network security & information security maintainence modified
DESCRIPTION
STRANSCRIPT
“Network Security & Information Security
Maintenance”Independent Study (CS450)
Under the guidance of:Smitesh.D.Patravali
By, KeerthanKumar Shetty
2SD10CS403 CSE 8 ‘B’ SDMCET
June 10,2013Department of Computer Science Department of Computer Science & Engineering& Engineering
1
Contents
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
2
Introduction :Network Security O Definition :
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
O Need for Network Security :• Protect vital information while still allowing
access to those who need itEx-Trade secrets, Business records, etc.
• Provide authentication and access control for resources
June 10,2013DepartmentDepartment of Computer Science & of Computer Science & EngineeringEngineering
3
Fundamental Security Objectives
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
4
Security Attacks, Mechanism & Services
O Security Attacks :Any action that compromises the security of information owned by an organization ,group or an individual.
2 types of Security Attacks
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
5
Security Attacks, Mechanism & Services
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
6
Security Attacks, Mechanism & Services
O Authentication Peer-Entity Data OriginO Access ControlO Confidentiality Connection Confidentiality Connectionless Confidentiality Selective Confidentiality Traffic flow Confidentiality
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
7
Security services..Contd..
O Data IntegrityConnection integrity with recoveryConnection integrity without recoveryConnectionless integritySelective field Connection IntegritySelective field Connectionless Integrity
O Non RepudiationNon Repudiation, originNon Repudiation, Destination
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
8
Security Attacks, Mechanism & ServicesO Security Mechanisms :
A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
9
Internetwork Security ModelO A message is to be transferred from one party
to another across some sort of Internet service.O The two parties, who are the principals in this
transaction, must cooperate for the exchange to take place.
O A logical information channel is established by defining a route through the Internet from source to destination and by the cooperative use of communication protocols (e.g., TCP/IP) by the two principals.
Network Security Model
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
10
This general model shows that there are four basic tasks in designing a particular security service:O1. Design an algorithm for performing the security-related transformation. Thealgorithm should be such that an opponent cannot defeat its purpose.O2. Generate the secret information to be used with the algorithm.O3. Develop methods for the distribution and sharing of the secret information.O4. Specify a protocol to be used by the two principals that makes use of the securityalgorithm and the secret information to achieve a particular security service. June
10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
11
Internetwork Security Model
Internet Standards & RFC’s
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
12
Information Security Maintenance
O Once an organization has improved the security posture of the organization, the security group must turn its attention to the maintenance of security readiness
O Information security must constantly monitor the threats, assets, and vulnerabilities
O The team also reviews external information to stay on top of the latest general and specific threats to its information security
O It is more expensive to reengineer the information security profile again and again
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
13
Security Management ModelsManagement models are frameworks that structure the tasks of managing a particular set of activities or business functions.
ISO ModelThe ISO management model is a five-layer approach that provides structure to the administration and management of networks and systemsThe core ISO model addresses management and operation thorough five topics:
O Fault managementO Configuration and Change managementO Accounting managementO Performance managementO Security management
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
14
ISO Model Contd….
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
15
The Maintenance Model
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
16
Conclusion
O Hence, we can conclude that the need for security in communicating networks is mandatory & the techniques provided to maintain information security are more reliable & implementing the same can serve our purpose in achieving higher security to our Information & network.
June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering
17
www.Wikepeadia.com.Network Security Essentials ,Fourth
Edition by William Stallings.Principles of Information Security by
Michael D Whitman.
June 10,2013Department of Computer Science & Engineering
18
References
Thank you!!!
June 10,2013
Department of Computer Science & Engineering
19