SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
NETWORK SECURITY
3/14/20191
Presented By,
S.Karthika,
II-Msc.,Computer Science,
Bon Secours College.
Computer Security - also known as cyber
security or IT security, is the protection
of computer systems from the theft or damage to
their hardware, software or information, as well as
from disruption or misdirection of the services they
provide.
Network Security - measures to protect data during
their transmission
Internet Security - measures to protect data during
their transmission over a collection of interconnected
networks which consists of measures to deter,
prevent, detect, and correct security violations that
involve the transmission & storage of information
INTEGRITY
CONFIDENTIALITY
AVAILABILITY
1.CONFIDENTIALITY
• Confidentiality refers to protecting
information from being accessed by
unauthorized parties. In other words,
only the people who are authorized to do
so can gain access to sensitive data.
• Imagine your bank records. You should
be able to access them, of course, and
employees at the bank who are helping
you with a transaction should be able to
access them, but no one else should.
2. INTEGRITY
• The second goal of Network Security is
"Integrity". Integrity aims at maintaining
and assuring the accuracy and consistency
of data.
• The function of Integrity is to make sure
that the data is accurate and reliable and is
not changed by unauthorized persons or
hackers.
• The data received by the recipient must be exactly
same as the data sent from the sender, without change
in even single bit of data.
• cryptography plays a very major role
in ensuring data integrity.
3. AVAILABILITY
Availability: The third goal of network security is
"Availability".
Availability of information refers to ensuring that
authorized parties are able to access the information when
needed.
Information only has value if the right people can access it
at the right times. Denying access to information has
become a very common attack nowadays.
How does one ensure data availability? Backup is key.
Regularly doing off-site backups can limit the damage
caused by damage to hard drives or natural disasters.
LEVELS OF IMPACT
➢ We can define 3 levels of impact from a security
breach
⚫Low
⚫Moderate
⚫High
LOW IMPACT
 The loss could be expected to have a limited
adverse effect on organizational operations,
organizational assets, or individuals.
 The loss of confidentiality, integrity, or availability
might
(i) minor damage to organizational assets;
(ii) minor financial loss; or
(iii) minor harm to individuals.
Moderate Impact
 The loss could be expected to have a serious adverse
effect on organizational operations, organizational
assets, or individuals.
 A serious adverse effect means that, for example, the
loss might
(i) the functions is significantly reduced;
(ii) result in significant damage to organizational
assets;
(iii) result in significant financial loss; or
(iv) result in significant harm to individuals that does
not involve loss of life or serious, life-threatening
injuries.
High Impact
 The loss could be expected to have a severe or
catastrophic adverse effect on organizational
operations, organizational assets, or individuals.
 A severe or catastrophic adverse effect means that,
for example, the loss might
(i) cause a severe degradation
(ii) result in major damage to organizational
assets;
(iii) result in major financial loss; or
(iv) result in severe or catastrophic harm to
individuals involving loss of life or serious life
threatening injuries.
Challenges of Computer Security
1. Computer security is not simple
2. One must consider potential (unexpected) attacks
3. Procedures used are often counter-intuitive
4. Must decide where to deploy mechanisms
5. Involve algorithms and secret info (keys)
6. A battle of wits between attacker / admin
7. It is not perceived on benefit until fails
8. Requires constant monitoring
9. Too often an after-thought (not integral)
10. Regarded as impediment to using system
Aspects of Security
The 3 aspects of information security:
Security Attack
Security Mechanism
Security Service
 Security attack: Any action that compromises the security
of information owned by an organization.
 • Security mechanism: A process (or a device) that is
designed to detect, prevent, or recover from a security
attack.
 • Security service: A processing or communication service
that enhances the security of the data processing systems
and the information transfers of an organization.
 Attack - An assault on system security that derives
from an intelligent threat; that is, an intelligent act that
is a deliberate attempt (especially in the sense of a
method or technique) to evade security services and
violate the security policy of a system. There are two
types of attacks.
 1. Passive Attack 2. Active Attack
Handling AttacksPassive attacks – A passive attack
attempts to learn or make use of
information from the system but
does not affect system resources.
Passive attacks are in the nature of
eavesdropping on, or monitoring of,
transmissions.
These attacks are difficult to detect
because they do not involve any
alteration of the data.
Passive Attack - Interception
release of message
contents
Passive Attack: Traffic Analysis
Observe traffic pattern
Traffic analysis - monitor traffic flow to
determine location and identity of
communicating hosts and could observe the
frequency and length of messages being
exchanged
Active Attack
Active attacks involve some modification
of the data stream or the creation of a
false stream
It can be subdivided into four categories:
masquerade, replay, modification of
messages, and denial of service:
• Masquerade of one entity as some other
• Replay previous messages
• Modify/alter (part of) messages in transit
to produce an unauthorized effect
• Denial of service - prevents or inhibits
the normal use or management of
Active Attack: Interruption
Block delivery of message
Active Attack: Fabrication
Fabricate message
Active Attack: Replay
Active Attack: Modification
Modify message
Model for Network Security
This general model shows that there are four basic tasks in designing a particular security service.
1. Design a suitable algorithm for the security
transformation
2. Generate the secret information (keys)
used by the algorithm
3. Develop methods to distribute and share
the secret information
4. Specify a protocol enabling the principles to
use the transformation and secret information
for a security service
Model for Network Access
Security
using this model requires us to:
1. select appropriate gatekeeper
functions to identify users
2. implement security controls to
ensure only authorised users access
designated information or resources
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur

