0% found this document useful (0 votes)
32 views

Module7 7

This document provides an overview of basic network security terminology and concepts. It discusses security at the application layer using protocols like PGP and HTTPS, at the transport layer using TLS and SSL, and at the network layer using IPsec. It then defines six basic security properties: confidentiality, authenticity, integrity, availability, non-repudiation, and access control. The document concludes with a brief explanation of how encryption provides confidentiality and MAC/digital signatures provide authentication and integrity.

Uploaded by

Harpreet Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

Module7 7

This document provides an overview of basic network security terminology and concepts. It discusses security at the application layer using protocols like PGP and HTTPS, at the transport layer using TLS and SSL, and at the network layer using IPsec. It then defines six basic security properties: confidentiality, authenticity, integrity, availability, non-repudiation, and access control. The document concludes with a brief explanation of how encryption provides confidentiality and MAC/digital signatures provide authentication and integrity.

Uploaded by

Harpreet Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Module 7.

7
Basic Terminologies
Network Security
Application layer
E-mail: PGP, using a web-of-trust
Web: HTTP-S, using a certificate hierarchy
Transport layer
Transport Layer Security/ Secure Socket
Layer
Network layer
IP Sec
Network infrastructure
DNS-Sec and BGP-Sec
2
Basic Security Properties
Confidentiality:

Authenticity:

Integrity:

Availability:

Non-repudiation:

Access control:

3
Basic Security Properties
Confidentiality: Concealment of information or resources

Authenticity: Identification and assurance of origin of


info
Integrity: Trustworthiness of data or resources in terms of
preventing improper and unauthorized changes
Availability: Ability to use desired information or
resource
Non-repudiation: Offer of evidence that a party indeed
is sender or a receiver of certain information
Access control: Facilities to determine and enforce who
is allowed access to what resources (host, software,
network, )
4
Encryption and
MAC/Signatures
Confidentiality (Encryption)Auth/Integrity (MAC / Signature)
Sender: Sender:
Compute C = EncK(M) Compute s = SigK(Hash (M))
Send C Send <M, s>
Receiver: Receiver:
Recover M = DecK(C) Compute s = VerK(Hash (M))
Check s == s

These are simplified forms of the actual


algorithms
5

You might also like