MIS Cryptography. Class 4
|
|
- Augusta Charity Welch
- 5 years ago
- Views:
Transcription
1 MIS 5214 Cryptography Class 4
2 Agenda Cryptography Open Systems Interconnection (OSI) Reference Model Case Study The Titan Incident Quiz
3 Cryptography Method of transmitting and storing data in a form that only those it is intended for can read and process An effective way of protecting sensitive information as it is transmitted through untrusted network communication paths or stored on media Complements physical and logical access controls
4 The study of methods to break cryptosystems Often targeted at obtaining a key Attacks may be passive or active Kerckhoff s Principle The only secrecy involved with a cryptosystem should be the key Cryptosystem Strength How hard is it to determine the secret associated with the system?
5 Terminology Plaintext is the readable version of a message Ciphertext is the unreadable results after an encryption process is applied to the plaintext Cryptosystem includes all the necessary components for encryption and decryption Algorithms Keys Software Protocols Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
6 Cipher = encryption algorithm 2 main attributes combined in a cypher 1. Confusion: usually carried out through substitution 2. Diffusion: Usually carried out through transposition Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
7 Example: Substitution cipher or algorithm A mono-alphabetic substitution cipher SECURITY <=> HVXFIRGB Poly-alphabetic substitution cipher
8 Services of cryptosystems Repudiation the sender denying he sent the message Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
9 XOR Exclusive OR Creating confusion through a binary mathematical function called exclusive OR, abbreviated as XOR Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
10 One-Time Pad a perfect encryption scheme One-Time Pad Requirements Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
11 2 main attributes combined in a cypher 1. Confusion: usually carried out through substitution 2. Diffusion: Usually carried out through transposition Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
12 Dichotomies is cryptography Symmetric versus Asymmetric Stream versus block Synchronous versus Asynchronous 1-Way functions versus 2-Way functions
13 Symmetric versus asymmetric algorithms Symmetric cryptography Use a copied pair of symmetric (identical) secret keys The sender and the receive use the same key for encryption and decryption functions Asymmetric cryptography Also know as public key cryptography Use different ( asymmetric ) keys for encryption and decryption One is called the private key and the other is the public key
14 Symmetric cryptography Two types: Stream and Block Ciphers Stream Ciphers treat the message a stream of bits and performs mathematical functions on each bit individually Block Ciphers divide a message into blocks of bits and transforms the blocks one at a time
15 Symmetric Stream Ciphers Easy to implement in hardware Used in cell phones and Voice Over Internet Protocol Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
16 Symmetric versus asymmetric algorithms Symmetric cryptography Use a copied pair of symmetric (identical) secret keys The sender and the receive use the same key for encryption and decryption functions Asymmetric cryptography Also know as public key cryptography Use different ( asymmetric ) keys for encryption and decryption One is called the private key and the other is the public key
17 Asymmetric cryptography Public and Private keys are mathematically related Public keys are generated from private key Private keys cannot be derived from the associated public key (if it falls into the wrong hands) Public key can be known by everyone Private key must be known and used only by the owner Asymmetric cryptography is computational intensive and much slower than symmetric cryptography Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
18 Asymmetric cryptography Do not get confused and think the public key is only for encryption and private key is only for decryption! Each key type can be use used to encrypt and decrypt If data is encrypted with a private key it cannot be decrypted with the same private key (but it can be decrypted with the related public key) If data is encrypted with a public key it cannot be decrypted with the same public key (but it can be decrypted with the related private key)
