Chapter-1
Chapter-1
Network Security
02/28/2025 1
Outline
What is Security?
Why Security?
Security Policy and Mechanism
Security trend
Sources and consequences of risks
Types of Vulnerabilities
Security criteria
Security attack types
Security services, mechanisms and model
02/28/2025 2
Chapter Objectives
02/28/2025 4
What is Security?...
Security:
02/28/2025 5
What is Security?...
Rule:
computing practices .
02/28/2025 8
Why Security?...
90%.
02/28/2025 9
Why Security?...
What Does This Mean for Me?
02/28/2025 10
Computer security
Basic components
• Confidentiality
Av
ity
• Integrity
ai l
gr
Security
te
ab
objectives
• Availability
In
ili
ty
CIA triad
Confidential
ity
11
Confidentiality
• Enciphering an income tax return will prevent anyone from reading it.
• If the owner needs to see the return, it must be deciphered.
• Only the possessor of the cryptographic key can enter it into a deciphering
program.
• However, if someone else can read the key when it is entered into the
program, the confidentiality of the tax return has been compromised.
• All the mechanisms that enforce confidentiality require supporting services
from the system.
• The assumption is that the security services can rely on the kernel, and other
agents, to supply correct data.
• Thus, assumptions and trust underlie confidentiality mechanisms.
13
Integrity
14
Integrity
17
Availability
• Availability refers to the ability to use the information or resource
desired.
• Availability is an important aspect of reliability as well as of
system design because an unavailable system is at least as bad
as no system at all.
• The aspect of availability that is relevant to security is that
someone may deliberately arrange to deny access to data or to a
service by making it unavailable.
• System designs usually assume a statistical model to analyze
expected patterns of use, and mechanisms ensure availability
when that statistical model holds.
• Someone may be able to manipulate use (or parameters that
control use, such as network traffic) so that the assumptions of
18
Threats
• A threat is a potential violation of security.
• The violation need not actually occur for there to be a threat. The
fact that the violation might occur means that those actions that
could cause it to occur must be guarded against (or prepared for).
• Those actions are called attacks. Those who execute such actions,
or cause them to be executed, are called attackers.
• The three security services—confidentiality, integrity, and
availability—counter threats to the security of a system.
• Common attacks can be categorized as:
• Snooping, eavesdropping
• Modification, alteration
• Masquerading, spoofing
• False repudiation/denial of receipt
• Network delay, denial of service
19
Threats …
• Snooping: the unauthorized interception of information, is a form of disclosure.
• It is passive, suggesting simply that some entity is listening to (or reading)
communications or browsing through files or system information.
• Wiretapping, or passive wiretapping, is a form of snooping in which a network is
monitored. Confidentiality services counter this threat.
• Modification or alteration: an unauthorized change of information, covers three
classes of threats.
• The goal may be deception, in which some entity relies on the modified data to
determine which action to take, or in which incorrect information is accepted as
correct and is released.
• If the modified data controls the operation of the system, the threats of disruption
arise.
• Masquerading or spoofing: an impersonation of one entity by another, is a form
of both deception and usurpation (take over).
• It lures a victim into believing that the entity with which it is communicating is a different
entity.
• For example, if a user tries to log into a computer across the Internet but instead reaches
another computer that claims to be the desired one, the user has been spoofed. 20
Security Policy and Mechanism
02/28/2025 24
Security Trends…
02/28/2025 25
Security Trends…
02/28/2025 26
Who are the attackers?
02/28/2025 27
Who are the attackers?...
02/28/2025 28
Who are the attackers?...
1. Cyber Criminals
02/28/2025 29
Who are the attackers?...
2. Hacktivists
3. State-sponsored Attacker
4. Insider Threats
02/28/2025 32
Who are the attackers?...
4. Insider Threats
02/28/2025 33
Who are the attackers?...
4.1. Malicious
4.2. Accidental
02/28/2025 38
What are the vulnerabilities?...
Unencrypted communication
02/28/2025 39
What are the consequences?
Failure/End of service
Technology leakage
02/28/2025 42
Security Criteria
1. Availability
02/28/2025 44
Security Criteria…
2. Integrity
3. Confidentiality
4. Authentication
Categories of Attacks
Interruption: An attack on Availability
Modification: An attack on Integrity
Interception: An attack on Confidentiality
Fabrication: An attack on Authenticity
02/28/2025 47
Security Attack Types…
Attacks…
Source
Attack
Interruption Interception
Modification Fabrication
02/28/2025 48
Security Attack Types…
02/28/2025 49
Security Attack Types…
By means of encryption
02/28/2025 52
Security Attack Types…
02/28/2025 55
Common security attacks and their
countermeasures
Finding a way into the network
Firewalls
Denial of Service
Access filtering, IDS
TCP hijacking
IPSec
02/28/2025 56
Common security attacks and their
countermeasures…
Packet sniffing
Encryption (SSL, HTTPS)
Social problems
Education
02/28/2025 57
Security Services
X.800:
RFC 2828:
02/28/2025 61
Security Model
02/28/2025 62
Security Model
02/28/2025 64
Security Model
02/28/2025 66
Security Model…Eight Security
Dimensions
1. Access Control Security Dimension
Dimensions
3. Non-repudiation Security Dimension
Dimensions
4. Data Confidentiality Security Dimension
02/28/2025 70
Security Model…Eight Security
Dimensions
6. Data Integrity Security Dimension
Dimensions
7. Availability Security Dimension
Dimensions
8. Privacy Security Dimension
02/28/2025 75