Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
5/10/13
SECURITY PHILOSPHY
Computer & Network Security has similarities with the security in normal life.
As there is no %100 security So give up? A possible solution: Use more than one chain
There is no templates which suits all. There is a different solution for different organizations
Different needs Different assets
To win a war, one must know the way Sun Tzu The Art of War
MONITOR
The system should be monitored for intrusions And immediate action should be taken at attacks
Network Awareness
FUNDAMENTALS
ATTACKER
VULNERABILITY
INFORMATION SYSTEM
USERS
Vulnerable Systems
A vulnerability timeline
The Attacker/Intruder
The attacker can be called as: Lamer, intruder, attacker (wrongly used as hacker also) Also secret organizations? Also companies (serious antivirus/defence economy)
Hacker is used as attacker/lamer, in the meaning: The intruder, who gets in your system and intends to use for his/her own aims.
5/10/13 Ar. Gr. Enis Karaaslan 24
The Attacker
The attackers strength is Dedication Will not stop until he/she gets in Can use the computer for days long sleepless Knows the vulnerabilities of systems
5/10/13
26
Network Security Overall Network Awareness Firewall, Intrusion Detection Systems etc More Host (Computer/Server/NW Device) Security
Physical Security
Firewall
Firewall Basics
5/10/13
29
Encryption
Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. (Encryption x Decryption)
5/10/13
30
Encryption
Two different methods (according to key use) Conventional Two keys are the same Asymetric (Public Key Encryption) Key pair (public, private)
5/10/13
31
Encryption
To decyrpt an encrypted data How much time? How much Processing (Computing power)? The science which deals with encryption is Cryptology
5/10/13
32
5/10/13
33