19 Asymmetric cryptography If the sender ( Jill ) encrypts data with her private key, the receiver ( Bill ) must have a copy of Jill s public key to decrypt it By decrypting the message with Jill s public key Bill can be sure the message really came from Jill A message can be decrypted with a public key only if the message was encrypted with the corresponding private key This provides authentication because Jill is only the only one who is supposed to have her private key If Bill (the receiver) wants to make sure Jill is the only one who can read his reply, he will encrypt the response with her public key Only Jill will be able to decrypt the message, because she is the only one who has the necessary private key This provides confidentiality because only Jill is able to decrypt the message with her private key
20 Asymmetric cryptography Why would Bill (now the sender) choose to encrypt his reply to Jill with his private key instead of using Jill s public key? Authentication Bill wants Jill to know that the message came from him and no one else If he encrypted the data with Jill s public key, it does not provide authenticity because anyone can get Jill s public key If he uses his private key to encrypt the data, then Jill can be sure the message came from him and no one else Note: Symmetric keys do not provide authenticity because the same key is used on both ends (using one of the secret keys does not ensure the message originated from a specific individual
21 Asymmetric cryptography If confidentiality is the most important security service, the sender would encrypt the file with the receiver s public key This is called a secure message format because it can only be decrypted by the person with the corresponding private key If authentication is most important, the sender would encrypt the data with his private key This provides assurance to the receiver that the only person who could have encrypted the data is the individual in possession of the private key If the sender encrypted the data with receivers public key, authentication is not provided because the public key is available to anyone Encrypting data with the senders private key is called an open message format because anyone with a copy of the corresponding public key can decrypt the message Confidentiality is not assured
22 Hybrid Encryption (a.k.a. digital envelope ) Symmetric and asymmetric and algorithms are often used together Public key cryptography s asymmetric algorithm is used to create public and private keys for secure automated key distribution Symmetric algorithm is used to create secret keys for rapid encryption/decryption of bulk data Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
23 Hybrid Encryption Symmetric algorithm uses a secret key to encrypt the message and the asymmetric key encrypts the secret key for transmission (SSL/TLS uses hybrid) Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
24 Quick review 1. If a symmetric key is encrypted with a receiver s public key, what security service is provided?
25 Quick review 1. If a symmetric key is encrypted with a receiver s public key, what security service is provided? Confidentiality: only the receiver s private key can be used to decrypt the symmetric key, and only the receiver should have access to this private key
26 Quick review 2. If data is encrypted with the sender s private key, what security services is provided?
27 Quick review 2. If data is encrypted with the sender s private key, what security services are provided? Authenticity of the sender and nonrepudiation. If the receiver can decrypt the encrypted data with the sender s public key, then receiver knows the data was encrypted with the sender s private key
28 Quick review 3. Why do we encrypt the message with the symmetric key rather than the asymmetric key?
29 Quick review 3. Why do we encrypt the message with the symmetric key rather than the asymmetric key? Because the asymmetric key algorithm is too slow
30 Session keys Single-use symmetric keys used to encrypt messages between two users in an individual communication session This is how secure web client applications communicate with server-side services Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
31 One-way Hash Assures message integrity A function that takes a variable-length string (i.e. message) and produces a fixedlength value called a hash value Does not use keys 1. Sender puts message through hashing function 2. Message digest generated 3. Message digest appended to the message 4. Sender sends message to receiver 5. Receiver puts message through hashing function 6. Receiver generates message digest value 7. Receiver compares the two message digests values. If they are the same, the message has not been altered
32 One-way hash example Testing the integrity of a file (e.g. program) downloaded from the internet
33 One-way hash example Testing the integrity of a file (e.g. program) from the internet Is the Kali I downloaded the same Kali that was published?
