0% found this document useful (0 votes)
120 views25 pages

Chapter 1 - Introduction To Network Security

The document discusses the DFS 4133 Computer Network Security course. It provides an overview of the course including prerequisites, credits, and topics to be covered. The topics include introductions to network security, vulnerabilities and threats, security devices and technologies, hardening operating systems, and physical security. Learning outcomes for understanding network security are also presented.

Uploaded by

business deal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views25 pages

Chapter 1 - Introduction To Network Security

The document discusses the DFS 4133 Computer Network Security course. It provides an overview of the course including prerequisites, credits, and topics to be covered. The topics include introductions to network security, vulnerabilities and threats, security devices and technologies, hardening operating systems, and physical security. Learning outcomes for understanding network security are also presented.

Uploaded by

business deal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

DFS 4143

COMPUTER NETWORK SECURITY


COURSE : DFS 4133
COMPUTER NETWORK SECURITY

PRE REQUISITE(S): DFT 3133 COMPUTER NETWORK


CREDIT(S) : 3

INTRO
COMPUTER NETWORK SECURITY course is designed
to focus on the overall security processes based on security
policy emphasizing on hands-on skills in the areas of a
secure perimeter, secure connectivity, identity services and
intrusion detection. The knowledge delivered shall enable
students to identify some of the security approaches to
design a defensive strategy in a computer network
environment. Discussion on the security features of
Microsoft Windows Server and Open Source Software
network operating systems are also included.

SYNOPSIS
TOPIC
INTRODUCTION TO COMPUTER This topic introduces the importance
NETWORK SECURITY of network security.
Students are introduced to identifying
security models that
involves in computer network security.
VULNERABILITIES, THREATS This topic provides an overview of
AND ATTACKS essential network security
concepts, common vulnerabilities,
threats, attacks and
vulnerability analysis. This topic
introduces students on network
vulnerabilities assessment using
various of tools.

TOPIC
TOPIC
SECURITY DEVICES AND This topic covers perimeter security devices
TECHNOLOGIES such as packet
filters in firewalls, Intrusion Detection
System (IDS), Intrusion
Prevention System (IPS), proxy server and
bastion host. This
topic covers viruses, Trojan Horses, and
worms and explains
what they can do to the system. Different
methods of protection
are also covered in the topic. It also covers
VPN topics.
HARDENING OPERATING SYSTEMS This topic covers the following areas:
Microsoft Windows
security approaches and Linux security
approaches. This topic
also covers on Kerberos authentication and
domain security.
PHYSICAL SECURITY This topic deals with hardening
physical security. It also
discusses about hardening devices
such as modem, routers and
wireless network.
DFS 4133
Computer
Network Security
Chapter 1:
INTRODUCTION TO COMPUTER
NETWORK SECURITY
Understand the need for network security.
• Identify the important requirements of network security
• Describe the need for network security.
• Identify potential risks to network security.
• Describe the goals of Network Security.
• Explain Open Security Models.
• Explain Restrictive Security Models.
• Explain Closed Security Models.
• Identify Legal Issues and Privacy Concerns.

Learning Outcomes:
• Network security consists of the provisions and
policies adopted by a network administrator to
prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and
network-accessible resources.
• Protection of network & their services
• Protects from: unauthorized modification,
destruction, disclosure
• Ensures the network performs it functions correctly
& no harmful side effect

Network Security Definition


• Network security starts from authenticating the user.
• Firewall enforces access policies such as what services are allowed
to be accessed by the network users
• Anti-virus software or an intrusion prevention system (IPS) help
detect and inhibit the action of such malware. An anomaly-based
intrusion detection system may also monitor the network and traffic
for unexpected content or behavior and other anomalies to protect
resources
• Individual events occurring on the network may be logged for audit
purposes and for later high level analysis.
• Communication between two hosts using a network could be
encrypted to maintain privacy.

