SlideShare uma empresa Scribd logo
1 de 46
CHAPTER 7
SECURITY IN NETWORKS AND
DISTRIBUTED SYSTEM
INTRODUCTION
 Network is two devices connected across some
medium by hardware and software that complete the
communications (simple definition of network).
User (Client)
Host
Server
Communication medium
Simple View of Network
Introduction
 A network is normally not just single client to a
single server; typically many clients interact with
many servers.
User (Client) Host Server
User (Client)
User (Client)
User (Client)
Host Server
User (Client)
User (Client)
User (Client)
System A
System B
Network Security Issues
Network have security problems for the following reasons:
 Sharing – resources and workload sharing
 Complexity of system
 Unknown parameter – expandability of a network also implies
uncertainty about the network boundary
 Many points of attack – file may past through many host before
reaching the destination
 Anonymity – attacker can mount an attack with touching the
system
 Unknown path – there may be many path from one host to
another.
Possible Network Security Threats
 Wiretapping
 Impersonation
 Message confidence violations
 Message integrity violations
 Hacking
 Denial of Service (DoS)
Possible Network Security Threats
Wiretapping
 Wiretap means to intercept communications.
 Passive / Active Wiretapping
 Packet sniffer can retrieve all packets on the net.
 “Inductance” is a process where an intruder can tap a
wire without making physical contact with the cable.
 Microwave and satellite – higher possibility of
interception due to wider broadcasting.
Possible Network Security Threats
Wiretapping
 Optical fiber offers two significant security
advantages:
 The entire optical network must be tuned carefully each
time a new connection is made. Therefore, no one can tap
an optical system without detection.
 Optical fiber carries light energy, not electricity. Light
does not emanate a magnetic field as electricity does.
Therefore an inductive tap is impossible on an optical
fiber cable.
Possible Network Security Threats
Wiretapping
 However, optical fiber also has weaknesses
where wiretappers will try to tap at the
repeaters, splices and other equipments that
connects to the fiber optic and thus creates
vulnerabilities.
Possible Network Security Threats
Impersonation
 Pretend to be someone (personnel) or something
(process).
 In an impersonation, the attacker has several choices:
 Guess the identity and authentication details of the target
 Pick up the identity and authentication details of the target
from a previous communication
 Circumvent or disable the authentication mechanism at
the target computer
 Use a target that will not be authenticated
 Use a target whose authentication data is known
Possible Network Security Threats
Message Confidentiality Violations
 Misdelivery
 Exposure
 Traffic Flow Analysis
Possible Network Security Threats
Message Integrity Violations
 Falsification of Messages
 Change the content of a message
 Change any part of the content of a message
 Replace a message entirely
 Redirect a message
 Destroy or delete the message
 Noise – unintentional interference
Possible Network Security Threats
Hacking
 A source of threat to security in computer
communication.
 Hacker is considered as a separate threat because a
hacker can develop tools to search widely and
quickly for particular weaknesses and move swiftly
to exploit weaknesses.
 In this way, hacker has unlimited time to analyze,
plan, code, simulate and test for future attack.
 In reviewing the effects of this attack ; if it succeeds,
what additional capability would that give the hacker
for future attacks?
Possible Network Security Threats
Denial of Service
 Result of any action or series of actions that
prevents any part of a telecommunications
system from functioning.
 Connectivity
 Flooding
 Routing problems
 Disruption of Service
Network Security Control
 Encryption – link encryption, end-to-end encryption
 Link Encryption:
 Data is encrypted just before the system places it on the
physical communication links.
 Decryption occurs just as the communication enters the
receiving computer.
Application
Presentation
Session
Transport
Network
Data Link
Physical
Sender ReceiverMessage
Intermediate
Host
Message
(Plaintext)
Exposed
Message Encrypted Message in Plaintext: Exposed
Link Encryption
Network Security Control
 End-to-end encryption:
 Provides security from one end of a transmission
through the other.
Application
Presentation
Session
Transport
Network
Data Link
Physical
Sender Message
Intermediate
Host
Message Encrypted Message in Plaintext: Exposed
Receiver
End-to-End Encryption
Network Security Control
Link Encryption versus End-to-end Encryption:
Link Encryption End-to-end Encryption
Security Within Hosts
Message exposed in the sending host
Message expose in intermediate nodes
Security Within Hosts
Message encrypted in sending host
Message encrypted in intermediate nodes
Role of User
Applied by sending host
Invisible to user
Host maintains encryption
Can be done in hardware
All or no messages encrypted
Role of User
Applied by sending process
User applies encryption
User must find algorithm
Software implementation
User chooses to encrypt or not, for each
message
Authentication Issues in Distributed System
There are two main concern regarding authentication
issue in distributed system which are:
(1) How to ensure the authenticity of the communicating
hosts?
(2) How to ensure authenticity of users who are using the
hosts?
Authentication Issues in Distributed System
That is by using:
 Digital Distributed Authentication
 DCE (Distributed Computer Environment)
 Kerberos
 SESAME
 CORBA
Authentication Issues in Distributed System
Kerberos