Contenu connexe

Tendances

2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
anjalee990
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
guest34b014
 

Tendances (20)

Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
06. security concept
06. security concept06. security concept
06. security concept
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Ch01 overview nemo
Ch01 overview nemoCh01 overview nemo
Ch01 overview nemo
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Information security
Information securityInformation security
Information security
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 

Similaire à S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur

Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
shahadd2021
 
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
Shanmuganathan C
 

Similaire à S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur (20)

Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security
Information securityInformation security
Information security
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network security
 
Module -5 Security.pdf
Module -5 Security.pdfModule -5 Security.pdf
Module -5 Security.pdf
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 
ch01_overview.ppt
ch01_overview.pptch01_overview.ppt
ch01_overview.ppt
 
ch01_overview.ppt
ch01_overview.pptch01_overview.ppt
ch01_overview.ppt
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Website security
Website securityWebsite security
Website security
 
Cyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptCyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .ppt
 
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptxCH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 

Dernier

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Dernier (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur

  • 2. Computer Security - also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. Network Security - measures to protect data during their transmission
  • 3. Internet Security - measures to protect data during their transmission over a collection of interconnected networks which consists of measures to deter, prevent, detect, and correct security violations that involve the transmission & storage of information
  • 5. 1.CONFIDENTIALITY • Confidentiality refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data. • Imagine your bank records. You should be able to access them, of course, and employees at the bank who are helping you with a transaction should be able to access them, but no one else should.
  • 6. 2. INTEGRITY • The second goal of Network Security is "Integrity". Integrity aims at maintaining and assuring the accuracy and consistency of data. • The function of Integrity is to make sure that the data is accurate and reliable and is not changed by unauthorized persons or hackers.
  • 7. • The data received by the recipient must be exactly same as the data sent from the sender, without change in even single bit of data. • cryptography plays a very major role in ensuring data integrity.
  • 8. 3. AVAILABILITY Availability: The third goal of network security is "Availability". Availability of information refers to ensuring that authorized parties are able to access the information when needed. Information only has value if the right people can access it at the right times. Denying access to information has become a very common attack nowadays. How does one ensure data availability? Backup is key. Regularly doing off-site backups can limit the damage caused by damage to hard drives or natural disasters.
  • 9. LEVELS OF IMPACT ➢ We can define 3 levels of impact from a security breach ⚫Low ⚫Moderate ⚫High
  • 10. LOW IMPACT  The loss could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.  The loss of confidentiality, integrity, or availability might (i) minor damage to organizational assets; (ii) minor financial loss; or (iii) minor harm to individuals.
  • 11. Moderate Impact  The loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.  A serious adverse effect means that, for example, the loss might (i) the functions is significantly reduced; (ii) result in significant damage to organizational assets; (iii) result in significant financial loss; or (iv) result in significant harm to individuals that does not involve loss of life or serious, life-threatening injuries.
  • 12. High Impact  The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.  A severe or catastrophic adverse effect means that, for example, the loss might (i) cause a severe degradation (ii) result in major damage to organizational assets; (iii) result in major financial loss; or (iv) result in severe or catastrophic harm to individuals involving loss of life or serious life threatening injuries.
  • 13. Challenges of Computer Security 1. Computer security is not simple 2. One must consider potential (unexpected) attacks 3. Procedures used are often counter-intuitive 4. Must decide where to deploy mechanisms 5. Involve algorithms and secret info (keys) 6. A battle of wits between attacker / admin 7. It is not perceived on benefit until fails 8. Requires constant monitoring 9. Too often an after-thought (not integral) 10. Regarded as impediment to using system
  • 14. Aspects of Security The 3 aspects of information security: Security Attack Security Mechanism Security Service  Security attack: Any action that compromises the security of information owned by an organization.  • Security mechanism: A process (or a device) that is designed to detect, prevent, or recover from a security attack.  • Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.
  • 15.  Attack - An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. There are two types of attacks.  1. Passive Attack 2. Active Attack
  • 16. Handling AttacksPassive attacks – A passive attack attempts to learn or make use of information from the system but does not affect system resources. Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. These attacks are difficult to detect because they do not involve any alteration of the data.
  • 17. Passive Attack - Interception release of message contents
  • 18. Passive Attack: Traffic Analysis Observe traffic pattern Traffic analysis - monitor traffic flow to determine location and identity of communicating hosts and could observe the frequency and length of messages being exchanged
  • 19. Active Attack Active attacks involve some modification of the data stream or the creation of a false stream It can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service: • Masquerade of one entity as some other • Replay previous messages • Modify/alter (part of) messages in transit to produce an unauthorized effect • Denial of service - prevents or inhibits the normal use or management of
  • 20. Active Attack: Interruption Block delivery of message
  • 24. Model for Network Security This general model shows that there are four basic tasks in designing a particular security service. 1. Design a suitable algorithm for the security transformation 2. Generate the secret information (keys) used by the algorithm 3. Develop methods to distribute and share the secret information 4. Specify a protocol enabling the principles to use the transformation and secret information for a security service
  • 25. Model for Network Access Security using this model requires us to: 1. select appropriate gatekeeper functions to identify users 2. implement security controls to ensure only authorised users access designated information or resources