network security & information security maintainence modified

Post on 13-Jan-2015

248 Views

Category:

Technology

3 Downloads

Preview:

Click to see full reader

DESCRIPTION

S

TRANSCRIPT

“Network Security & Information Security

Maintenance”Independent Study (CS450)

Under the guidance of:Smitesh.D.Patravali

By, KeerthanKumar Shetty

2SD10CS403 CSE 8 ‘B’ SDMCET

June 10,2013Department of Computer Science Department of Computer Science & Engineering& Engineering

1

Contents

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

2

Introduction :Network Security O Definition :

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

O Need for Network Security :• Protect vital information while still allowing

access to those who need itEx-Trade secrets, Business records, etc.

• Provide authentication and access control for resources

June 10,2013DepartmentDepartment of Computer Science & of Computer Science & EngineeringEngineering

3

Fundamental Security Objectives

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

4

Security Attacks, Mechanism & Services

O Security Attacks :Any action that compromises the security of information owned by an organization ,group or an individual.

2 types of Security Attacks

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

5

Security Attacks, Mechanism & Services

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

6

Security Attacks, Mechanism & Services

O Authentication Peer-Entity Data OriginO Access ControlO Confidentiality Connection Confidentiality Connectionless Confidentiality Selective Confidentiality Traffic flow Confidentiality

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

7

Security services..Contd..

O Data IntegrityConnection integrity with recoveryConnection integrity without recoveryConnectionless integritySelective field Connection IntegritySelective field Connectionless Integrity

O Non RepudiationNon Repudiation, originNon Repudiation, Destination

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

8

Security Attacks, Mechanism & ServicesO Security Mechanisms :

A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

9

Internetwork Security ModelO A message is to be transferred from one party

to another across some sort of Internet service.O The two parties, who are the principals in this

transaction, must cooperate for the exchange to take place.

O A logical information channel is established by defining a route through the Internet from source to destination and by the cooperative use of communication protocols (e.g., TCP/IP) by the two principals.

Network Security Model

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

10

This general model shows that there are four basic tasks in designing a particular security service:O1. Design an algorithm for performing the security-related transformation. Thealgorithm should be such that an opponent cannot defeat its purpose.O2. Generate the secret information to be used with the algorithm.O3. Develop methods for the distribution and sharing of the secret information.O4. Specify a protocol to be used by the two principals that makes use of the securityalgorithm and the secret information to achieve a particular security service. June

10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

11

Internetwork Security Model

Internet Standards & RFC’s

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

12

Information Security Maintenance

O Once an organization has improved the security posture of the organization, the security group must turn its attention to the maintenance of security readiness

O Information security must constantly monitor the threats, assets, and vulnerabilities

O The team also reviews external information to stay on top of the latest general and specific threats to its information security

O It is more expensive to reengineer the information security profile again and again

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

13

Security Management ModelsManagement models are frameworks that structure the tasks of managing a particular set of activities or business functions.

ISO ModelThe ISO management model is a five-layer approach that provides structure to the administration and management of networks and systemsThe core ISO model addresses management and operation thorough five topics:

O Fault managementO Configuration and Change managementO Accounting managementO Performance managementO Security management

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

14

ISO Model Contd….

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

15

The Maintenance Model

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

16

Conclusion

O Hence, we can conclude that the need for security in communicating networks is mandatory & the techniques provided to maintain information security are more reliable & implementing the same can serve our purpose in achieving higher security to our Information & network.

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

17

www.Wikepeadia.com.Network Security Essentials ,Fourth

Edition by William Stallings.Principles of Information Security by

Michael D Whitman.

June 10,2013Department of Computer Science & Engineering

18

References

Thank you!!!

June 10,2013

Department of Computer Science & Engineering

19

top related