 Is a system that supports authentication in distributed
systems.
 Was designed at Massachusetts Institute of
technology.
 The basis of kerberos is a central server that provides
authenticated tokens called tickets to requesting
applications.
Authentication Issues in Distributed System
KERBEROS
Initiating a Kerberos Session:
Authentication Issues in Distributed System
KERBEROS
Obtaining a Ticket to Access a File:
KERBEROS:
Access to Services and Servers in Kerberos
Authentication Issues in Distributed System
Kerberos was carefully designed to withstand attacks in
distributed environments:
 No password communicated on the network
 Cryptographic protection against spoofing
 Limited period of validity
 Time stamps to prevent replay attacks
 Mutual authentication
Authentication Issues in Distributed System
 Kerberos is not a perfect answer to security problems
in distributed systems because:
 Kerberos requires continuous availability of a trusted
ticket granting server.
 Authenticity of servers requires a trusted relationship
between the ticket granting server and every server
 Kerberos requires timely transactions
 A subverted workstation can save and later replay user
passwords
Authentication Issues in Distributed System
 Kerberos is not a perfect answer to security
problems in distributed systems because:
 Password guessing works
 Kerberos does not scale well
 Kerberos is not a complete solution
Privacy Enhanced Electronic Mail (PEM)
 The basis of PEM is encryption.
 In order to send a PEM message the sender
must have a certificate for the receiver.
Message header
+ Body
Message
Encryption
key
Receiver’s
public key
New header
Encrypted data
Encrypted key
Encrypted
Message
Header +
Body
Public key encryption
Symmetric key
encryption
Compose
message
PEM processing
requested ?
PEM
Send message
Receive message
Privacy
enhanced ?
PEM
View message
Yes
No
Yes
No
PEM processing in Message Transmission
Privacy Enhanced Electronic Mail (PEM)
 The major problem with PEM is key management.
 Therefore PGP was designed to overcome this
problem.
Pretty Good Privacy (PGP)
 Was designed by Phil Zimmerman to offer a reasonable
degree of privacy for email.
 It uses a message structuring scheme similar to PEM.
 The key management for PGP is ad hoc.
 Each user has a set of people he or she knows and trusts.
 The user exchanges public keys with those friends, exactly as
one might swap business card at meeting.
 Some people accept not just the friends’ public key but also
all public keys their friends have.
Pretty Good privacy (PGP)
 The assumption here is that any friend of yours is a
friend of mine.
 A PGP user builds a key ring which is the set of all
public keys that person possesses.
 In that way, when an encrypted messages arrives, the
person can decrypt it if the key is on that person’s
key ring.
Firewalls
 A firewall is a process that filters all traffic between
a protected or “inside” network and a less
trustworthy or “outside” network.
 There are three types of firewall:
 Screening Routers
 Proxy gateways
 Guards
Firewalls
Screening Router
 Is the simplest and in some situations the most effective type
of firewall.
 Hosts tend not to be connected directly to a wide area
network; more often hosts are connected to a router.
Firewalls
Router joining LAN to two WANs
Firewalls
Screening Router
 Router will only see the header of the message.
 Header will contain information on:
 The sender/receiver address
 Protocol
 Port
 Length of a packet
 It can also control the traffic based on application – by using
port numbers (eg: 21 for FTP and 25 for SMTP)
 It can also decide which application is acceptable and not
acceptable.
 It can also determine the authentication of an inside address.
Firewalls
Proxy Gateway
 Is also called a bastion host.
 Is a firewall that simulates the (proper) effects
of an application so that the application will
receive only requests to act properly.
Firewalls
Proxy Gateway
 To understand the real purpose of a proxy
gateway, we consider some examples:
 A company wants to set up an online lists so that
outsiders can see the products and prices offered.
It wants to be sure that no outsider can change the
prices or product list and that outsiders can access
only the price list not any of the more sensitive
files stored inside.
Firewalls
Guard
 A guard is a sophisticated proxy firewall.
 The guard decides what services to perform on the
user’s behalf based on its available knowledge such
as whether it can reliably know of the (outside)
user’s identity, previous interactions and so forth.
Firewalls
Guard
 Here are some more sophisticated examples of guard
activities:
 A university wants to allow its students to use email up to
a limit of so many messages or so many characters of
email in the last so many days. Although this result could
be achieved by modifying email handlers it is more easily
done by monitoring the common point through which all
email flows (the mail transfer protocol).
 A school wants its students to be able to access the WWW
but because of the slow speed of its connection to the
Web it will allow only so many characters per download
image.
Firewalls
Firewalls are not complete solutions to all
computer security problems.
 Firewalls can protect an environment only if the firewalls
control the entire perimeter.
 Firewall do not protect data outside the perimeter.
 Firewall are the most visible part of an installation to the
outside and therefore is the most attractive point of attack.
 Firewalls are targets of penetrators.
 Firewalls must be correctly configured.
 Firewalls exercise only minor control over the content
admitted to the inside – inaccurate data or malicious code
must be controlled inside the perimeter.

