Professional Documents
Culture Documents
Sessions 1, 2, 3
Sessions 1, 2, 3
Introduction
Course Handout
Security Attacks
Security Services
Security Mechanisms
A Model for Network Security
From the book “The Art of War”
by Sun Tzu , a great learning is:
Rely
not on the likelihood of the enemy's not coming, but
on our own readiness to receive him; not on the
chance of his not attacking, but on the fact that we
have made our position undefeatable.
“There is nothing impossible to him who will
try.”
Alexander the Great
Authentication
Non-repudiation
Levels of Impact
security service
Some terms
threat – a potential for violation of security
vulnerability – a way by which loss can happen
attack – an attempt to avoid security services
Types of Attacks
Passive Attacks
(a) Release of message content
(b) Traffic Analysis
Active Attacks
(a) Masquerade
(b) Replay
(c ) Modification of message
(d) Denial of Service
Passive Attack
(a) Release of message Contents
Passive Attack
(b) Traffic Analysis
Observe pattern of
Message from
Bob to Alice
Active Attack
(a) Masquerade
Active Attack
(b) Replay
Active Attack
(c) Modification of message
Modify message
Active Attack
(d) Denial of Service
Handling Attacks
Encipherment
Digital Signature
Access Control
Data Integrity
Authentication Exchange
Traffic Pading
Routing Control
Notarization
Model for Network Security
Model for Network Security