34 One-way hash example
35 One-way hash example
36
37 One-way hash example
38 One-way hash example Notice the amount of confusion and diffusion resulting from a 1 character change!
39 Digital Signature A hash value encrypted with the sender s private key The act of signing means encrypting the message s hash value with the private key Creating a digital signature for a message Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
40 Small block of data generated with a secret key and appended to a message HMAC (RFC 2104) Uses hash instead of cipher for speed Used in SSL/TLS and IPSec
41 Cryptographic algorithms and their functions Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
42 Reason Confidentiality The message can be encrypted How achieved Integrity The message can be hashed and/or digitally signed Authentication The message can be digitally signed Nonrepudiation The message can be digitally signed
43 Agenda Cryptography Open Systems Interconnection (OSI) Reference Model Case Study The Titan Incident Quiz
44 Telecommunication Models Electromagnetic transmission of data among systems Through digital, wireless and analog transmission types Models and standards of the following organizations have shaped our IT communication technology today International Telecommunication Union (ITU) International Standards Organization (ISO)
45 Information and Communications Technologies (ICT) Network protocol Standard set of rules that determines how systems communicate across networks Different systems can use the same protocol to communicate and understand each other despite their differences Windows Linux OSX
46 Open Systems Interconnection(OSI) Reference Model ISO Standard Computer 1 Computer 2 OSI Model Guidelines used by vendors, engineers, developers to develop products that enable computer systems to interoperate Open network architecture is Not owned by vendors and not proprietary Can easily integrate various technologies and vendor implementation of those technologies Graphics on the following slides come from Harris S. and Maymi F. (2016) All in One CISSP Exam Guide, Seventh Edition
47 Open Systems Interconnection(OSI) Reference Model ISO Standard OSI Model Guidelines used by vendors, engineers, developers to enable their systems to interoperate Layers networking tasks, protocols and services into different layers Each layer has its own responsibilities regarding how two computers communicate over a network Computer 1 Computer 2 Layer 8 Layer 7 Layer 6 Layer 5 Layer 4 Layer 3 Layer 2 Computer 1 Computer 2 Layer 1
48 Computers communicate via network Computer 1 Computer 2 Protocols function in specific OSI layers Each protocol on one computer communicates with the same corresponding protocol within the same OSI layer on another computer Via logical channels At the physical layer electronic/light signals are passed from one computer over a wire/fiber optic cable to the other computer
49 Encapsulation Process by which a protocol is used to enable two computers to communicate with each other within a specific OSI layer on each Computer 1 Computer 2 1. A message is constructed within a program on one computer and passed down through the network protocol s stack A protocol at each layer adds its own information to the message, and the message grows in size as it does down the protocol stack
50 Encapsulation 2. At the physical layer of the network the message is passed by the sending computer as bits via electronic or light pulses (on/off) across the network to the destination computer 3. At the destination computer the encapsulation is reversed taking the message apart via the protocols of each layer until the data is ready for the application processing
51 OSI Network Model A protocol at each layer expects the data in a particular format ( syntax ) and has specific responsibilities and control functions it performs on the data Control functions are added by the protocols at each layer in the form of headers and trailers of the datagram/packet/frame Each layer has a connection point ( interface ) that allows it to communicate with 3 other layers, communications with: 1. Interface of the layer above 2. Interface of the layer below it 3. Communications with the same layer in the interface of the destination computer
52 OSI Layers Specifications for each layer s interface is very structured Implementing international standard protocols and interfaces within different vendors technologies makes them part of an open system in which computers can communicate with one another Being part of an open system of protocols makes the different layers of a common network stack vulnerable and targets of attack A network can be: 1. Used as a channel of an attack i.e. as a resource for an attacker For example: Attacker sends a virus via a network channel from one system to another 2. The target of an attack For example: Attacker carries out a denial-of-service (DoS) attack which sends a large volume of badly formed protocol message traffic over a network link to bog it down
53 Layer 7: Application Layer Works closest to the user providing protocols that support the user s applications For example: File transmissions, message exchanges, terminal sessions When an application needs to send data over the network, it passes instructions and the data through the protocols that support it at the application layer Application layer properly formats the data and sends it down to the presentation layer (after data makes it through all the layers it has all the information needed to transmit it over the network)
54 Layer 7: Application Layer Protocols functioning at this layer communicate include: SMTP Simple Mail Transfer Protocol HTTP Hyper Text Transfer Protocol DNS Domain Name System IRC Internet Relay Chat LPD Line Printer Daemon Applications communicate with Layer 7 protocols by sending requests using Application Program Interface (API) libraries E.g. Outlook user clicks send, and the client sends this information to SMTP which adds information to the user s message and passes it down to the Presentation Layer
55 Layer 6: Presentation Layer Receives data from the application layer protocol and puts it in a standard format with annotation that enables any process operating at Layer 6 on destination computer can understand Presentation layer 1. Translates the format of data an application is using into a standard format used for passing messages over a network 2. Adds file type data to tell destination computer the file type and how to process and present it 3. Handles compression and encryption requests and adds data that enables the receiving computer to know how to decompress and decrypt the data Application layer properly formats the data and sends it down to the presentation layer (after data makes it through all the layers it has all the information needed to transmit it over the network)
