SlideShare una empresa de Scribd logo
1 de 46
CHAPTER 7
SECURITY IN NETWORKS AND
DISTRIBUTED SYSTEM
INTRODUCTION
 Network is two devices connected across some
medium by hardware and software that complete the
communications (simple definition of network).
User (Client)
Host
Server
Communication medium
Simple View of Network
Introduction
 A network is normally not just single client to a
single server; typically many clients interact with
many servers.
User (Client) Host Server
User (Client)
User (Client)
User (Client)
Host Server
User (Client)
User (Client)
User (Client)
System A
System B
Network Security Issues
Network have security problems for the following reasons:
 Sharing – resources and workload sharing
 Complexity of system
 Unknown parameter – expandability of a network also implies
uncertainty about the network boundary
 Many points of attack – file may past through many host before
reaching the destination
 Anonymity – attacker can mount an attack with touching the
system
 Unknown path – there may be many path from one host to
another.
Possible Network Security Threats
 Wiretapping
 Impersonation
 Message confidence violations
 Message integrity violations
 Hacking
 Denial of Service (DoS)
Possible Network Security Threats
Wiretapping
 Wiretap means to intercept communications.
 Passive / Active Wiretapping
 Packet sniffer can retrieve all packets on the net.
 “Inductance” is a process where an intruder can tap a
wire without making physical contact with the cable.
 Microwave and satellite – higher possibility of
interception due to wider broadcasting.
Possible Network Security Threats
Wiretapping
 Optical fiber offers two significant security
advantages:
 The entire optical network must be tuned carefully each
time a new connection is made. Therefore, no one can tap
an optical system without detection.
 Optical fiber carries light energy, not electricity. Light
does not emanate a magnetic field as electricity does.
Therefore an inductive tap is impossible on an optical
fiber cable.
Possible Network Security Threats
Wiretapping
 However, optical fiber also has weaknesses
where wiretappers will try to tap at the
repeaters, splices and other equipments that
connects to the fiber optic and thus creates
vulnerabilities.
Possible Network Security Threats
Impersonation
 Pretend to be someone (personnel) or something
(process).
 In an impersonation, the attacker has several choices:
 Guess the identity and authentication details of the target
 Pick up the identity and authentication details of the target
from a previous communication
 Circumvent or disable the authentication mechanism at
the target computer
 Use a target that will not be authenticated
 Use a target whose authentication data is known
Possible Network Security Threats
Message Confidentiality Violations
 Misdelivery
 Exposure
 Traffic Flow Analysis
Possible Network Security Threats
Message Integrity Violations
 Falsification of Messages
 Change the content of a message
 Change any part of the content of a message
 Replace a message entirely
 Redirect a message
 Destroy or delete the message
 Noise – unintentional interference
Possible Network Security Threats
Hacking
 A source of threat to security in computer
communication.
 Hacker is considered as a separate threat because a
hacker can develop tools to search widely and
quickly for particular weaknesses and move swiftly
to exploit weaknesses.
 In this way, hacker has unlimited time to analyze,
plan, code, simulate and test for future attack.
 In reviewing the effects of this attack ; if it succeeds,
what additional capability would that give the hacker
for future attacks?
Possible Network Security Threats
Denial of Service
 Result of any action or series of actions that
prevents any part of a telecommunications
system from functioning.
 Connectivity
 Flooding
 Routing problems
 Disruption of Service
Network Security Control
 Encryption – link encryption, end-to-end encryption
 Link Encryption:
 Data is encrypted just before the system places it on the
physical communication links.
 Decryption occurs just as the communication enters the
receiving computer.
Application
Presentation
Session
Transport
Network
Data Link
Physical
Sender ReceiverMessage
Intermediate
Host
Message
(Plaintext)
Exposed
Message Encrypted Message in Plaintext: Exposed
Link Encryption
Network Security Control
 End-to-end encryption:
 Provides security from one end of a transmission
through the other.
Application
Presentation
Session
Transport
Network
Data Link
Physical
Sender Message
Intermediate
Host
Message Encrypted Message in Plaintext: Exposed
Receiver
End-to-End Encryption
Network Security Control
Link Encryption versus End-to-end Encryption:
Link Encryption End-to-end Encryption
Security Within Hosts
Message exposed in the sending host
Message expose in intermediate nodes
Security Within Hosts
Message encrypted in sending host
Message encrypted in intermediate nodes
Role of User
Applied by sending host
Invisible to user
Host maintains encryption
Can be done in hardware
All or no messages encrypted
Role of User
Applied by sending process
User applies encryption
User must find algorithm
Software implementation
User chooses to encrypt or not, for each
message
Authentication Issues in Distributed System
There are two main concern regarding authentication
issue in distributed system which are:
(1) How to ensure the authenticity of the communicating
hosts?
(2) How to ensure authenticity of users who are using the
hosts?
Authentication Issues in Distributed System
That is by using:
 Digital Distributed Authentication
 DCE (Distributed Computer Environment)
 Kerberos
 SESAME
 CORBA
Authentication Issues in Distributed System
Kerberos
