Terminologies of Network Security - PowerPoint PPT Presentation

About This Presentation
Title:

Terminologies of Network Security

Description:

Lecture 02 Subject: Network Security – PowerPoint PPT presentation

Number of Views:86
Slides: 10
Provided by: inam12
Tags:

less

Transcript and Presenter's Notes

Title: Terminologies of Network Security


1
Network Security
Lecture 2 Terminologies
  • Inam Ul Haq
  • MS Computer Science (Sweden)
  • Inam.bth_at_gmail.com, mr.inam.ulhaq_at_ieee.org
  • Discussion forum questions.computingcage.com
  • Member of IEEE, ACM, Movement Disorder Society,
    PDF, BossMedia, Michealjfox, Association for
    Information Systems and Internet Society.

2
Table of Contents
  • Terminologies
  • White Hat Hacking
  • Exercise

3
Terminologies
  • Threats
  • Attacks
  • Risk Analysis
  • Dependability Overview
  • Terms Cipher, Cryptology, Cryptanalysis,
    Cryptography
  • Exercise

4
Threat
  • A risk of attack, or, chance of getting attacked.
  • Attack when a risk/treat is implemented.
  • Omini-Present Security more or less all systems
    have security aspects that need to be discussed.
    So Security Engineering deals with ALL aspects of
    security.
  • Example ATM (placing metal to fool customers)

5
4 Common Threats
  • Common threats in a computer setting include
  • Spoofing the attacker pretends to be somebody
    else
  • Tampering with data e.g. security settings are
    changed togive an attacker more privileges
  • Repudiation a user denies having performed an
    action likemounting an attack
  • Denial-of-Service DoS attacks can make for
    instance websites temporarily unavailable

6
Risk Analysis
  • 1.Identify the assets to protect
  • 2.Find the threats for each asset
  • 3.Prioritize each of these risks
  • (asset x vulnerability x threat)
  • 4.Implement controls for each risk, or accept it
  • 5.Monitor the effectiveness of these controls and
    reiterate
  • Now do it by yourself and put results on
    http//question.computingcage.com/

7
(No Transcript)
8
(No Transcript)
9
Exercise
  • How to find a vulnerability?
  • How to remove a vulnerability?
  • Windows XP (in 2002) 35M Lines of code
  • How to develop and exploit a vulnerability?
  • How to prevent against exploits?
  • Explore 5 white hat hacking tools
Write a Comment
User Comments (0)
About PowerShow.com