56 Layer 6: Presentation Layer Protocols functioning at this layer communicate include: MIME Multipurpose Internet Main Extensions standards TIFF - Tagged Image File Format GIF Graphic Interchange Format JPEG Joint Photographic Experts Group For example, user compresses file on Windows computer with WinZip sends it to someone on Linux computer When the Linux computer receives the file, it looks at the file header, interprets the header s MIME type (Content-Type: application/zip) and knows what application can decompress the file If systems does not have WinZip or other program that understands the compression/decompression instructions, the file will be presented to the user with an unassociated icon
57 Layer 5: Session Layer When two applications need to communicate or transfer data between themselves, Layer 5 is responsible for: 1. Establishing a connection between two applications 2. Dialog management to maintain the connection during the transfer of data Restarts and recovers the session to maintain the connection if needed 3. Controlling release of the connection Provides inter-process communication channels, enables one software module on a local system to call a second software module running on a remote system. The results of the second module are retuned to the first system over the same session protocol channel This is how the RPC (Remote Procedure Call) protocol works The session layer protocol enables 3 different modes of communications between 2 applications running on different computers across the network: 1. Simplex: Communication takes place in one direction (very seldom used) 2. Half-duplex: Communication takes place in both directions, but only one application can send information at a time 3. Full-duplex: Communication takes place in both directions, and both applications can send information at the same time
58 Layer 5: Session Layer Provides inter-process communication channels, enables one software module on a local system to call a second software module running on a remote system. The results of the second module are retuned to the first system over the same session protocol channel Protocols include: PAP Password Authentication Protocol PPTP Point to Point Tunneling Protocol NetBIOS Network Basic Input Output System RPC Remote Procedure Call Session layer protocols provide the middleware functionality that connects and maintains the connection between software applications on different computers as they communicate (i.e. application to application communication) Client-server model Service oriented architecture (SOA)
59 Layer 5: Session Layer One security issue affecting the session layer common to inter-process communication software (e.g. RPC) is the lack of authentication or use of weak authentication Example mitigation: Use SRPC Secure RPC Requires authentication to take place before two computers located in different locations are able to communicate with each other Session layer protocols need to secure authentication capabilities, however, which use shared secret keys, public keys, or Kerberos tickets Unused Session Layer protocols should be identified and disabled on systems to decrease the chance of them getting exploited RPC and NetBIOS and similar distributed processing calls usually only take place within a single organization s network, thus firewalls should be configured to filter this dangerous traffic and prevent it into or out of the network
60 Layer 4: Transport Layer Establishes a logical connection between two computer systems and provides end-to-end data transport services Provides connection level protocols for two computers to engage in a handshaking process and agree on parameters for: 1. How much data each computer will send at a time 2. How to verify data integrity once received 3. How to determine if a data packet was lost Receives data from different applications and assembles their data into a stream for transmission over the network
61 Layer 4: Transport Layer Transport layer protocol controls data flow across computer to computer connections without tracking connections between individual pairs of applications communicating across the network Protocols: TCP Transmission Control Protocol Connection-oriented provides reliable data transmission UDP User Datagram Protocol Connectionless TLS Transport Layer Security protocol, straddles both Session and Transport layers After the Transport Layer appends it s information to the data message, it is called either a TCP segment or a UDP Packet
62 Layer 3: Network Layer s Routing protocols Build and maintain routing tables Routing tables are maps of the network Determine best route to send packet from source computer to destination computer Inserts information into the data packet s header consisting of addresses (source and destination) and routes to their destination Do not guarantee delivery of packets Transport layer protocols catch problems and resend packets as needed (TCP not UDP) Protocols IP Internet Protocol ICMP Internet Control Message Protocol RIP Routing Information Protocol OSPF Open Shortest Path First IPX Internet Packet Exchange Routers operate on OSI Layer 3 After the Network Layer appends it s information to the data message, it converts it to binary format and the unit of data is called a packet Computer 1 Computer 2
63 Layer 2: Data Link Layer Translates the data packet with header/footer information accumulated from layers above into LAN (Local Area Network) or WAN (Wide Area Network) binary format for transmission over the network transmission line After the network layer adds its routing information into the data packet, it passes the packet to the Data Link Layer s LCC sublayer LCC sublayer takes care of flow of control and error checking and passes it to the MAC sublayer Framing is the name of the process when the data link layer applies its header and trailer to the data message The unit of data is called a frame Switches operation on OSI Layer 2