 Is a system that supports authentication in distributed
systems.
 Was designed at Massachusetts Institute of
technology.
 The basis of kerberos is a central server that provides
authenticated tokens called tickets to requesting
applications.
Authentication Issues in Distributed System
KERBEROS
Initiating a Kerberos Session:
Authentication Issues in Distributed System
KERBEROS
Obtaining a Ticket to Access a File:
KERBEROS:
Access to Services and Servers in Kerberos
Authentication Issues in Distributed System
Kerberos was carefully designed to withstand attacks in
distributed environments:
 No password communicated on the network
 Cryptographic protection against spoofing
 Limited period of validity
 Time stamps to prevent replay attacks
 Mutual authentication
Authentication Issues in Distributed System
 Kerberos is not a perfect answer to security problems
in distributed systems because:
 Kerberos requires continuous availability of a trusted
ticket granting server.
 Authenticity of servers requires a trusted relationship
between the ticket granting server and every server
 Kerberos requires timely transactions
 A subverted workstation can save and later replay user
passwords
Authentication Issues in Distributed System
 Kerberos is not a perfect answer to security
problems in distributed systems because:
 Password guessing works
 Kerberos does not scale well
 Kerberos is not a complete solution
Privacy Enhanced Electronic Mail (PEM)
 The basis of PEM is encryption.
 In order to send a PEM message the sender
must have a certificate for the receiver.
Message header
+ Body
Message
Encryption
key
Receiver’s
public key
New header
Encrypted data
Encrypted key
Encrypted
Message
Header +
Body
Public key encryption
Symmetric key
encryption
Compose
message
PEM processing
requested ?
PEM
Send message
Receive message
Privacy
enhanced ?
PEM
View message
Yes
No
Yes
No
PEM processing in Message Transmission
Privacy Enhanced Electronic Mail (PEM)
 The major problem with PEM is key management.
 Therefore PGP was designed to overcome this
problem.
Pretty Good Privacy (PGP)
 Was designed by Phil Zimmerman to offer a reasonable
degree of privacy for email.
 It uses a message structuring scheme similar to PEM.
 The key management for PGP is ad hoc.
 Each user has a set of people he or she knows and trusts.
 The user exchanges public keys with those friends, exactly as
one might swap business card at meeting.
 Some people accept not just the friends’ public key but also
all public keys their friends have.
Pretty Good privacy (PGP)
 The assumption here is that any friend of yours is a
friend of mine.
 A PGP user builds a key ring which is the set of all
public keys that person possesses.
 In that way, when an encrypted messages arrives, the
person can decrypt it if the key is on that person’s
key ring.
Firewalls
 A firewall is a process that filters all traffic between
a protected or “inside” network and a less
trustworthy or “outside” network.
 There are three types of firewall:
 Screening Routers
 Proxy gateways
 Guards
Firewalls
Screening Router
 Is the simplest and in some situations the most effective type
of firewall.
 Hosts tend not to be connected directly to a wide area
network; more often hosts are connected to a router.
Firewalls
Router joining LAN to two WANs
Firewalls
Screening Router
 Router will only see the header of the message.
 Header will contain information on:
 The sender/receiver address
 Protocol
 Port
 Length of a packet
 It can also control the traffic based on application – by using
port numbers (eg: 21 for FTP and 25 for SMTP)
 It can also decide which application is acceptable and not
acceptable.
 It can also determine the authentication of an inside address.
Firewalls
Proxy Gateway
 Is also called a bastion host.
 Is a firewall that simulates the (proper) effects
of an application so that the application will
receive only requests to act properly.
Firewalls
Proxy Gateway
 To understand the real purpose of a proxy
gateway, we consider some examples:
 A company wants to set up an online lists so that
outsiders can see the products and prices offered.
It wants to be sure that no outsider can change the
prices or product list and that outsiders can access
only the price list not any of the more sensitive
files stored inside.
Firewalls
Guard
 A guard is a sophisticated proxy firewall.
 The guard decides what services to perform on the
user’s behalf based on its available knowledge such
as whether it can reliably know of the (outside)
user’s identity, previous interactions and so forth.
Firewalls
Guard
 Here are some more sophisticated examples of guard
activities:
 A university wants to allow its students to use email up to
a limit of so many messages or so many characters of
email in the last so many days. Although this result could
be achieved by modifying email handlers it is more easily
done by monitoring the common point through which all
email flows (the mail transfer protocol).
 A school wants its students to be able to access the WWW
but because of the slow speed of its connection to the
Web it will allow only so many characters per download
image.
Firewalls
Firewalls are not complete solutions to all
computer security problems.
 Firewalls can protect an environment only if the firewalls
control the entire perimeter.
 Firewall do not protect data outside the perimeter.
 Firewall are the most visible part of an installation to the
outside and therefore is the most attractive point of attack.
 Firewalls are targets of penetrators.
 Firewalls must be correctly configured.
 Firewalls exercise only minor control over the content
admitted to the inside – inaccurate data or malicious code
must be controlled inside the perimeter.

