SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Chapter 1:
Introduction

1
Technology History
Technology History
Security Use
Security Use
Security Layer
Security Layer
Why Security?
Why Security?

Attack/Hack
Attack/Hack
2
A Technology play role
and
influence in community service

3
Consumer Market
First, Let us look at the Evolution of Communications

4
Extracted from : Next Generation Home Networks: Driving a New Society?
Consumer Market
80-90s: A New World Called Internet

•
•

The start of the Internet
for masses using dial-up:
Phone line is shared
between the PC and the
phone
– Emergence of the ISP
concept with AOL,…
New concept:
Content available to
everybody

•
•

Modem

•
•

First Internet boom:
“New economy concept”

Phone Line
28 – 56kbps

5
Extracted from : Next Generation Home Networks: Driving a New Society?
Consumer Market
2000 – 2003: The Beginning of the Always-On Concept
•

Emergence of the ADSL
technology:
– Higher bandwidth than
dial-up: typically 64k to
384kbps
– “Always on” concept; i.e.,
no busy signal

•

Device per service
– One phone
– One PC

ADSL
64 – 384 kbps
6
Extracted from : Next Generation Home Networks: Driving a New Society?
Consumer Market
2003 – 2005: Emergence of Basic Home Networks and Triple Play Services
•

•

xDSL
20+ Mbps

Emergence of the new
DSL and xPON
technologies:
– Higher bandwidth than
ADSL: typically 20Mbps
per home
First signs of home
networks with the
digitalization of the Home:
– Digital Camera,
Camcorder, Playstation,
DVD, iPOD…

7
Extracted from : Next Generation Home Networks: Driving a New Society?
Consumer Market
2005 – 2015: The Digital Connected Home
•

Many multi-service devices
in the home:
– All using IP as a
foundation

•

Virtualization of Content:
– Access content
anywhere/anytime,
whether it is home-based
(Personal) or networkbased (Public)

•

Communications and
Entertainment

8
Extracted from : Next Generation Home Networks: Driving a New Society?
Example of Network Infrastructure
BTU

Residential Gateway (RG)
Broadband Termination Unit (BTU)

9
Technology History
Technology History
Security Use
Security Use
Security Layer
Security Layer
Why Security?
Why Security?

Attack/Hack
Attack/Hack
10
We will see now where a security mechanism is
mbed on technology.

Security use in daily basis.

11
Services

DATA

VOICE

IMAGE
12
Security use in daily basis 1 - biometric

13
Security use in daily basis 2 - Business

14
Security use in daily basis 3 – Voice Communication

15
Security use in daily basis 4 – Integration Operation

16
Security use in daily basis 5 – Operating System

17
Security use in daily basis 6 – WEB

18
Technology History
Technology History
Security Use
Security Use
Security Layer
Security Layer
Why Security?
Why Security?

Attack/Hack
Attack/Hack
19
Let me share with you on OSI layers
and
Internet layers
20
Seventh layers OSI Model
Application

Application
OSI Model

Network process to application

Presentation

Data Unit

Layer

Function

Application

Application

Application

Network process to application

Presentation
Host
Layers
Session

Presentation
Data

Presentation

Data representation and encryption

Session

Interhost communication

Segments

Transport

End-to-end communications and
reliability (TCP)

Network

Packets

Network

Path determination and logical
addressing (IP)

Media
Data Link
Layers

Frames

Data Link

Physical addressing (MAC & LLC)

Bits

Physical

Media, Signal and binary
transmission
21
Five Layers TCP/IP Model

Application

Transport

Application
DHCP • DNS • FTP • Gopher • HTTP • IMAP4 • IRC • NNTP • XMPP • MIME •
POP3 • SIP • SMTP • SNMP • SSH • TELNET • RPC • RTP • RTCP • TLS/SSL •
SDP • SOAP • VPN • PPTP • L2TP • GTP •
Presentation