64 Layer 2: Data Link Layer The MAC sublayer determines if the data will be transmitted over a LAN or WAN, the network type and protocols and puts the last header and trailer on the packet before it is put on the wire and transmitted Each network type uses different protocols, NICs (network interface cards), cables, and transmission methods The MAC sublayer determines the format of the data frame for transmission over the particular type network the computer s NIC is attached to the following protocols: Ethernet (IEEE 802.3) Token Ring (IEEE 802.3) FDDI Fiber Distributed Data Interface Wireless Ethernet (IEEE ) Other protocols at this layer include: ARP Address Resolution Protocol RARP Reverse Address Resolution Protocol SLIP Serial Line Internet Protocol (SLIP) Each component has a different: Header data format structure Protocol for physical transmission across the network type (coaxial, twisted pair, fiber optic cable; or wireless) The computer s network card bridges the data link and physical layers, takes data passed down from the user s application through the 6 layers above and its network card driver encodes the bits at the data link layer
65 Layer 1: Physical Layer The NIC Produces and interprets electromagnetic signals Converts bits into signals or voltages suitable for transmission across the LAN or WAN technology it is connected Determines synchronization, data transfer rates, line noise and transmission techniques based on the physical connection to electrical, optical or mechanical equipment E.g. A 1 bit transmitted via Ethernet would be translated by the NIC to +0.5-volt electric signal, and 0 bit would be transmitted as 0-volts TIA Telecommunications Industry Association EIA Electronic Industry Alliance Standard interfaces at this layer include: RS/EIA/TIA-422, RS/EIA/TIA-423, RS/EIA/TIA-429, RS/EIA/TIA-449, RS/EIA/TIA Base-T, 10Base2, 10Base5, 100Base-TX, 100Base-FX, 100Base-T, 1000Base-T, 1000-Base-SX
66 Layer 1: Physical Layer Data/file requests and terminals Standard formats, encryption, compression Applications communicating data Computers communicating Routing packets formed Data frames ready for transfer Signal processing
67 Layer 7 Domain Name e.g. mycomputer.temple.edu Layer 6 Layer 5 Layer 4 Layer 3 IP Address e.g. xxx.xxx.xxx.xxx Layer 2 MAC (Media Access Control) Address Layer 1 Switch Note: Synonyms for host computer across the OSI Model
68 At what layer(s) of the OSI model did the Titan attack take place? Data/file requests and terminals Standard formats, encryption, compression Applications communicating data Computers communicating Routing packets formed Data frames ready for transfer Signal processing
69 Agenda Cryptography Open Systems Interconnection (OSI) Reference Model Case Study The Titan Incident Quiz
70 How did the attacker attack the Titan cluster?
71 Agenda Cryptography Open Systems Interconnection (OSI) Reference Model Case Study The Titan Incident Quiz
Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets
Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationCS-461 Internetworking. Dr. Mohamed Aboutabl
CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationChapter -4 OSI Reference Model
Chapter -4 OSI Reference Model Objectives Concept of Reference Model. OSI Reference Model Concept. Layers of OSI Reference Model. 4.1 Introduction Layered Architecture, Peer-to- Peer Processes, Interfaces
More informationComputer Networks (Introduction to TCP/IP Protocols)
Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of
More informationPart VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD
Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network
More informationChapter 2. Communicating Over The Network. CCNA1-1 Chapter 2
Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different
More informationProtocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical
More informationE&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang
E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationComputer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan
Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network
More informationChapter 2. Communicating Over The Network
Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks
More informationLecture 3 Protocol Stacks and Layering
Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationChapter 2 Communicating Over the Network
Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,
More information06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security
1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of
More informationNetworking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3
Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit
More informationCommunicating over the Network
Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need
More informationChapter 2 Network Models 2.1
Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
More informationSolved MCQ of Computer networking. Set-1
Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of
More informationComputer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationNetwork Security and Cryptography. 2 September Marking Scheme
Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,
More informationFundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1
Fundamentals of Networking OSI & TCP/IP Model Kuldeep Sonar 1 Kuldeep Sonar 2 OSI Model Kuldeep Sonar 3 Application Layer Layer 7 provides an interface between a host s communication software and any necessary
More informationLecture (02) Network Protocols and Standards
Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components
More informationCSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L
CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any
More informationInt ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28
Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that
More informationOSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK
OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationNetwork Security and Cryptography. December Sample Exam Marking Scheme
Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More information2.1 Basic Cryptography Concepts
ENEE739B Fall 2005 Part 2 Secure Media Communications 2.1 Basic Cryptography Concepts Min Wu Electrical and Computer Engineering University of Maryland, College Park Outline: Basic Security/Crypto Concepts
More informationOperating Systems Design Exam 3 Review: Spring Paul Krzyzanowski
Operating Systems Design Exam 3 Review: Spring 2012 Paul Krzyzanowski pxk@cs.rutgers.edu 1 Question 1 An Ethernet device driver implements the: (a) Data Link layer. (b) Network layer. (c) Transport layer.