Más contenido relacionado

La actualidad más candente

Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security IssuesAfreenYousaf
 
Program security
Program securityProgram security
Program securityG Prachi
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itlavakumar Thatisetti
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 

La actualidad más candente (20)

Email security
Email securityEmail security
Email security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
User authentication
User authenticationUser authentication
User authentication
 
System security
System securitySystem security
System security
 
Network security
Network securityNetwork security
Network security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Program security
Program securityProgram security
Program security
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Network Security
Network SecurityNetwork Security
Network Security
 
Email security
Email securityEmail security
Email security
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 

Destacado

1. chapter 1 introduction of Finance
1. chapter 1 introduction of Finance1. chapter 1 introduction of Finance
1. chapter 1 introduction of FinanceAfiqEfendy Zaen
 
OS Database Security Chapter 6
OS Database Security Chapter 6OS Database Security Chapter 6
OS Database Security Chapter 6AfiqEfendy Zaen
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPointAmy McMullin
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 ReviewAmy McMullin
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
2. financial statement cash flow
2. financial statement cash flow2. financial statement cash flow
2. financial statement cash flowAfiqEfendy Zaen
 
10. cash flow in capital budgeting
10. cash flow in capital budgeting10. cash flow in capital budgeting
10. cash flow in capital budgetingAfiqEfendy Zaen
 
Network security
Network securityNetwork security
Network securitytoamma
 
Bbm Guvenlik Semineri
Bbm Guvenlik SemineriBbm Guvenlik Semineri
Bbm Guvenlik Seminerieroglu
 
Bluetooth Guvenligi Sunum
Bluetooth Guvenligi SunumBluetooth Guvenligi Sunum
Bluetooth Guvenligi Sunumeroglu
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4AfiqEfendy Zaen
 
Optik Aglarin Guvenligi
Optik Aglarin GuvenligiOptik Aglarin Guvenligi
Optik Aglarin Guvenligieroglu
 
Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2AfiqEfendy Zaen
 
Why optical networks ?
Why optical networks ?Why optical networks ?
Why optical networks ?Gagan Randhawa
 

Destacado (20)

