Sei sulla pagina 1di 17

BY

MUHAMMAD YASEEN (1812121)


IMRAN ALI BHAMBRO (1812113)
ASIF ALI (1812106)
VALEED JAVEED (1812128)
MUHAMMAD ALI (1812118)
WHAT IS NETWORK SECURITY?
Protection of networks and their services from unauthorized
modifications, destruction or disclosure and provision of assurance
that the network performs its critical functions correctly and there are
no harmful side effects.
SECURITY OBJECTIVES
 IDENTIFICATION
 AUTHENTICATION
 ACCESS CONTROL
IDENTIFICATION
 Something which uniquely identifies a user and is called User ID.
 Sometimes users can select their ID as long as it is given to another
user.
User ID can be one or more combination of the following:
 User Name
 User Student Number
 User SSN
AUTHENTICATION
The process of verifying the identity of a user Typically based on
 Something user knows
 Password
 Something user have
 Key, smart card, disk, or other device
 Something user is
 Fingerprint, voice, or retinal scans
ACCESS CONTROL
Refers to security features that control who can access resources in
the operating system. Applications call access control functions to set
who can access specific resources or control access to resources
provided by the application.
WHY DO WE NEED SECURITY?

Protect vital information while still allowing access to those who need it
Trade secrets, medical records, etc.
Provide authentication and access control for resources

Guarantee availability of resources


WHO IS VULNERABLE?

Financial institutions and banks


Internet service providers
Pharmaceutical companies
Government and defense agencies
Contractors to various government agencies
Multinational corporations
ANYONE ON THE NETWORK

7
COMMON SECURITY ATTACKS
AND THEIR COUNTERMEASURES

Finding a way into the network


Firewalls
Exploiting software bugs, buffer overflows
Intrusion Detection Systems
Denial of Service
Ingress filtering, IDS
TCP hijacking
IPSec
Packet sniffing
Encryption (SSH, SSL, HTTPS)
Social problems
Education
ATTACKS, SERVICES AND MECHANISMS

Security Attack:Any action that compromises the


security of information.
Security Mechanism: A mechanism that is designed
to detect, prevent, or recover from a security
attack.
Security Service: A service that enhances the
security of data processing systems and
information transfers. A security service
makes use of one or more security mechanisms.
SECURITY SERVICES

Confidentiality (privacy)
Authentication (who created or sent the data)
Integrity (has not been altered)
Non-repudiation (the order is final)
Access control (prevent misuse of resources)
Availability (permanence, non-erasure)
METHODS OF DEFENCE

Encryption
Software Controls (access limitations in a data base, in operating
system protect each user from other users)

Hardware Controls (smartcard)

Policies (frequent changes of passwords)

Physical Controls (Physical security is the protection of


personnel, hardware, software, networks and data from physical
actions)
COMMUNICATION SECURITY

•IPsec
•Firewalls
•Virtual Private Networks
•Wireless Security
SECURITY ATTACKS

Interruption: This is an attack on availability


Interception: This is an attack on confidentiality
Modification: This is an attack on integrity
Fabrication: This is an attack on authenticity
SECURITY ATTACKS
CONCLUSIONS

The Internet works only because we implicitly trust one another


It is very easy to exploit this trust
The same holds true for software
It is important to stay on top of the latest security advisories to know how to
patch any security holes

Potrebbero piacerti anche