More informationCopyleft 2005, Binnur Kurt. Objectives
1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe
More informationChapter 8 Network Security
Chapter 8 Network Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More informationNetworking and Health Information Exchange: ISO Open System Interconnection (OSI)
Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection
More informationLecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005
Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks
More informationand Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai
Data Communications and Networks Second Edition ACHYUT S GODBOLE Managing Director SoftExcel Services Limited, Mumbai ATUL KAHATE Senior Consultant Oracle Financial Services Software Limited, Pune Tata
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.
223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency
More informationNetworking Models OSI Model Created by International Organization Standardization
Networking Models OSI Model Created by International Organization Standardization Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Email : Agha.m@mcit.gov.af
More informationOSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI
More informationData Communication & Computer Networks MCQ S
Data Communication & Computer Networks MCQ S 1. The translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay
More informationThe Data Link Layer. 32 PART I Networking Basics
32 PART I Networking Basics weather station. More realistic devices use duplex mode, where all systems can send or receive with equal facility. This is often further distinguished as half-duplex (the system
More informationPrinciples of Information Security, Fourth Edition. Chapter 8 Cryptography
Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries
More informationL13. Reviews. Rocky K. C. Chang, April 10, 2015
L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing
More information1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?
95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model
More informationLecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking
Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks
More informationMost Common Security Threats (cont.)
Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?
More informationThe OSI Model. Level 3 Unit 9 Computer Networks
The OSI Model OSI Model Consider the network models we have already covered Whenever data is transferred from PC to PC or PC to Server it will travel through the Layers of the OSI Model OSI Model OSI Model
More informationCCNA Guide to Cisco Networking, Third Edition
Review Questions 1. Which of the following best describes the Presentation layer? b. Translates, encrypts, or prepares data from the Application layer for network transmission c. Handles routing information
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationAPNIC elearning: Cryptography Basics
APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security
More informationTHE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.
THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
More informationQUESTION BANK EVEN SEMESTER
Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff
More informationAnnouncements Computer Networking. What is the Objective of the Internet? Today s Lecture
Announcements 15-441 15-441 Computer ing 15-641 Lecture 2 Protocol Stacks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Sign up for piazza: https://piazza.com/cmu/fall2016/15441641 P1 will
More informationNetwork Models. Behrouz A. Forouzan Data communication and Networking Fourth edition
Chapter 2 Network Models Behrouz A. Forouzan Data communication and Networking Fourth edition 1 Layered Tasks We use the concept of layers in our daily life. As an example, let us consider two friends
More informationQuestion 7: What are Asynchronous links?
Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:
More informationIntroduction to Open System Interconnection Reference Model
Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding
More informationComputer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and
Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Networking Technologies Mean? p. 3 What Is a Computer Network?
More informationLecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.
15-441 Lecture Nov. 21 st 2006 Dan Wendlandt Worms & Viruses Phishing End-host impersonation Denial-of-Service Route Hijacks Traffic modification Spyware Trojan Horse Password Cracking IP Spoofing DNS
More informationLecture-4. TCP/IP-Overview:
Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone
More informationOperating Systems and. Computer Networks. Introduction to Computer Networks. Operating Systems and
Computer Networks Introduction to Computer Networks Linux System Structure Corbet et al, Linux Device Drivers, O Reilly, 2005 Categories of System Calls Process Control load, execute, end, abort, create
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationChapter 2 Network Models 2.1
Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Network Models n Network Architecture: n A) Hardware: at the core of any network;
More informationChapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide
Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide CCNET v6 1 Chapter 3: Network Protocols and Communications CCENT Routing
More informationCryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption
More information9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis
More informationSpecial expressions, phrases, abbreviations and terms of Computer Networks
access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous
More informationChapter 3 Traditional Symmetric-Key Ciphers 3.1
Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric
More informationOverview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.