Mais conteúdo relacionado

Mais procurados

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithmRuchi Maurya
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 

Mais procurados (20)

Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Email security
Email securityEmail security
Email security
 
Software security
Software securitySoftware security
Software security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Cloud security
Cloud securityCloud security
Cloud security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network security
Network securityNetwork security
Network security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 

Destaque

1. chapter 1 introduction of Finance
1. chapter 1 introduction of Finance1. chapter 1 introduction of Finance
1. chapter 1 introduction of FinanceAfiqEfendy Zaen
 
OS Database Security Chapter 6
OS Database Security Chapter 6OS Database Security Chapter 6
OS Database Security Chapter 6AfiqEfendy Zaen
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPointAmy McMullin
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 ReviewAmy McMullin
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
2. financial statement cash flow
2. financial statement cash flow2. financial statement cash flow
2. financial statement cash flowAfiqEfendy Zaen
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
10. cash flow in capital budgeting
10. cash flow in capital budgeting10. cash flow in capital budgeting
10. cash flow in capital budgetingAfiqEfendy Zaen
 
Network security
Network securityNetwork security
Network securitytoamma
 
Bbm Guvenlik Semineri
Bbm Guvenlik SemineriBbm Guvenlik Semineri
Bbm Guvenlik Seminerieroglu
 
Bluetooth Guvenligi Sunum
Bluetooth Guvenligi SunumBluetooth Guvenligi Sunum
Bluetooth Guvenligi Sunumeroglu
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4AfiqEfendy Zaen
 
Optik Aglarin Guvenligi
Optik Aglarin GuvenligiOptik Aglarin Guvenligi
Optik Aglarin Guvenligieroglu
 
Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2AfiqEfendy Zaen
 

Destaque (20)

1. chapter 1 introduction of Finance
1. chapter 1 introduction of Finance1. chapter 1 introduction of Finance
1. chapter 1 introduction of Finance
 
