Computer and Network Security
Computer and Network Security
Module 1
Network Security
Need for Network Security
In
Types of attack
Passive Attack
Active Attack
Distributed Attack
Insider Attack
Close-in Attack
Active Attack
Active Attacks
Masquerade Attack:
An entity pretends to be some other entity, for
example, An entity captures an authentication
sequence and pretend to be the original entity.
Replay Attack:
It capture the data and retransmit to receiver for
producing an unauthorized effect.
Modification of messages:
A portion of a real message has been altered to
produce an undesirable effect.
Denial of service:
It
prevent
normal
use
of
computer
and
communications resources. For example Flooding of
packets in computer network, Swamping of CPU or a
server.
Information Security
Protection of data.
Has gone two major changes:
1. Computer Security:
oTimesharing systems: multiple users share
the H/W and S/W resources on a computer.
o Remote login is allowed over phone
lines.Measures and tools to protect data and
thwart hackers is called Computer Security.
Information Security
2. Network Security:
Computer networks are widely used
to connect computers at distant
locations.
Raises additional security problems:
o Data in transmission must be
protected.
o Network connectivity exposes each
computer to more vulnerabilities.
Henric Johnson
Security
Security
of information.
Security Attacks
Security Attacks
Interruption: An asset of the system is destroyed or
becomes unavailable or unusable.
This is an attack on availability.
Examples:
Destroying some H/W (disk or wire).
Disabling file system.
Flooding a computer with jobs or communication
link with packets.
Henric Johnson
10
Security Attacks
Interception: An unauthorized party gains access to an asset.
O This is an attack on confidentiality.
Examples:
>Wiretapping to capture data in a network.
>Illegally copying data or programs.
Henric Johnson
11
Security Attacks
Modification: An unauthorized party gains access and tampers
an asset.
oThis is an attack on integrity.
Examples:
Altering a program.
Henric Johnson
12
Security Attacks
Fabrication: An unauthorized party inserts a counterfeit object
into the system.
O This is an attack on authenticity.
Examples:
> Insertion of records in data files.
> Insertion of spurious messages in a network. (message
replay).
Henric Johnson
13
Henric Johnson
14
Henric Johnson
15
Passive Threats
Release of a message contents:
Contents of a message are read.
> A message may be carrying
sensitive or confidential data.
Traffic analysis:
An intruder makes inferences by
observing message patterns.
> Can be done even if messages are
encrypted.
> Inferences: location and identity of
hosts.
Henric Johnson
16
Security Services
A classification of security services:
Confidentiality (privacy)
17
Security Goals
Confidentiality
Integrity
Avalaibility
Henric Johnson
18
Design Guidlines
Authentication
Authorization
Accounting
Methods of Defence
Encryption
Physical Controls
Henric Johnson
20
Locked servers
Removable hard drives that are locked when
not in use
Hard disk drives requiring special tools for
detachment
Physical cages around computers that prohibit
access
Passwording files
Encryption
Data Encryption
Standard (DES)