Overview of TCP/IP 3 Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. 4 2 5 6 3 7 8 4 9 10 5 11 12 6 13 14 7 15 16 8 17 18 9 19 20 10 21 Why TCP/IP? Packet based Provides decentralized
More informationCSC 4900 Computer Networks: Security Protocols (2)
CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationSub Code & Name : EC2352 COMPUTER NETWORKS Unit: I Branch: EC Semester :VI. Unit syllabus: PHYSICAL LAYER 9
Unit: I Branch: EC Semester :VI Date:02/12/14 Page 01 of 06 Unit syllabus: PHYSICAL LAYER 9 Data Communications Networks - Networks models OSI model Layers in OSI model TCP / IP protocol suite Addressing
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationCryptography (Overview)
Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography
More informationDefine TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model
[Previous] [Next] Chapter 2 Implementing TCP/IP About This Chapter This chapter gives you an overview of Transmission Control Protocol/Internet Protocol (TCP/IP). The lessons provide a brief history of
More informationCSC 6575: Internet Security Fall 2017
CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture
More informationNetwork+ Guide to Networks, 6 th Edition. Chapter 2 Solutions
Network+ Guide to Networks, 6 th Edition Solutions 2 1 Network+ Guide to Networks, 6 th Edition Chapter 2 Solutions Review Questions 1. Your supervisor has asked you to correct several cable management
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 7. Network Security Network Attacks Cryptographic Technologies Message Integrity and Authentication Key Distribution Firewalls Transport Layer
More informationGlenda Whitbeck Global Computing Security Architect Spirit AeroSystems
Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems History 2000 B.C. Egyptian Hieroglyphics Atbash - Hebrew Original alphabet mapped to different letter Type of Substitution Cipher
More informationVoIP / RoIP for Technicians
Phase 4 Design, Inc VoIP / RoIP for Technicians Presented by Dave Grant Phase 4 Design, Inc dave@phase4.org 2017 Phase 4 Design, Inc Notes 2 2017, Phase 4 Design, Inc. Table of Contents What are we going
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More informationLecture 9a: Secure Sockets Layer (SSL) March, 2004
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationBABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017
5 years Integrated M.Sc (IT) Semester 3 Question Bank 060010310 DSE4 Computer Networks Unit 1 Introduction Short Questions 1. State the term data with respect to computer network. 2. What is data communication?
More informationFINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material
FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
More informationSYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.
Contents i SYLLABUS osmania university UNIT - I CHAPTER - 1 : INTRODUCTION Data Communication, Network Topologies : LAN, WAN, MAN, Types : Bus, Star, Ring, Hybrid, Line Configurations, Reference Models
More informationComputer Networks Question Bank
Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual
More informationCS 356 Internet Security Protocols. Fall 2013
CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5
More informationTime : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.
COPYRIGHT RESERVED End Sem (III) MCA (XVIII) 2017 Time : 3 hours Full Marks: 70 Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate
More informationCOSC4377. Chapter 8 roadmap
Lecture 28 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7
More informationinterface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer
TDTS06 Computer networks, August 23, 2008 Sketched answers to the written examination, provided by Juha Takkinen, IDA, juhta@ida.liu.se. ( Sketched means that you, in addition to the below answers, need
More informationVPN Ports and LAN-to-LAN Tunnels
CHAPTER 6 A VPN port is a virtual port which handles tunneled traffic. Tunnels are virtual point-to-point connections through a public network such as the Internet. All packets sent through a VPN tunnel
More informationCross Layer Protocol Design. Radio Communication III
Cross Layer Protocol Design Radio Communication III The layered world of protocols The ISO OSI model OSI model Introduction» The open systems interconnection reference model (OSI model) describes a layered
More informationChapter 3: Network Protocols and Communications
Chapter 3: Network Protocols and Communications Introduction to Networks Intro to Networks v5 Message Delivery Options IPv4 Unicast One-to-One Multicast One-to-Many Broadcast One-to-All IPv6 Unicast One-to-One
More information