0% found this document useful (0 votes)
58 views21 pages

Introduction To Course: Network Security

Uploaded by

maryam fiaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views21 pages

Introduction To Course: Network Security

Uploaded by

maryam fiaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Introduction to Course

Network Security

1
Introduction to Course
Objectives of the
Topic
• After completing this
topic, a student will
be able to
– get motivated,
describe learning
outcomes and
describe the text
and references
books.
2
Introduction to Course
Motivation
• Before the
widespread use of
data processing
equipment, security
of information was
provided primarily by
physical and
administrative means.
• E.g. rugged filing
cabinets with locks
3
Introduction to Course
• Requirements for
information security
have undergone two
major changes:
• a) As the computers
were introduced, a
need for protecting
information stored on
the shared computers
was felt – Computer
Security.
4
Introduction to Course
• b) As networks and
communications
facilities for carrying
data from one
computer to another
were introduced, a
need for protecting
data during their
transmission was felt
– Network or Internet
security.

5
Introduction to Course
Stored data:
• Business data must
not be leaked to
competitors
• Personal information
• Copyrighted software

6
Introduction to Course
Security Violations:
Some Examples
• User A transmits a file
to user B. User C, who
is not authorized to
read the file, is able to
capture a copy of the
file during its
transmission –
eavesdropping

7
Introduction to Course
• User D transmits a
message to a
computer E. User F
intercepts the
message, alters its
contents and then
forwards the message
to E, which accepts
the message as
coming from D – Man-
in-the-middIe Attacks.

8
Introduction to Course
• It is also possible that
user F constructs its
own message and
transmits that
message to E as if it
had come from
computer D.

9
Introduction to Course
Some Other
Common attacks
• Cryptanalysis
• Password Pilfering
• Intrusion
• Denial of Service
Attacks
• Malicious software

10
Introduction to Course
Security Breaches
can result in
• Financial loss for
corporations
• Theft of intellectual
property
• Lawsuits
• Threat to public safety

11
Introduction to Course
• The field of network
and Internet security
consists of measures
to deter, prevent,
detect, and correct
security violations
that involve the
transmission of
information.

12
Introduction to Course
Required Books
• W. Stallings, “Network
Security Essentials:
Applications and
Standards”, Pearson
Education, 2014
• “CCNA Security 1.1
Student Packet Tracer
Manual ” Cisco
Networking Academy,
2012
13
Introduction to Course
Reference Books
• W. Stallings,
“Cryptography and
Network Security
Principles and
Practice”, Pearson
Education, 2014

14
Introduction to Course
Course Composition:
Two parts
• Part 1 will provide a
practical survey of
network security
applications and
standards.
• It has been sub-
divided into 3
subparts.

15
Introduction to Course
Subpart1:
Cryptography
• Symmetric Encryption
principles
• Public-Key
Cryptography and
message
authentication

16
Introduction to Course
Subpart2: Network
Security Applications
• Key distribution and
user authentication
• Network Access
Control and cloud
Security
• Transport-level
Security
• Wireless Net. Security

17
Introduction to Course
Subpart2: Network
Security Applications
• Electronic Mail
Security
• IP Security

18
Introduction to Course
Subpart3: System
Security
• Malicious Software
• Intrusions
• Firewalls

19
Introduction to Course
• In Part 2, we will
perform lab
experiments to
configure networks
employing Cisco
components for
various security
aspects.
• Packet Tracer will be
used.

20
Introduction to Course
Grading Policy
• Assignments + Quizzes
= 15%
• Mid Term Exam = 35%
• Final Term Exam =
50%

End

21

You might also like