Network Security
Network Security
COURSE CONTENT
Network security and cryptographic protocols. Network vulnerabilities, attacks on TCP/IP, network
monitoring, security at the link, network and transport layers. Cryptography eg secret and public key
schemes; message authentication codes and key management. WLAN security, IPSec, SSL and VPNs.
Email security (PGP, S/MIME), Kerberos,X.509 certificates, AAA and mobile IP, SNMP security, firewalls,
filters and gateways. Policies and implementation of firewall policies, stateful firewalls, firewall
appliances. Network – related physical security, risk management and disaster recovery/contingency
planning issues and house keeping procedures.
ASSESSMENT
Exams (70%)
Three hours paper (four questions answer three(3) only, one compulsory.
Topics
References
Charles P. Pleeger, Shari L. Pfleeger, Security in Computing, Fourth Edition, Prentice Hall, 2007
William Stallings, Cryptography and Network Security, 4/E, Prentice Hall, 2006
Forouzan, B., Cryptography and Network Security, 1st ed, MacGraw- Hill, 2007
William Stallings, Network Security Essentials 2/3 Edition, , Prentice Hall, 2002/07
E – books.
Richard Conway, Code Hacking: A Developer’s Guide to Network Security, Charles River Media,
20004
Eric Cole, Network Security Bible, 2005
7 titles when you search for crytography
Today’s Agenda
If we put these two definitions together we can come up with a definition of information
security:
“Measures adopted to prevent the unauthorized use, misuse, modification, or denial of use
of knowledge, facts, data, or capabilities”.
However, there are various concepts of security solutions and none of the solutions by
themselves solved all of the security problems.
In fact, good security actually is a mix of all of these solutions. Such as:
Good physical security is necessary to protect physical assets like paper records and
systems.
Communication security (COMSEC) is necessary to protect information in transit.
Emission security (EMSEC) is needed when the enemy has significant resources to
read the electronic emissions from our computer systems.
Computer security (COMPUSEC) is necessary to control access on our computer
systems and
Network security (NETSEC) is needed to control the security of our local area
networks.
Together, all of these concepts provide information security (INFOSEC).
Therefore, Information security is the name given to the preventative steps we take to
guard our information and our capabilities. We guard these things against threats, and
we guard them from the exploitation of a vulnerability.
However, this definition of information security does not guarantee protection. Thus,Information
security cannot guarantee protection.
Security properties
In order to protect IT systems we need to ensure the following properties:
Availability
Accountability
That assumption creates a false sense of security , and having a false sense of security is worse than
having no security at all.
2. Bruce Schneider in 1995 stated that * it is insufficient to protect ourselves with laws, we need
to protect ourselves with mathematics.
3. In 2000 he however stated that: it was naïve to consider the cryptography as alone providing
absolute protection.
4. Also he said” if you think technology can solve your security problems, then you don’t
understand the problems and you don’t understand the technology.”
FUNDAMENTALLY:
TECHNICALLY:
Remember
Computer security rests on confidentiality, integrity, and availability. The interpretations of these
three aspects vary, as do the contexts in which they arise. The interpretation of an aspect in a
given environment is dictated by the needs of the individuals, customs, and laws of the particular
organization.
Confidentiality
Confidentiality is the concealment of information or resources. The need for keeping information
secret arises from the use of computers in sensitive fields such as government and industry.
Access control mechanisms support confidentiality.
One access control mechanism for preserving confidentiality is cryptography, which scrambles
data to make it incomprehensible.
Integrity
Integrity refers to the trustworthiness of data or resources, and it is usually phrased in terms of
preventing improper or unauthorized change. Integrity includes data integrity (the content of the
information) and origin integrity (the source of the data, often called authentication). The source
of the information may bear on its accuracy and credibility and on the trust that people place in
the information.
EXAMPLE: A newspaper may print information obtained from a leak at the Aso Rock but
attribute it to the wrong source. The information is printed as received (preserving data integrity),
but its source is incorrect (corrupting origin integrity).
Availability
Availability assures that a system’s authorized users have timely and uninterrupted access to the
information in the system and to the network.
Availability refers to the ability to use the information or resource desired. Availability is an
important aspect of reliability as well as of system design
Lecture 2
Vulnerabilities are not just related to computer systems and networks. Physical site
security, employee issues, and the security of information in transit must all be
examined.
A threat to a network is a set of circumstances that has the potential to cause loss or harm.
A threat is an action or event that might violate the security of an information systems
environment.
There are three components of threat:
1. Targets The aspect of security that might be attacked.
2. Agents The people or organizations originating the threat.
An agent must have three characteristics:
Access The ability an agent has to get to the target.
Knowledge The level and type of information an agent has about the target.
Motivation The reasons an agent might have for posing a threat to the target.
3. Events The type of action that poses the threat.
To completely understand the threats to an organization, all three components must be
examined.
The diagram below shows the difference between a threat and a vulnerability,
Here, a wall is holding water back.
The water to the left of the wall is a threat to the man on the right of the wall: The water could
rise, overflow, or it could stay beneath the height of the wall, causing the wall to collapse.
the threat is the potential of the man to get wet, get hurt, or be drowned. For now, the wall is
intact, so the threat to the man is unrealized.
However, the small crack in the wall is referred to as a vulnerability that threatens the man's
security.
If the water rises to or beyond the level of the crack, it will exploit the vulnerability and harm the
man.
How do we address these problems? We use a control as a protective measure. That is,
a control is an action, device, procedure, or technique that removes or reduces a
vulnerability