TCP • UDP • DCCP • SCTP •

Internet

IP (IPv4 • IPv6) • IGMP • ICMP • RSVP • BGP • RIP • OSPF • ISIS • IPsec •
ARP • RARP •

Data Link

802.11 • ATM • DTM • Ethernet • FDDI • Frame Relay •
GPRS • EVDO • HSPA • HDLC • PPP •

Physical

Ethernet physical layer • ISDN • Modems • PLC •
SONET/SDH • G.709 • Wireless •

22
Five Layers TCP/IP Model

Refer to the TCP/IP Presentation Slides

23
Before I explain to you on security layer
Let review back the slides that presenting on
“security use in daily basis”
24
What is behind of these applications?
What is a mechanism that make it secure?

25
Security Layer *

Applications

Protocol

Cryptography

Applications:
Web, email, any application use security
mechanism

Protocol:
SSL, TLS

Algorithm:
Symmetric, Asymmetric (i.e.:Cipher, DES, AES)

* This approach is totally under my knowledge and experience, is not a standard, just to understand
26
the layer concept.
Security versus OSI & TCP/IP Model
OSI

TCP/IP

Application

Application

Presentation

Application
Presentation

Security

Applications

Session
Transport

Transport

Network

Internet

Data Link

Data Link

Physical

Physical

Protocol

Cryptography
27
Technology History
Technology History
Security Use
Security Use
Security Layer
Security Layer
Why Security?
Why Security?

Attack/Hack
Attack/Hack
28
Concept

Why we want security?
Let review back the slides that presenting on
“security use in daily basis”

29
Could you explain to me why we need security?

30
Why We Need Security
Privacy

The protection of data from unauthorized disclosure.

Integrity

The assurance that data received are exactly as sent by an
authorized entity (i.e., contain no modification, insertion,
deletion.

Authentication

The assurance that the communicating entity is the one that it
claims to be.

Provides protection against denial by one of the entities
Nonrepudation involved in a communication of having participated in all
or part of the communication.
Security Services (X.800)

31
Technology History
Technology History
Security Use
Security Use
Security Layer
Security Layer
Why Security?
Why Security?

Attack/Hack
Attack/Hack
32
Hacking - 1

33
Hacking - 2

DATA CENTER

34
Type of Attacks

Passive

Active

Passive attacks are in the nature of eavesdropping on,
or monitoring of, transmissions. The goal of the opponent
is to obtain information that is being transmitted. Two types
of passive attacks are release of message contents and
traffic analysis.

Active attacks involve some modification of the data stream
or the creation of a false stream and can be subdivided into
four categories: masquerade, replay, modification of
messages, and denial of service.

35
Passive Attack
Release of Message Contents

Read contents of
message from Bob
to Alice

Traffic Analysis

Observe pattern of
messages from Bob
to Alice

36
Active Attack - 1
Masquerade

Message from Hacker
that appears to be from Bob

Replay*

Capture message from
Bob to Alice; later
replay message to Alice

* An attack in which a service already authorized and completed is forged by
another "duplicate request" in an attempt to repeat authorized commands.

37
Active Attack - 2
Modification of messages

Modifies message from Bob to Alice

Denial of Service

disrupts service provided by server

38
How Do You Want Protect Your Network System

Thank You
See You Next Week

39

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security
Cyber securityCyber security
Cyber securitySakib Sami
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securityVansh Bathla
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationhamzakareem2
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsJim Kaplan CIA CFE
 
Cyber Threat Simulation
Cyber Threat SimulationCyber Threat Simulation
Cyber Threat SimulationTonex
 
Network security
Network securityNetwork security
Network securitymena kaheel
 

Was ist angesagt? (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal Auditors
 
Cyber Threat Simulation
Cyber Threat SimulationCyber Threat Simulation
Cyber Threat Simulation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 

Ähnlich wie SYSTEM SECURITY - Chapter 1 introduction

전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-JM code group
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 IntroducationTushar Rajput
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, AbstractVictoria Burke
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSamantha Randall
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital SecurityLindsey Jones
 
Lecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptxLecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptxSurendraBasnet6
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsGordon Haff
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 

Ähnlich wie SYSTEM SECURITY - Chapter 1 introduction (20)

Cyber security
Cyber securityCyber security
Cyber security
 
saag-3.ppt
saag-3.pptsaag-3.ppt
saag-3.ppt
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
It 241 Week 1 Cp Essay
It 241 Week 1 Cp EssayIt 241 Week 1 Cp Essay
It 241 Week 1 Cp Essay
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, Abstract
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
Lecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptxLecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptx
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 

Kürzlich hochgeladen

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Kürzlich hochgeladen (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

SYSTEM SECURITY - Chapter 1 introduction

  • 2. Technology History Technology History Security Use Security Use Security Layer Security Layer Why Security? Why Security? Attack/Hack Attack/Hack 2
  • 3. A Technology play role and influence in community service 3
  • 4. Consumer Market First, Let us look at the Evolution of Communications 4 Extracted from : Next Generation Home Networks: Driving a New Society?
  • 5. Consumer Market 80-90s: A New World Called Internet • • The start of the Internet for masses using dial-up: Phone line is shared between the PC and the phone – Emergence of the ISP concept with AOL,… New concept: Content available to everybody • • Modem • • First Internet boom: “New economy concept” Phone Line 28 – 56kbps 5 Extracted from : Next Generation Home Networks: Driving a New Society?
  • 6. Consumer Market 2000 – 2003: The Beginning of the Always-On Concept • Emergence of the ADSL technology: – Higher bandwidth than dial-up: typically 64k to 384kbps – “Always on” concept; i.e., no busy signal • Device per service – One phone – One PC ADSL 64 – 384 kbps 6 Extracted from : Next Generation Home Networks: Driving a New Society?
  • 7. Consumer Market 2003 – 2005: Emergence of Basic Home Networks and Triple Play Services • • xDSL 20+ Mbps Emergence of the new DSL and xPON technologies: – Higher bandwidth than ADSL: typically 20Mbps per home First signs of home networks with the digitalization of the Home: – Digital Camera, Camcorder, Playstation, DVD, iPOD… 7 Extracted from : Next Generation Home Networks: Driving a New Society?
  • 8. Consumer Market 2005 – 2015: The Digital Connected Home • Many multi-service devices in the home: – All using IP as a foundation • Virtualization of Content: – Access content anywhere/anytime, whether it is home-based (Personal) or networkbased (Public) • Communications and Entertainment 8 Extracted from : Next Generation Home Networks: Driving a New Society?
  • 9. Example of Network Infrastructure BTU Residential Gateway (RG) Broadband Termination Unit (BTU) 9
  • 10. Technology History Technology History Security Use Security Use Security Layer Security Layer Why Security? Why Security? Attack/Hack Attack/Hack 10
  • 11. We will see now where a security mechanism is mbed on technology. Security use in daily basis. 11
  • 13. Security use in daily basis 1 - biometric 13
  • 14. Security use in daily basis 2 - Business 14
  • 15. Security use in daily basis 3 – Voice Communication 15
  • 16. Security use in daily basis 4 – Integration Operation 16
  • 17. Security use in daily basis 5 – Operating System 17
  • 18. Security use in daily basis 6 – WEB 18
  • 19. Technology History Technology History Security Use Security Use Security Layer Security Layer Why Security? Why Security? Attack/Hack Attack/Hack 19
  • 20. Let me share with you on OSI layers and Internet layers 20
  • 21. Seventh layers OSI Model Application Application OSI Model Network process to application Presentation Data Unit Layer Function Application Application Application Network process to application Presentation Host Layers Session Presentation Data Presentation Data representation and encryption Session Interhost communication Segments Transport End-to-end communications and reliability (TCP) Network Packets Network Path determination and logical addressing (IP) Media Data Link Layers Frames Data Link Physical addressing (MAC & LLC) Bits Physical Media, Signal and binary transmission 21