OS Database Security Chapter 6
OS Database Security Chapter 6OS Database Security Chapter 6
OS Database Security Chapter 6
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPoint
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 Review
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
3 financial ratio
3 financial ratio3 financial ratio
3 financial ratio
 
6. risk return
6. risk return6. risk return
6. risk return
 
6. bond valuation
6. bond valuation6. bond valuation
6. bond valuation
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
2. financial statement cash flow
2. financial statement cash flow2. financial statement cash flow
2. financial statement cash flow
 
Network Security
Network SecurityNetwork Security
Network Security
 
10. cash flow in capital budgeting
10. cash flow in capital budgeting10. cash flow in capital budgeting
10. cash flow in capital budgeting
 
Network security
Network securityNetwork security
Network security
 
Bbm Guvenlik Semineri
Bbm Guvenlik SemineriBbm Guvenlik Semineri
Bbm Guvenlik Semineri
 
Bluetooth Guvenligi Sunum
Bluetooth Guvenligi SunumBluetooth Guvenligi Sunum
Bluetooth Guvenligi Sunum
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4
 
Optik Aglarin Guvenligi
Optik Aglarin GuvenligiOptik Aglarin Guvenligi
Optik Aglarin Guvenligi
 
Edi new
Edi newEdi new
Edi new
 
Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2
 

Semelhante a Network Security Chapter 7

wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction SecurityMeet Soni
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iinventionjournals
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsPalani Kumar
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking securityRaja Waseem Akhtar
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measureShivam Singh
 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideErica StJohn
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Securitydrkelleher
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Miigaa Mine
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network securityManish Tiwari
 

Semelhante a Network Security Chapter 7 (20)

wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Security
SecuritySecurity
Security
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-Guide
 
Network security
Network securityNetwork security
Network security
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
 
Security - ch5.ppt
Security - ch5.pptSecurity - ch5.ppt
Security - ch5.ppt
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Ip security
Ip security Ip security
Ip security
 

Mais de AfiqEfendy Zaen

Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
10. short term financial planning
10. short term financial planning10. short term financial planning
10. short term financial planningAfiqEfendy Zaen
 

Mais de AfiqEfendy Zaen (6)

Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
10. short term financial planning
10. short term financial planning10. short term financial planning
10. short term financial planning
 
9. cost of capital
9. cost of capital9. cost of capital
9. cost of capital
 
8. stock valuation
8. stock valuation8. stock valuation
8. stock valuation
 
4. time value of money
4. time value of money4. time value of money
4. time value of money
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Network Security Chapter 7

