0% found this document useful (0 votes)
94 views19 pages

Network and Information Security: Unit 1 Introduction

This document discusses network and information security. It defines computer security as protecting data and thwarting hackers using automated tools on a time-sharing system. Network security, also called internet security, involves protecting data transmission between computers over networks and communications facilities. The main goal of internet security is to determine, detect, prevent and correct security violations during information transmission. Examples of security violations include unauthorized interception or modification of transmitted files or messages. The document outlines passive attacks like eavesdropping and traffic analysis, and active attacks like masquerading, replaying, modifying, and denying service.

Uploaded by

Pavan Kumar N
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views19 pages

Network and Information Security: Unit 1 Introduction

This document discusses network and information security. It defines computer security as protecting data and thwarting hackers using automated tools on a time-sharing system. Network security, also called internet security, involves protecting data transmission between computers over networks and communications facilities. The main goal of internet security is to determine, detect, prevent and correct security violations during information transmission. Examples of security violations include unauthorized interception or modification of transmitted files or messages. The document outlines passive attacks like eavesdropping and traffic analysis, and active attacks like masquerading, replaying, modifying, and denying service.

Uploaded by

Pavan Kumar N
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 19

NETWORK AND

INFORMATION SECURITY
UNIT 1 INTRODUCTION
INTRODUCTION

INFORMATION SECURITY

Before introduction of computers for data processing

Physical and Administrative Security

Introduction of computers for data processing

Automated tools for protecting files and other information


stored on the computer became evident
Two Types of Security
1. Information Shared in time sharing system
Easy access through Public Telephone lines or data
network
The collection of tools designed to protect data and to
thwart hackers is Computer Security
2. Introduction of distributed systems and the use of
networks and communications facilities for carrying
data between computer and computer may be known
as network security - Internet Security.
There is no clear boundary between the two types of
security
• The main aim of internet security is to
determine, detect, prevent and correct
security violations that involve the
transmission of information
Examples of Security Violation
1. User A transmits a file to user B. The file
contains sensitive information ( Payroll
information). User C should not capture the
information(who is not authorized to read the
information
Examples of Security Violation
2. A network management application, D
transmits a message to a computer E, under is
management. The message instructs computer
E to update an authorization file to include the
identities of a number of new users who are to
be given access to that computer. User F
intercepts the message, alters its contents to
add or delete entries and then forwards the
message to E.
3. User F constructs its own message with the
desired entries and transmits that message to E
as if it had come from manager D.
Attacks, Services, Mechanisms
Three aspects of Information security
Security Attack
Any action that compromises the security of
information owned by an organization
Security mechanism
A mechanism that is designed to detect,
prevent or recover from a security attack
Security Service
A service that enhances the security of the
data processing systems and the information
transfers of an organization
SECURITY ATTACKS

NORMAL FLOW
INTERUPTION
INTERCEPTION
MODIFICATION
FABRICATION
Passive Attacks
Passive attacks are in the nature of eavesdropping on, or monitoring
of, transmissions.
The goal of the opponent is to obtain information that is being
transmitted.

Two types of passive attacks are release of message contents and


traffic analysis.
Release of message

A telephone conversation, an electronic mail message, and a


transferred file may contain sensitive or confidential information. We
would like to prevent an opponent from learning the contents of
these transmissions.
Traffic analysis
A second type of passive attack, traffic analysis, is subtler. Suppose
that we had a way of masking the contents of messages or other
information traffic so that opponents, even if they captured the
message, could not extract the information from the message. The
common technique for masking contents is encryption
Active attacks involve some modification of the data stream or the
creation of a false stream and can be subdivided into four categories:
masquerade, replay, modification of messages, and denial of
service.

A masquerade attack usually includes one of the other forms of active


attack. For exampIe,
authentication sequences can be captured and repIayed after a valid
authentication sequence has taken pIace,
thus enabiing an authorized entity with few privileges to obtain extra
privileges by impersonating an entity that has those privileges.

Replay involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect.
Modification of messages simpIy means that some portion of a Iegitimate
message is altered, or that messages are deIayed or reordered, to
produce an unauthorized effect.

The denial of service prevents or inhibits the normal use or


management of communications facilities

You might also like