  • 22. Five Layers TCP/IP Model Application Transport Application DHCP • DNS • FTP • Gopher • HTTP • IMAP4 • IRC • NNTP • XMPP • MIME • POP3 • SIP • SMTP • SNMP • SSH • TELNET • RPC • RTP • RTCP • TLS/SSL • SDP • SOAP • VPN • PPTP • L2TP • GTP • Presentation TCP • UDP • DCCP • SCTP • Internet IP (IPv4 • IPv6) • IGMP • ICMP • RSVP • BGP • RIP • OSPF • ISIS • IPsec • ARP • RARP • Data Link 802.11 • ATM • DTM • Ethernet • FDDI • Frame Relay • GPRS • EVDO • HSPA • HDLC • PPP • Physical Ethernet physical layer • ISDN • Modems • PLC • SONET/SDH • G.709 • Wireless • 22
  • 23. Five Layers TCP/IP Model Refer to the TCP/IP Presentation Slides 23
  • 24. Before I explain to you on security layer Let review back the slides that presenting on “security use in daily basis” 24
  • 25. What is behind of these applications? What is a mechanism that make it secure? 25
  • 26. Security Layer * Applications Protocol Cryptography Applications: Web, email, any application use security mechanism Protocol: SSL, TLS Algorithm: Symmetric, Asymmetric (i.e.:Cipher, DES, AES) * This approach is totally under my knowledge and experience, is not a standard, just to understand 26 the layer concept.
  • 27. Security versus OSI & TCP/IP Model OSI TCP/IP Application Application Presentation Application Presentation Security Applications Session Transport Transport Network Internet Data Link Data Link Physical Physical Protocol Cryptography 27
  • 28. Technology History Technology History Security Use Security Use Security Layer Security Layer Why Security? Why Security? Attack/Hack Attack/Hack 28
  • 29. Concept Why we want security? Let review back the slides that presenting on “security use in daily basis” 29
  • 30. Could you explain to me why we need security? 30
  • 31. Why We Need Security Privacy The protection of data from unauthorized disclosure. Integrity The assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion. Authentication The assurance that the communicating entity is the one that it claims to be. Provides protection against denial by one of the entities Nonrepudation involved in a communication of having participated in all or part of the communication. Security Services (X.800) 31
  • 32. Technology History Technology History Security Use Security Use Security Layer Security Layer Why Security? Why Security? Attack/Hack Attack/Hack 32
  • 34. Hacking - 2 DATA CENTER 34
  • 35. Type of Attacks Passive Active Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are release of message contents and traffic analysis. Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service. 35
  • 36. Passive Attack Release of Message Contents Read contents of message from Bob to Alice Traffic Analysis Observe pattern of messages from Bob to Alice 36
  • 37. Active Attack - 1 Masquerade Message from Hacker that appears to be from Bob Replay* Capture message from Bob to Alice; later replay message to Alice * An attack in which a service already authorized and completed is forged by another "duplicate request" in an attempt to repeat authorized commands. 37
  • 38. Active Attack - 2 Modification of messages Modifies message from Bob to Alice Denial of Service disrupts service provided by server 38
  • 39. How Do You Want Protect Your Network System Thank You See You Next Week 39

Hinweis der Redaktion

  1. Liberation : Kebebasan Membebaskan diri dari terikat kepada ASTRO, RTM. Customer boleh download mana2 pun
  2. AOL – American Online. Founded in 1983. Bought over by Time Warner (media company) in 2001 AOL began as a short-lived venture called Quantum Computer Services (or QCS), founded by William von Meister. Its sole product was an online service called Gameline for the Atari 2600 video game console after von Meister's idea of buying music on demand was rejected by Warner Brothers. (Klein, 2003) Subscribers bought a modem from the company for $49.95 and paid a one-time $15 setup fee. Gameline permitted subscribers to temporarily download games and keep track of high scores, at a cost of approximately $1 per hour.
  3. iPOD – portable media player
  4. Explain about having several gadgets connecting all this services, stress on the security part.