Lecture 1.2 (:heavy_check_mark:The main security concerns (How can…
:heavy_check_mark:The main security concerns
How can information be secured during transmission?
How can stored data be secured before it can be retrieved?
How can authorisation be enforced?
How do you make sure either the sender or receiver not to deny a transmitted message?
How can authentication be done?
Can the system be attacked from outside even if you have firewalls?
:heavy_check_mark:Network Security Issues
Keep services continually operational
how someone prove that they are who they say they are
Assure messages are received as sent
make sure that provided objects are accessed by authorized entities.Who can access what and when
Protect data from passive attack or traffic analysis
– Prevent either sender or receiver from denying a transmitted message
:heavy_check_mark:TCP/IP & Possible Security Enhancement
Kerboros, HTTPS, SMINE, PGP…
Hardware chip for Encryption
:heavy_check_mark:Generic Message Format
:heavy_check_mark:security weakness are
Network spoofing : one machine can masquerade as another machine temporarily