality, integrity, security
and availability
 Describe a trust model for
 List and briefly describe information security
key organizations
involved in cryptography
standards  Discuss the types of
security threats and
attacks that must be dealt
 Provide an overview of with and give examples of
keyless, single-key and the types of threats and
two-key cryptographic attacks that apply to
algorithms different categories of
computer and network
assets

School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.

You might also like