The Future of Computing: Challenges and Opportunities - PowerPoint PPT Presentation

1 / 21
About This Presentation
Title:

The Future of Computing: Challenges and Opportunities

Description:

Computer Science and Engineering. CSE 7349 - Padmaraj Nair. 2 ... Attack on integrity. Change values in a data file. Alter a program to make it perform differently ... – PowerPoint PPT presentation

Number of Views:31
Avg rating:3.0/5.0
Slides: 22
Provided by: Adm952
Category:

less

Transcript and Presenter's Notes

Title: The Future of Computing: Challenges and Opportunities


1
CSE 7349
Data and Network Security
Padmaraj Nair
2
  • Class    Tue 0630 PM- 0920 PM CDT,
    Spring, 2009
  • Instructor Dr. Padmaraj Nair
  • Office  --------------
  • Hours Tue  0530 PM-0620 PM CDT and by
    appointment Email  mpadmara_at_engr.smu.edu
  • Grader -----------
  • Textbook
  • W. Stallings, Cryptography and Network Security,
    Principles and Practices, 4e, Prentice Hall

3
  • References
  • R. J. Anderson, Security Engineering, A Guide to
    Building Dependable Distributed Systems, Wiley
  • William R. Cheswick, Steven M. Bellovin, and
    Aviel D. Rubin, Firewalls and Internet Security
    Repelling the Wily Hacker, Addison-Wesley
  • Mark Stamp, Information Security Principles and
    Practice, John Wiley Publishers
  • S. Frankel, Demystifying the IPSec Puzzle, Artech
    House
  • E. Roscorla, SSL and TLS Designing and Building
    Secure Systems, Addison-Wesley

4
  • Grading
  • Midterm Exam       20
  • Final                   30
  • Home Work          25
  • Project               20
  • Presentations 5

5
Course Outline
  • Authentication Protocols
  • Needham Schroeder
  • Kerberose
  • X.509
  • PKI
  • Protocol validation/verification
  • Real-Time Protocol Monitoring
  • Transport Layer Security
  • TCP/UDP security
  • Secure Socket Layer
  • SSH
  • VPNs
  • Network Layer Security
  • IPSec
  • DNS security
  • IPV6

6
Course Outline
  • Application Security
  • Email Security
  • PGP
  • S/MIME
  • Secure FTP
  • Phishing
  • MAC and Physical Layer Security
  • Ethernet Security
  • Wireless Security
  • 802.11
  • GSM
  • Bluetooth
  • RFID
  • Physical layer considerations

7
Course Outline
  • Network System Security
  • Firewalls
  • Packet filters
  • Application-level
  • Circuit-level gateways
  • Dynamic and distributed firewalls
  • IDS and IPS
  • Host and network based
  • Honeypots and Honey Nets
  • Internet Sensors

8
Background
  • Information Security requirements have changed in
    recent times
  • Traditionally provided by physical and
    administrative mechanisms
  • Computer use requires automated tools to protect
    files and other stored information
  • Use of networks and communications links requires
    measures to protect data during transmission

9
Evolution of Information Security
Security Today
Management
10
Information Security
  • Computer security
  • Protect system resources
  • Protect data (dynamic/stored)
  • Network security
  • Protect network resources
  • Protect exchanged data
  • Security confidentiality integrity
    availability authenticity

11
Attacks
  • Passive attacks
  • Affects data confidentiality
  • More difficult to detect, less harmful
  • Active attacks
  • Affects data confidentiality, integrity, and/or
    availability
  • Easier detection, more harmful

12
Passive Attacks
13
Active Attacks
14
Interruption
  • An asset of the system is destroyed of becomes
    unavailable or unusable
  • Attack on availability
  • Destruction of hardware
  • Cutting of a communication line
  • Disabling the file management system

15
Interception
  • An unauthorized party gains access to an asset
  • Attack on confidentiality
  • Wiretapping to capture data in a network
  • Illicit copying of files or programs

16
Modification
  • An unauthorized party not only gains access but
    tampers with an asset
  • Attack on integrity
  • Change values in a data file
  • Alter a program to make it perform differently
  • Modify content of messages transmitted on a
    network

17
Fabrication
  • Unauthorized party inserts counterfeit objects
    into the system
  • Attack on authenticity
  • Insertion of spurious messages in a network
  • Addition of records to a file

18
Network Security Services
  • Authentication
  • validate authenticity claims (identity/data)
  • Authorization
  • Enforce selective access (information/resources)
  • Confidentiality
  • Prevent disclosure of data (entire
    message/selected fields/traffic characteristics)
  • Integrity
  • Prevent tampering of data (entire
    message/selected fields)
  • Non-repudiation
  • Proof of origin, proof of delivery

19
Security Mechanisms
  • Specific mechanisms
  • Access control list - resource protection
  • Encryption data confidentiality
  • Digital signature origin verification,
    non-repudiation
  • Notarization trusted third party assurance
  • Traffic padding traffic characteristic
    confidentiality
  • Routing control flow protection

20
Security Mechanisms
  • Pervasive mechanisms
  • Trusted functionality
  • Security label
  • Event detection
  • Security audit trail
  • Security recovery

21
Widely Known Attacks
  • Viruses and worms
  • Trojan horses
  • Trap doors
  • Logic bombs
  • Spoofs IP, sequence number etc.
  • Man-in-the middle (MIM)
  • Replay attacks
Write a Comment
User Comments (0)
About PowerShow.com