System an network security, Degree thesis for Computer Systems Networking and Telecommunications. University of Mumbai
pranali-patil
pranali-patil

System an network security, Degree thesis for Computer Systems Networking and Telecommunications. University of Mumbai

14 pages
37Number of visits
Description
used for network security easy language
20 points
Download points needed to download
this document
Download the document
Preview3 pages / 14
This is only a preview
3 shown on 14 pages
Download the document
This is only a preview
3 shown on 14 pages
Download the document
This is only a preview
3 shown on 14 pages
Download the document
This is only a preview
3 shown on 14 pages
Download the document
Unit 4

System and Network Security

1WE-it tutorials

 Integrity

Secrecy

2WE-it tutorials

 Any action that compromises the security of information owned by an organization.

 Passive Attacks

 Active Attacks

3WE-it tutorials

 Passive Attacks are those wherein the attacker indulges in monitoring the data which is in transit.

 The attacker does not attempt to modify the data.

 That’s why they are hard to detect. Only prevention can be done rather than detection or corrective steps.

Passive Attacks do not involve any modification

to the contents of an original message .

Again divided into 2 sub categories:-

1.) Release of message contents

2.) Traffic Analysis.

4WE-it tutorials

 The active attacks are based on the modification of the original message in some particular manner or on creation of a false message.

 These attacks cannot be prevented easily.  However efforts can be taken to detect them and recover

from them.

In Active Attacks the contents of the original

message are modified in some way.

These attacks can be in the form of :-

1.) Masquerade.

2.) Replay.

3.) Modification.

4.) Denial of Service

5WE-it tutorials

6WE-it tutorials

7WE-it tutorials

8WE-it tutorials

9WE-it tutorials

10WE-it tutorials

 Security Services are something that enhances the security of the data processing systems and the

information transfers of an organization

11WE-it tutorials

 Authentication

It helps establish proof of identities.

 Access Control Who should be able to access what.

 Data Confidentiality Only the sender and the intended receiver should access the

message.

 Data Integrity The contents of the message should remain same when the

receiver receives it.

 Non repudiation

Had done the work but denies it.

 Availability Service

Resources should be available to all authenticated persons who need them.

12WE-it tutorials

 A mechanism that is designed to detect, prevent, or recover from a security attack

13WE-it tutorials

 Encipherment  mathematical algorithms

 Digital Signature  recipient of the data unit to prove

 Access Control  Data Integrity  Authentication Exchange  Traffic Padding  frustrate traffic analysis attempts by bogus data

 Routing Control  Notarization  trusted third party

 Trusted Functionality  Security Label  Event Detection  Security Audit Trial  examination of system records and activities

 Security Recovery

14WE-it tutorials

no comments were posted
This is only a preview
3 shown on 14 pages
Download the document