Please enable JavaScript.
Coggle requires JavaScript to display documents.
Lecture 1.2 (:heavy_check_mark:The main security concerns (How can…
Lecture 1.2
:heavy_check_mark:The main security concerns
How can information be secured during transmission?
How can stored data be secured before it can be retrieved?
How can authorisation be enforced?
How do you make sure either the sender or receiver not to deny a transmitted message?
How can authentication be done?
Can the system be attacked from outside even if you have firewalls?
:heavy_check_mark:Network Security Issues
Availability:
Keep services continually operational
Authentication:
how someone prove that they are who they say they are
Integrity:
Assure messages are received as sent
Access Control:
make sure that provided objects are accessed by authorized entities.Who can access what and when
Confidentiality:
Protect data from passive attack or traffic analysis
Non-repudiation:
– Prevent either sender or receiver from denying a transmitted message
:heavy_check_mark:TCP/IP & Possible Security Enhancement
Application
Kerboros, HTTPS, SMINE, PGP…
Transport
SSL, TLS
Network
IP Sec
Data Link
Encrypting packets
Physical
Hardware chip for Encryption
:heavy_check_mark:Generic Message Format
Recipient Identity
Message Length
Sender Identify
Message Data
:heavy_check_mark:security weakness are
Message replay
Authentication issues
Network spoofing : one machine can masquerade as another machine temporarily