1. chapter 1 introduction of Finance
1. chapter 1 introduction of Finance1. chapter 1 introduction of Finance
1. chapter 1 introduction of Finance
 
OS Database Security Chapter 6
OS Database Security Chapter 6OS Database Security Chapter 6
OS Database Security Chapter 6
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPoint
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 Review
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
3 financial ratio
3 financial ratio3 financial ratio
3 financial ratio
 
6. risk return
6. risk return6. risk return
6. risk return
 
6. bond valuation
6. bond valuation6. bond valuation
6. bond valuation
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
2. financial statement cash flow
2. financial statement cash flow2. financial statement cash flow
2. financial statement cash flow
 
10. cash flow in capital budgeting
10. cash flow in capital budgeting10. cash flow in capital budgeting
10. cash flow in capital budgeting
 
Network security
Network securityNetwork security
Network security
 
Bbm Guvenlik Semineri
Bbm Guvenlik SemineriBbm Guvenlik Semineri
Bbm Guvenlik Semineri
 
Bluetooth Guvenligi Sunum
Bluetooth Guvenligi SunumBluetooth Guvenligi Sunum
Bluetooth Guvenligi Sunum
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4
 
Optik Aglarin Guvenligi
Optik Aglarin GuvenligiOptik Aglarin Guvenligi
Optik Aglarin Guvenligi
 
Edi new
Edi newEdi new
Edi new
 
Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2
 
Why optical networks ?
Why optical networks ?Why optical networks ?
Why optical networks ?
 

Similar a Network Security Chapter 7

wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction SecurityMeet Soni
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iinventionjournals
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsPalani Kumar
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking securityRaja Waseem Akhtar
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measureShivam Singh
 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideErica StJohn
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Securitydrkelleher
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Miigaa Mine
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network securityManish Tiwari
 

Similar a Network Security Chapter 7 (20)

wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Security
SecuritySecurity
Security
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-Guide
 
Network security
Network securityNetwork security
Network security
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
 
Security - ch5.ppt
Security - ch5.pptSecurity - ch5.ppt
Security - ch5.ppt
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Ip security
Ip security Ip security
Ip security
 

Más de AfiqEfendy Zaen

Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
10. short term financial planning
10. short term financial planning10. short term financial planning
10. short term financial planningAfiqEfendy Zaen
 

Más de AfiqEfendy Zaen (6)

Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
10. short term financial planning
10. short term financial planning10. short term financial planning
10. short term financial planning
 
9. cost of capital
9. cost of capital9. cost of capital
9. cost of capital
 
8. stock valuation
8. stock valuation8. stock valuation
8. stock valuation
 
4. time value of money
4. time value of money4. time value of money
4. time value of money
 

Último

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Último (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Network Security Chapter 7