  • 1. CHAPTER 7 SECURITY IN NETWORKS AND DISTRIBUTED SYSTEM
  • 2. INTRODUCTION  Network is two devices connected across some medium by hardware and software that complete the communications (simple definition of network). User (Client) Host Server Communication medium Simple View of Network
  • 3. Introduction  A network is normally not just single client to a single server; typically many clients interact with many servers. User (Client) Host Server User (Client) User (Client) User (Client) Host Server User (Client) User (Client) User (Client) System A System B
  • 4. Network Security Issues Network have security problems for the following reasons:  Sharing – resources and workload sharing  Complexity of system  Unknown parameter – expandability of a network also implies uncertainty about the network boundary  Many points of attack – file may past through many host before reaching the destination  Anonymity – attacker can mount an attack with touching the system  Unknown path – there may be many path from one host to another.
  • 5. Possible Network Security Threats  Wiretapping  Impersonation  Message confidence violations  Message integrity violations  Hacking  Denial of Service (DoS)
  • 6. Possible Network Security Threats Wiretapping  Wiretap means to intercept communications.  Passive / Active Wiretapping  Packet sniffer can retrieve all packets on the net.  “Inductance” is a process where an intruder can tap a wire without making physical contact with the cable.  Microwave and satellite – higher possibility of interception due to wider broadcasting.
  • 7. Possible Network Security Threats Wiretapping  Optical fiber offers two significant security advantages:  The entire optical network must be tuned carefully each time a new connection is made. Therefore, no one can tap an optical system without detection.  Optical fiber carries light energy, not electricity. Light does not emanate a magnetic field as electricity does. Therefore an inductive tap is impossible on an optical fiber cable.
  • 8. Possible Network Security Threats Wiretapping  However, optical fiber also has weaknesses where wiretappers will try to tap at the repeaters, splices and other equipments that connects to the fiber optic and thus creates vulnerabilities.
  • 9. Possible Network Security Threats Impersonation  Pretend to be someone (personnel) or something (process).  In an impersonation, the attacker has several choices:  Guess the identity and authentication details of the target  Pick up the identity and authentication details of the target from a previous communication  Circumvent or disable the authentication mechanism at the target computer  Use a target that will not be authenticated  Use a target whose authentication data is known
  • 10. Possible Network Security Threats Message Confidentiality Violations  Misdelivery  Exposure  Traffic Flow Analysis
  • 11. Possible Network Security Threats Message Integrity Violations  Falsification of Messages  Change the content of a message  Change any part of the content of a message  Replace a message entirely  Redirect a message  Destroy or delete the message  Noise – unintentional interference
  • 12. Possible Network Security Threats Hacking  A source of threat to security in computer communication.  Hacker is considered as a separate threat because a hacker can develop tools to search widely and quickly for particular weaknesses and move swiftly to exploit weaknesses.  In this way, hacker has unlimited time to analyze, plan, code, simulate and test for future attack.  In reviewing the effects of this attack ; if it succeeds, what additional capability would that give the hacker for future attacks?
  • 13. Possible Network Security Threats Denial of Service  Result of any action or series of actions that prevents any part of a telecommunications system from functioning.  Connectivity  Flooding  Routing problems  Disruption of Service
  • 14. Network Security Control  Encryption – link encryption, end-to-end encryption  Link Encryption:  Data is encrypted just before the system places it on the physical communication links.  Decryption occurs just as the communication enters the receiving computer.
  • 16. Network Security Control  End-to-end encryption:  Provides security from one end of a transmission through the other.
  • 17. Application Presentation Session Transport Network Data Link Physical Sender Message Intermediate Host Message Encrypted Message in Plaintext: Exposed Receiver End-to-End Encryption
  • 18. Network Security Control Link Encryption versus End-to-end Encryption: Link Encryption End-to-end Encryption Security Within Hosts Message exposed in the sending host Message expose in intermediate nodes Security Within Hosts Message encrypted in sending host Message encrypted in intermediate nodes Role of User Applied by sending host Invisible to user Host maintains encryption Can be done in hardware All or no messages encrypted Role of User Applied by sending process User applies encryption User must find algorithm Software implementation User chooses to encrypt or not, for each message
  • 19. Authentication Issues in Distributed System There are two main concern regarding authentication issue in distributed system which are: (1) How to ensure the authenticity of the communicating hosts? (2) How to ensure authenticity of users who are using the hosts?
  • 20. Authentication Issues in Distributed System That is by using:  Digital Distributed Authentication  DCE (Distributed Computer Environment)  Kerberos  SESAME  CORBA
  • 21. Authentication Issues in Distributed System Kerberos  Is a system that supports authentication in distributed systems.  Was designed at Massachusetts Institute of technology.  The basis of kerberos is a central server that provides authenticated tokens called tickets to requesting applications.