The important of Network Security


and Concepts
When developing a secure network, the following need to be
considered:
1. Access – authorized users are provided the means to
communicate to and from a particular network
2. Confidentiality – Information in the network remains private
3. Authentication – Ensure the users of the network are who
they say they are
4. Integrity – Ensure the message has not been modified in
transit
5. Non‐repudiation – Ensure the user does not refute that he
used the network

The need for Network Security


Email Attachments -- Workers opening an attachment could unleash a
worm or virus onto the corporate network.

Diversionary Tactics -- Hackers may strike a set of servers in a target


company. When security administrators are busy recovering the
services, they slip in and attack another part of the network.

Blended Attacks -- Worms and viruses are becoming more


complicated, and now a single one may be able to execute itself or
even attack more than one platform.

Renaming Documents -- Monitoring software that checks emails


leaving the company might fail to pick up on the outgoing message if
the subject name has been changed.

Potential Risk to Network Security


SECURITY GOAL

ASSET THREAT RISK


IDENTIFICATION ASSESSMENT ASSESSMENT

The goals of Network Security


The following list is the network resources that need to be
protected from various types of attacks:

• Network equipment such as routers, switches, and firewalls


• Information and the information sources connected to the
network, such as databases and information servers
• involve tagging each physical (router, computers) and intangible
asset (database content).
• With a physical label (frequently with a bar code) or a tag with
RFID (Radio Frequency Identification) we can tag physical assets.
• Assets loss can be compromised by the competitors to take
advantage over a company.

Asset Identification
- Threat is a possible danger that might exploit a vulnerability to breach
security and cause possible harm.
- Involve listing all possible threat that can occur in an organization. Example
list of sources of threats could include:
• The ex-employee who desires revenge.
• The deliberate cyber-spy looking to accumulate competitive information
on your company that he can use to improve his own company’s
positioning.
• The employee who doesn’t know that email attachments ending in “.exe”
should not be opened without the system administrator’s permission.
• Unauthorized access to resources or information through the use of a
network
• Unauthorized manipulation and alteration of information on a network
• Denial of service

Threat Assessment
Types of Threats
Understanding where your risks exist, and the best
way to control them is critical to your business. It is a
good practice to make a yearly risk assessment.

• Internal Network Risk Assessment


• External Network Risk Assessment
• Internet Penetration Test
• Mobile Device Risk Assessment
• Firewall Penetration Test
• Database Risk Assessment

Risk Assessment
A risk assessment can protect your business from:

• Critical Business  Data Leaks


• Risks From Mis-Configured Firewalls
• Computer Viruses  and Malicious Applications
(Malware)
• Mobile Device Risks and Data Loss
• Social Media Risks

Risk Assessment
• Is the easiest to implement
• Few security measures are implemented.
• Foundation: simple passwords and server security
• This model assumes that users are trusted,
protected assets are minimal and threats are also
minimal.
• Gives users free access to all areas and security
breaches are not likely to result in great damage and
loss.
• But this model also implement data backup system
in most cases.

Open Security Model


• More difficult to implement
• More security measures are implemented.
• Foundation: firewalls and identity servers.
• This model assumes that protected assets are
substantial, some users are not trustworthy and
threats are likely to occur.
• LANs that are connected to the Internet or public
WANs are more likely to implement this type of
model.

Restrictive Security Model


• Most difficult to implement
• All security measures are implemented
• Assumes that the protected assets are premium, all
users are not trustworthy and threats are frequent.
• User access is difficult and cumbersome
• Companies require high number and better trained
network administrator to maintain tight security.
• Network administrator also may require greater
skills and more time to administer the network.

Closed Security Model


• Legal issues: information theft (trademark, trade
secret)

• Privacy concerns: confidentiality of transmitted


data, spyware program.
Task: Please find the
current issues and
privacy concerns in
Computer Network
Security !

Legal Issues and Privacy Concerns


Continue Next Class…..

You might also like