19
“Network Security & Information Security Maintenance” Independent Study (CS450 ) Under the guidance of: Smitesh.D.Patravali By, KeerthanKumar Shetty 2SD10CS403 CSE 8 ‘B’ SDMCET June 10,2013 Department of Computer Science Department of Computer Science & Engineering & Engineering 1

Network security & information security maintainence modified

Embed Size (px)

DESCRIPTION

S

Citation preview

Page 1: Network security & information security maintainence modified

“Network Security & Information Security

Maintenance”Independent Study (CS450)

Under the guidance of:Smitesh.D.Patravali

By, KeerthanKumar Shetty

2SD10CS403 CSE 8 ‘B’ SDMCET

June 10,2013Department of Computer Science Department of Computer Science & Engineering& Engineering

1

Page 2: Network security & information security maintainence modified

Contents

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

2

Page 3: Network security & information security maintainence modified

Introduction :Network Security O Definition :

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

O Need for Network Security :• Protect vital information while still allowing

access to those who need itEx-Trade secrets, Business records, etc.

• Provide authentication and access control for resources

June 10,2013DepartmentDepartment of Computer Science & of Computer Science & EngineeringEngineering

3

Page 4: Network security & information security maintainence modified

Fundamental Security Objectives

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

4

Page 5: Network security & information security maintainence modified

Security Attacks, Mechanism & Services

O Security Attacks :Any action that compromises the security of information owned by an organization ,group or an individual.

2 types of Security Attacks

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

5

Page 6: Network security & information security maintainence modified

Security Attacks, Mechanism & Services

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

6

Page 7: Network security & information security maintainence modified

Security Attacks, Mechanism & Services

O Authentication Peer-Entity Data OriginO Access ControlO Confidentiality Connection Confidentiality Connectionless Confidentiality Selective Confidentiality Traffic flow Confidentiality

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

7

Page 8: Network security & information security maintainence modified

Security services..Contd..

O Data IntegrityConnection integrity with recoveryConnection integrity without recoveryConnectionless integritySelective field Connection IntegritySelective field Connectionless Integrity

O Non RepudiationNon Repudiation, originNon Repudiation, Destination

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

8

Page 9: Network security & information security maintainence modified

Security Attacks, Mechanism & ServicesO Security Mechanisms :

A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

9

Page 10: Network security & information security maintainence modified

Internetwork Security ModelO A message is to be transferred from one party

to another across some sort of Internet service.O The two parties, who are the principals in this

transaction, must cooperate for the exchange to take place.

O A logical information channel is established by defining a route through the Internet from source to destination and by the cooperative use of communication protocols (e.g., TCP/IP) by the two principals.

Network Security Model

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

10

Page 11: Network security & information security maintainence modified

This general model shows that there are four basic tasks in designing a particular security service:O1. Design an algorithm for performing the security-related transformation. Thealgorithm should be such that an opponent cannot defeat its purpose.O2. Generate the secret information to be used with the algorithm.O3. Develop methods for the distribution and sharing of the secret information.O4. Specify a protocol to be used by the two principals that makes use of the securityalgorithm and the secret information to achieve a particular security service. June

10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

11

Internetwork Security Model

Page 12: Network security & information security maintainence modified

Internet Standards & RFC’s

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

12

Page 13: Network security & information security maintainence modified

Information Security Maintenance

O Once an organization has improved the security posture of the organization, the security group must turn its attention to the maintenance of security readiness

O Information security must constantly monitor the threats, assets, and vulnerabilities

O The team also reviews external information to stay on top of the latest general and specific threats to its information security

O It is more expensive to reengineer the information security profile again and again

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

13

Page 14: Network security & information security maintainence modified

Security Management ModelsManagement models are frameworks that structure the tasks of managing a particular set of activities or business functions.

ISO ModelThe ISO management model is a five-layer approach that provides structure to the administration and management of networks and systemsThe core ISO model addresses management and operation thorough five topics:

O Fault managementO Configuration and Change managementO Accounting managementO Performance managementO Security management

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

14

Page 15: Network security & information security maintainence modified

ISO Model Contd….

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

15

Page 16: Network security & information security maintainence modified

The Maintenance Model

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

16

Page 17: Network security & information security maintainence modified

Conclusion

O Hence, we can conclude that the need for security in communicating networks is mandatory & the techniques provided to maintain information security are more reliable & implementing the same can serve our purpose in achieving higher security to our Information & network.

June 10,2013Department of Computer Science & Department of Computer Science & EngineeringEngineering

17

Page 18: Network security & information security maintainence modified

www.Wikepeadia.com.Network Security Essentials ,Fourth

Edition by William Stallings.Principles of Information Security by

Michael D Whitman.

June 10,2013Department of Computer Science & Engineering

18

References

Page 19: Network security & information security maintainence modified

Thank you!!!

June 10,2013

Department of Computer Science & Engineering

19