  • 22. Authentication Issues in Distributed System KERBEROS Initiating a Kerberos Session:
  • 23. Authentication Issues in Distributed System KERBEROS Obtaining a Ticket to Access a File:
  • 24. KERBEROS: Access to Services and Servers in Kerberos
  • 25. Authentication Issues in Distributed System Kerberos was carefully designed to withstand attacks in distributed environments:  No password communicated on the network  Cryptographic protection against spoofing  Limited period of validity  Time stamps to prevent replay attacks  Mutual authentication
  • 26. Authentication Issues in Distributed System  Kerberos is not a perfect answer to security problems in distributed systems because:  Kerberos requires continuous availability of a trusted ticket granting server.  Authenticity of servers requires a trusted relationship between the ticket granting server and every server  Kerberos requires timely transactions  A subverted workstation can save and later replay user passwords
  • 27. Authentication Issues in Distributed System  Kerberos is not a perfect answer to security problems in distributed systems because:  Password guessing works  Kerberos does not scale well  Kerberos is not a complete solution
  • 28. Privacy Enhanced Electronic Mail (PEM)  The basis of PEM is encryption.  In order to send a PEM message the sender must have a certificate for the receiver.
  • 29. Message header + Body Message Encryption key Receiver’s public key New header Encrypted data Encrypted key Encrypted Message Header + Body Public key encryption Symmetric key encryption
  • 30.
  • 31. Compose message PEM processing requested ? PEM Send message Receive message Privacy enhanced ? PEM View message Yes No Yes No PEM processing in Message Transmission
  • 32. Privacy Enhanced Electronic Mail (PEM)  The major problem with PEM is key management.  Therefore PGP was designed to overcome this problem.
  • 33. Pretty Good Privacy (PGP)  Was designed by Phil Zimmerman to offer a reasonable degree of privacy for email.  It uses a message structuring scheme similar to PEM.  The key management for PGP is ad hoc.  Each user has a set of people he or she knows and trusts.  The user exchanges public keys with those friends, exactly as one might swap business card at meeting.  Some people accept not just the friends’ public key but also all public keys their friends have.
  • 34. Pretty Good privacy (PGP)  The assumption here is that any friend of yours is a friend of mine.  A PGP user builds a key ring which is the set of all public keys that person possesses.  In that way, when an encrypted messages arrives, the person can decrypt it if the key is on that person’s key ring.
  • 35. Firewalls  A firewall is a process that filters all traffic between a protected or “inside” network and a less trustworthy or “outside” network.  There are three types of firewall:  Screening Routers  Proxy gateways  Guards
  • 36. Firewalls Screening Router  Is the simplest and in some situations the most effective type of firewall.  Hosts tend not to be connected directly to a wide area network; more often hosts are connected to a router.
  • 38.
  • 39. Firewalls Screening Router  Router will only see the header of the message.  Header will contain information on:  The sender/receiver address  Protocol  Port  Length of a packet  It can also control the traffic based on application – by using port numbers (eg: 21 for FTP and 25 for SMTP)  It can also decide which application is acceptable and not acceptable.  It can also determine the authentication of an inside address.
  • 40.
  • 41. Firewalls Proxy Gateway  Is also called a bastion host.  Is a firewall that simulates the (proper) effects of an application so that the application will receive only requests to act properly.
  • 42. Firewalls Proxy Gateway  To understand the real purpose of a proxy gateway, we consider some examples:  A company wants to set up an online lists so that outsiders can see the products and prices offered. It wants to be sure that no outsider can change the prices or product list and that outsiders can access only the price list not any of the more sensitive files stored inside.
  • 43.
  • 44. Firewalls Guard  A guard is a sophisticated proxy firewall.  The guard decides what services to perform on the user’s behalf based on its available knowledge such as whether it can reliably know of the (outside) user’s identity, previous interactions and so forth.
  • 45. Firewalls Guard  Here are some more sophisticated examples of guard activities:  A university wants to allow its students to use email up to a limit of so many messages or so many characters of email in the last so many days. Although this result could be achieved by modifying email handlers it is more easily done by monitoring the common point through which all email flows (the mail transfer protocol).  A school wants its students to be able to access the WWW but because of the slow speed of its connection to the Web it will allow only so many characters per download image.
  • 46. Firewalls Firewalls are not complete solutions to all computer security problems.  Firewalls can protect an environment only if the firewalls control the entire perimeter.  Firewall do not protect data outside the perimeter.  Firewall are the most visible part of an installation to the outside and therefore is the most attractive point of attack.  Firewalls are targets of penetrators.  Firewalls must be correctly configured.  Firewalls exercise only minor control over the content admitted to the inside – inaccurate data or malicious code must be controlled inside the perimeter.