Top Banner
Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003
13

Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Jan 03, 2016

Download

Documents

Tiffany McBride
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Network Security

Student: Lirong Wang

Student ID: 122628 Instructor: Professor Anvari

Winter 2003

Page 2: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Content What is Network Security Types of Network Security Security Attacks Encryption Application of Encryption in Network

Security . Encryption/Decryption . Digital Signature Conclusion

Page 3: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Introduction

Security technologies protect mission-critical networks from corruption and intrusion. Network security enables new business applications by reducing risk, and providing a foundation for expanding your business with Intranet, extranet, and electronic commerce applications.

Page 4: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Types Of Network Security Internet Security - From Infrastructure to

Network to Computer Wide-Area Network Security - Bridge and

Router Packet Filtering Local-Area Network Security - Tape Backup

and LAN Admin. Computer Security - Power Protection and

Special Mounting & Fastening Devices to Secure Computer Equipment

Page 5: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Security Attacks Interruption -the flow of information is blocked

entirely Interception -In this attack, the normal flow of

information is not affected, but an additional flow, generally to an unauthorized source, is created

Modification -an unauthorized party not only gains access to but also changes the contents of message before it is received at the destination host

Fabrication - an unauthorized party inserts counterfeit objects into the network.

Page 6: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Encryption One the most important automated tools for

computer security Is a process that conceals meaning by

changing intelligible messages into unintelligible messages.

Can be achieved by means of either a code or a cipher

Of equal importance to conventional encryption is public-key encryption.

Page 7: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Public key and Private key Public key: one of two keys used in an

asymmetric encryption system. Public key is made public, to be used on conjunction with a corresponding private key.

Private key: one of two keys used in an asymmetric encryption system. For secure communication, the private key should be only be known to its creator.

Page 8: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Encryption

Page 9: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Public-key encryption-cont. One key for encryption and another key

for decryption. Advantage:

Solves the problem of maintaining key security

Disadvantage Much more complex than private key

encryption Two or three orders of magnitude slow than

private key encryption

Page 10: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Digital signature

Page 11: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Conclusion Network security protects data during their

transmission and to guarantee that data transmissions are authentic

We have four general categories of attack: interruption, interception, modification, and fabrication.

Encryption is one of the most important automated tools for computer security.

Public-key encryption and digital signature provide network security.

Page 12: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

Reference William Stallings. Data and computer

communication. Prentice Hall,1996. ISBN: 0-02-415425-3

William Stallings. Operating systems. Prentice Hall,1995. ISBN: 0-7803-1107-8 www.anvari.net http://www.microsoft.com/security

Page 13: Network Security Student: Lirong Wang Student ID: 122628 Instructor: Professor Anvari Winter 2003.

THANKS