network security csc332. dr. munam ali shah phd: university of bedfordshire ms: university of surrey...
TRANSCRIPT
![Page 1: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/1.jpg)
Network Security
CSC332
![Page 2: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/2.jpg)
Dr. Munam Ali Shah
PhD: University of Bedfordshire
MS: University of Surrey
M.Sc: University of Peshawar
Serving COMSATS since July 2004
![Page 3: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/3.jpg)
Some Pictures
Park Square Campus, UoB, Luton
Putteridge Burry Campus, UoB, Luton
New Post Graduate Center, UoB, Luton
![Page 4: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/4.jpg)
About the course
To provide a survey and exposure of both principles and practice of network security.
To determine threats to a network and how to protect organization’s systems and data from attacks.
The course will also help you understand and learn counter measures used to prevent, detect and correct security violations in a computer network.
![Page 5: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/5.jpg)
You will NOT learn..
How to do computer hacking
Break in a computer server and gain access to sensitive data
![Page 6: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/6.jpg)
Books and Resources
Cryptography and Network Security, 6th Edition by William Stallings
Network Secuirty Private Coomunication in a Public World, 2nd Edition by Charlie Kaufman, Radia Perlman, and Mike Speciner
![Page 7: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/7.jpg)
How this course will be run
The course is comprised of 32 lectures and is divided in following parts:
Part - 1: Computer/System Security
Part - 2: Network Security
Part - 3: Internet Security
![Page 8: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/8.jpg)
Part - 1: Computer/System Security
The main concepts that are discussed in this part are:
Security concepts, security violation categories, security measure levels, methods to violate security, types of attacks and firewalls.
This part will be covered in
Lecture 1 to Lecture 4
![Page 9: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/9.jpg)
Part - 2: Network Security
This part is will cover most of the contents of the course. It has been further divided in following sub-parts:
a) Analysis of network security
b) Cryptography as a network security tool
c) Symmetric key cryptography
d) Asymmetric key cryptography
e) Incorporating security in other parts of the network
![Page 10: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/10.jpg)
Part – 2 (a): Analysis of network security
Here we will discuss :
Network threats (viruses, worms, Trojan horse), countermeasures of the threats, network security model, access control, principles and techniques of network security with examples of how they are applied in practice.
The topics will be covered in
Lecture 5 - Lecture 8
![Page 11: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/11.jpg)
Part – 2 (b): Cryptography as a network security tool
Topics covered in this part are:
Cryptography as a classical security tool, basic terminologies, steganography, substitution and transposition ciphers, Ceaser cipher
The topics will be covered in
Lecture 9 - Lecture 10
![Page 12: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/12.jpg)
Part – 2 (c): Symmetric key cryptography
Topics covered in this part are:
Feistel cipher, Data Encryption Standard (DES), basic rounds, double and triple DES, Advanced Encryption Standard (AES) and limitations of the symmetric key cryptography.
The topics will be covered in
Lecture 11 - Lecture 17
![Page 13: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/13.jpg)
Part – 2 (d): Asymmetric key cryptography
This part will cover the following topics:
Requirements and challenges for asymmetric key, Diffie-Hellman key exchange, Rivest Shamir & Adleman (RSA), attacks against RSA, hybrid cryptosystems and quantum cryptography.
The topics will be covered in
Lecture 18 - Lecture 23
![Page 14: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/14.jpg)
Part – 2 (e): Incorporating security in other parts of the network
This part will discuss the following topics:
Overview of the network security protocols, e.g., Simple Network Management Protocol (SNMP), securing e-mail, wireless network security.
The topics will be covered in
Lecture 24 - Lecture 26
![Page 15: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/15.jpg)
Part - 3: Internet Security
This is the last part of the course. The main concepts that are discussed in this part are:
Tools and techniques to protect data during the transmission over the Internet, Sobig F. worm, grappling Hook attack, Morris Internet worm, Overview of the Internet security protocols such as https and ssh.
This part will be covered in
Lecture 27 – Lecture 30
The last two lectures, i.e., Lecture 31 and 32 are reserved for the revision of the course.
![Page 16: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/16.jpg)
Are you ready !!!!
Lets Begin
![Page 17: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/17.jpg)
Lecture 1: Security Concept
![Page 18: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/18.jpg)
Outlines
What is Security
Security violation categories
Security measure levels
![Page 19: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/19.jpg)
Objectives
To describe the basics of a computer/systems security
To understand and distinguish between different
breaches of security.
![Page 20: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/20.jpg)
The Security Problem
“A System is secure if resources are used and accessed as intended under all circumstances”
(Silberschatz, Galvin and Gagne)
There are four things to notice here
1- resources
2- used and accessed
3- as intended
4- in all circumstances
![Page 21: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/21.jpg)
Some examples
A transmit a file (containing sensitive information) to B. C, who is not authorized to read the file, is able monitor the transmission
Administrator D sends a message to computer E for updating an authorization file. F intercept the message, alters its content to add or delete entries, and then forwards the message to E. E accept the message and update the authorization file
Rather than intercept, F constructs its own message and send it to E
![Page 22: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/22.jpg)
Security Violation Categories
Breach of confidentiality
Unauthorized reading of data
Breach of integrity
Unauthorized modification of data
Breach of availability
Unauthorized destruction of data
Theft of service
Unauthorized use of resources
Denial of service (DOS)
Prevention of legitimate use
![Page 23: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/23.jpg)
Security Measure Levels
Impossible to have absolute security, but make cost to perpetrator sufficiently high to deter most intruders
Security must occur at four levels to be effective:
Physical
Data centers, servers, connected terminals
Human
Avoid social engineering, phishing, dumpster diving
Operating System
Protection mechanisms, debugging
Network
Intercepted communications, interruption, DOS
Security is as weak as the weakest link in the chain
But can too much security be a problem?
![Page 24: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/24.jpg)
Summary of today’s lecture
Today we learnt:
What is security and how different breaches of security can occur around us.
We have discussed how security breaches in a computing environment can occur at different levels.
![Page 25: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/25.jpg)
Next Lecture contents
In next lecture we will learn about:
methods to violate security
types of security attacks
and concept of the firewalls
![Page 26: Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since](https://reader036.vdocuments.net/reader036/viewer/2022062308/56649ec65503460f94bd1c09/html5/thumbnails/26.jpg)
The End