Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Network Planning and Simulation

CT6054
03 April 2022
Network Security
Security

o Security policies
o Security risk analysis
o Security mechanisms
• Physical security
• Security awareness
• User authentication
• Packet filters
• Application-specific security mechanisms
• Encryption
• Firewalls
• Security and system components
▪ Security at the user component
▪ Security at the host component
▪ Security at the network component
Security Issues (1)

o The term security in general refers to techniques for ensuring that data stored in a
computer cannot be read or compromised.

o Importance
• Rise in external access is coming from telecommuters, business associates,
customers, or potential customers, each with a unique set of computing and data
requirements

o Obvious security measures involve data encryption and passwords.


Security Issues (2)

o Computer network security is dealing with the following aspects:

- Data Integrity: Received = sent?


- Data Availability: Legal users should be able to use.
• Ping continuously => No useful work gets done
- Data Confidentiality and Privacy: No snooping or wiretapping
- Authentication: You are who you say you are.
• Example: A student at Dartmouth University, USA posing as a professor
cancelled the exam.
- Authorization = Access Control: Only authorized users get to the data
Security Risk Assessment:
Why we have to worry about it?
Statistics for Network Security Problems
Security Risk Assessments:
Typical Security Questions.

o What are organization's most valuable intellectual and network assets?


o Where these assets reside?
o What is the risk if they are subjected to unauthorized access?
o How much damage could be done?
• can it be estimated in terms of money?
o Which protocols are involved?
Security Risk Assessments:
Type of Network Assets

Hardware Servers, such as mail servers, web servers, DNS servers, DHCP servers, and LAN
file servers
· Client computers
· Devices such as hubs, switches, and routers
Circuits Locally operated circuits such LANs and backbones
· Contracted circuits such as MAN and WAN circuits
· Internet access circuits
Network Software Server operating systems and system settings
· Applications software such as mail server and web server
software
Client Software Operating systems and system settings Application software such as word
processors
Organizational Data Databases with organizational records

Mission critical applications For example, for an Internet bank, the Web site is mission critical
Security Risk Assessment:

Type of Security Threats


o Disruption is the loss or reduction in network service.
o Destruction of data may be caused by the result of disruption.
o Disaster (natural or manmade) is the event that destroy host computers or large sections
of the network.
o Unauthorized access is gaining access to organizational data files and resources by
hackers or unauthorized employees.
Security Risk Assessment
Security Threats and Examples
Security Risk Assessment
Network Security Threats
Security Risk Assessment
Network Security Threats )data ca. 2002
Security Risk Assessment
Worksheet Example
Security Risk Assessment
Worksheet Example

You might also like