Chapter 1
Chapter 1
by William Stallings
Chapter 1
Computer and Network Security
Concepts
Symmetric encryption
Asymmetric encryption
• Used to conceal small blocks of data, such as encryption keys and hash
function values, which are used in digital signatures
Authentication protocols
measures to deter,
prevent, detect, and
correct security
violations that involve
the transmission of
information
Integrity
• Data integrity
• Assures that information and programs are changed only in a specified and
authorized manner
• System integrity
• Assures that a system performs its intended function in an unimpaired manner,
free from deliberate or inadvertent unauthorized manipulation of the system
Availability
• Assures that systems work promptly and service is not denied to
authorized users
© 2017 Pearson Education, Ltd., All rights reserved.
© 2017 Pearson Education, Ltd., All rights reserved.
Breach of Security
Levels of Impact
• The loss could be expected to have a severe or
catastrophic adverse effect on organizational
Hi operations, organizational assets, or individuals
gh
• The loss could be expected to have a
serious adverse effect on organizational
• Security mechanism
• A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security attack
• Security service
• A processing or communication service that enhances the
security of the data processing systems and the information
transfers of an organization
• Intended to counter security attacks, and they make use of
one or more security mechanisms to provide the service
© 2017 Pearson Education, Ltd., All rights reserved.
Table 1.1
Threats and Attacks (RFC 4949)
Security
Services
(X.800)
Security
Mechanisms
(X.800)
Internet Society
●
ISOC is a professional membership society with world-wide organizational and individual membership
●
Provides leadership in addressing issues that confront the future of the Internet and is the organization home for the groups responsible for Internet infrastructure
standards
ITU-T
●
The International Telecommunication Union (ITU) is an international organization within the United Nations System in which governments and the private sector coordinate global telecom networks
and services
●
The ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors of the ITU and whose mission is the development of technical standards covering all fields of telecommunications
ISO
●
The International Organization for Standardization is a world-wide federation of national standards bodies from more than 140 countries
●
ISO is a nongovernmental organization that promotes the development of standardization and related activities with a view to facilitating the international exchange of
goods and services and to developing cooperation in the spheres of intellectual, scientific, technological, and economic activity
© 2017 Pearson Education, Ltd., All rights reserved.
Summary
• Computer security concepts • Security services
• Definition • Authentication
• Examples • Access control
• Challenges • Data confidentiality
• Data integrity
• The OSI security
• Nonrepudiation
architecture
• Availability service
• Security attacks
• Passive attacks
• Security mechanisms
• Active attacks • Fundamental security
• Attack surfaces and attack design principles
trees • Network security model
© 2017 Pearson Education, Ltd., All rights reserved.
• Standards