  • 1. CHAPTER 7 SECURITY IN NETWORKS AND DISTRIBUTED SYSTEM
  • 2. INTRODUCTION  Network is two devices connected across some medium by hardware and software that complete the communications (simple definition of network). User (Client) Host Server Communication medium Simple View of Network
  • 3. Introduction  A network is normally not just single client to a single server; typically many clients interact with many servers. User (Client) Host Server User (Client) User (Client) User (Client) Host Server User (Client) User (Client) User (Client) System A System B
  • 4. Network Security Issues Network have security problems for the following reasons:  Sharing – resources and workload sharing  Complexity of system  Unknown parameter – expandability of a network also implies uncertainty about the network boundary  Many points of attack – file may past through many host before reaching the destination  Anonymity – attacker can mount an attack with touching the system  Unknown path – there may be many path from one host to another.
  • 5. Possible Network Security Threats  Wiretapping  Impersonation  Message confidence violations  Message integrity violations  Hacking  Denial of Service (DoS)
  • 6. Possible Network Security Threats Wiretapping  Wiretap means to intercept communications.  Passive / Active Wiretapping  Packet sniffer can retrieve all packets on the net.  “Inductance” is a process where an intruder can tap a wire without making physical contact with the cable.  Microwave and satellite – higher possibility of interception due to wider broadcasting.
  • 7. Possible Network Security Threats Wiretapping  Optical fiber offers two significant security advantages:  The entire optical network must be tuned carefully each time a new connection is made. Therefore, no one can tap an optical system without detection.  Optical fiber carries light energy, not electricity. Light does not emanate a magnetic field as electricity does. Therefore an inductive tap is impossible on an optical fiber cable.
  • 8. Possible Network Security Threats Wiretapping  However, optical fiber also has weaknesses where wiretappers will try to tap at the repeaters, splices and other equipments that connects to the fiber optic and thus creates vulnerabilities.
  • 9. Possible Network Security Threats Impersonation  Pretend to be someone (personnel) or something (process).  In an impersonation, the attacker has several choices:  Guess the identity and authentication details of the target  Pick up the identity and authentication details of the target from a previous communication  Circumvent or disable the authentication mechanism at the target computer  Use a target that will not be authenticated  Use a target whose authentication data is known
  • 10. Possible Network Security Threats Message Confidentiality Violations  Misdelivery  Exposure  Traffic Flow Analysis
  • 11. Possible Network Security Threats Message Integrity Violations  Falsification of Messages  Change the content of a message  Change any part of the content of a message  Replace a message entirely  Redirect a message  Destroy or delete the message  Noise – unintentional interference
  • 12. Possible Network Security Threats Hacking  A source of threat to security in computer communication.  Hacker is considered as a separate threat because a hacker can develop tools to search widely and quickly for particular weaknesses and move swiftly to exploit weaknesses.  In this way, hacker has unlimited time to analyze, plan, code, simulate and test for future attack.  In reviewing the effects of this attack ; if it succeeds, what additional capability would that give the hacker for future attacks?
  • 13. Possible Network Security Threats Denial of Service  Result of any action or series of actions that prevents any part of a telecommunications system from functioning.  Connectivity  Flooding  Routing problems  Disruption of Service
  • 14. Network Security Control  Encryption – link encryption, end-to-end encryption  Link Encryption:  Data is encrypted just before the system places it on the physical communication links.  Decryption occurs just as the communication enters the receiving computer.
  • 16. Network Security Control  End-to-end encryption:  Provides security from one end of a transmission through the other.
  • 17. Application Presentation Session Transport Network Data Link Physical Sender Message Intermediate Host Message Encrypted Message in Plaintext: Exposed Receiver End-to-End Encryption
  • 18. Network Security Control Link Encryption versus End-to-end Encryption: Link Encryption End-to-end Encryption Security Within Hosts Message exposed in the sending host Message expose in intermediate nodes Security Within Hosts Message encrypted in sending host Message encrypted in intermediate nodes Role of User Applied by sending host Invisible to user Host maintains encryption Can be done in hardware All or no messages encrypted Role of User Applied by sending process User applies encryption User must find algorithm Software implementation User chooses to encrypt or not, for each message
  • 19. Authentication Issues in Distributed System There are two main concern regarding authentication issue in distributed system which are: (1) How to ensure the authenticity of the communicating hosts? (2) How to ensure authenticity of users who are using the hosts?
  • 20. Authentication Issues in Distributed System That is by using:  Digital Distributed Authentication  DCE (Distributed Computer Environment)  Kerberos  SESAME  CORBA
  • 21. Authentication Issues in Distributed System Kerberos  Is a system that supports authentication in distributed systems.  Was designed at Massachusetts Institute of technology.  The basis of kerberos is a central server that provides authenticated tokens called tickets to requesting applications.
