Вы находитесь на странице: 1из 27

by

Siva Rama Krishna T.

Department of Computer Science and Engineering


JNTUK University College of Engineering Vizianagaram
www.jntukucev.ac.in
Basic Terminology
Security Threats
Security Attacks
Security Services
Security Mechanisms
Vulnerabilities
Basic Terminology
Security Threats
Security Attacks
Security Services
Security Mechanisms
Vulnerabilities
Security Threats
Passive Attack - Eavesdropping
Passive Attack: Traffic Analysis
Active Attack: Interruption/DoS

Block delivery of message


Active Attack: Replay
Active Attack: Masquerade
Security Services
Confidentiality (privacy)
Authentication (who created or sent the
data)
Integrity (has not been altered)
Non-repudiation (the order is final)
Access control (prevent misuse of
resources)
Availability (permanence, non-erasure)
Security Mechanisms
Encryption
Software Controls (access limitations in
a data base, in operating system
protect each user from other users)
Hardware Controls (smartcard)
Policies (frequent changes of
passwords)
Physical Controls
Standards Organizations
National Institute of Standards &
Technology (NIST)
Internet Society (ISOC)
International Telecommunication
Union Telecommunication
Standardization Sector (ITU-T)
International Organization for
Standardization (ISO)
RSA Labs (de facto)
RFC Publication Process
Security Update...

Вам также может понравиться