  • 22. Authentication Issues in Distributed System KERBEROS Initiating a Kerberos Session:
  • 23. Authentication Issues in Distributed System KERBEROS Obtaining a Ticket to Access a File:
  • 24. KERBEROS: Access to Services and Servers in Kerberos
  • 25. Authentication Issues in Distributed System Kerberos was carefully designed to withstand attacks in distributed environments:  No password communicated on the network  Cryptographic protection against spoofing  Limited period of validity  Time stamps to prevent replay attacks  Mutual authentication
  • 26. Authentication Issues in Distributed System  Kerberos is not a perfect answer to security problems in distributed systems because:  Kerberos requires continuous availability of a trusted ticket granting server.  Authenticity of servers requires a trusted relationship between the ticket granting server and every server  Kerberos requires timely transactions  A subverted workstation can save and later replay user passwords
  • 27. Authentication Issues in Distributed System  Kerberos is not a perfect answer to security problems in distributed systems because:  Password guessing works  Kerberos does not scale well  Kerberos is not a complete solution
  • 28. Privacy Enhanced Electronic Mail (PEM)  The basis of PEM is encryption.  In order to send a PEM message the sender must have a certificate for the receiver.
  • 29. Message header + Body Message Encryption key Receiver’s public key New header Encrypted data Encrypted key Encrypted Message Header + Body Public key encryption Symmetric key encryption
  • 30.
  • 31. Compose message PEM processing requested ? PEM Send message Receive message Privacy enhanced ? PEM View message Yes No Yes No PEM processing in Message Transmission
  • 32. Privacy Enhanced Electronic Mail (PEM)  The major problem with PEM is key management.  Therefore PGP was designed to overcome this problem.
  • 33. Pretty Good Privacy (PGP)  Was designed by Phil Zimmerman to offer a reasonable degree of privacy for email.  It uses a message structuring scheme similar to PEM.  The key management for PGP is ad hoc.  Each user has a set of people he or she knows and trusts.  The user exchanges public keys with those friends, exactly as one might swap business card at meeting.  Some people accept not just the friends’ public key but also all public keys their friends have.
  • 34. Pretty Good privacy (PGP)  The assumption here is that any friend of yours is a friend of mine.  A PGP user builds a key ring which is the set of all public keys that person possesses.  In that way, when an encrypted messages arrives, the person can decrypt it if the key is on that person’s key ring.
  • 35. Firewalls  A firewall is a process that filters all traffic between a protected or “inside” network and a less trustworthy or “outside” network.  There are three types of firewall:  Screening Routers  Proxy gateways  Guards
  • 36. Firewalls Screening Router  Is the simplest and in some situations the most effective type of firewall.  Hosts tend not to be connected directly to a wide area network; more often hosts are connected to a router.
  • 38.
  • 39. Firewalls Screening Router  Router will only see the header of the message.  Header will contain information on:  The sender/receiver address  Protocol  Port  Length of a packet  It can also control the traffic based on application – by using port numbers (eg: 21 for FTP and 25 for SMTP)  It can also decide which application is acceptable and not acceptable.  It can also determine the authentication of an inside address.
  • 40.
  • 41. Firewalls Proxy Gateway  Is also called a bastion host.  Is a firewall that simulates the (proper) effects of an application so that the application will receive only requests to act properly.
  • 42. Firewalls Proxy Gateway  To understand the real purpose of a proxy gateway, we consider some examples:  A company wants to set up an online lists so that outsiders can see the products and prices offered. It wants to be sure that no outsider can change the prices or product list and that outsiders can access only the price list not any of the more sensitive files stored inside.
  • 43.
  • 44. Firewalls Guard  A guard is a sophisticated proxy firewall.  The guard decides what services to perform on the user’s behalf based on its available knowledge such as whether it can reliably know of the (outside) user’s identity, previous interactions and so forth.
  • 45. Firewalls Guard  Here are some more sophisticated examples of guard activities:  A university wants to allow its students to use email up to a limit of so many messages or so many characters of email in the last so many days. Although this result could be achieved by modifying email handlers it is more easily done by monitoring the common point through which all email flows (the mail transfer protocol).  A school wants its students to be able to access the WWW but because of the slow speed of its connection to the Web it will allow only so many characters per download image.
  • 46. Firewalls Firewalls are not complete solutions to all computer security problems.  Firewalls can protect an environment only if the firewalls control the entire perimeter.  Firewall do not protect data outside the perimeter.  Firewall are the most visible part of an installation to the outside and therefore is the most attractive point of attack.  Firewalls are targets of penetrators.  Firewalls must be correctly configured.  Firewalls exercise only minor control over the content admitted to the inside – inaccurate data or malicious code must be controlled inside the perimeter.