0% found this document useful (0 votes)
6 views28 pages

NetworkSecurity - Lecture 1

Uploaded by

s3oodyg4me
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views28 pages

NetworkSecurity - Lecture 1

Uploaded by

s3oodyg4me
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

NETWORK SECURITY

LECTURE 1: INTRODUCTION TO NETWORK SECURITY

NCS2101
Class Management Rules

1. No food (solid or liquid except water) is allowed in the class. Students


who bring water to the class should make sure they leave it on the floor.

2. No use of cell phones or any other gadgets in the classroom. This


includes the use of laptops, except during lab activities.

3. No side discussions or distraction of any kind in the class during lecture


hours. All questions or needed clarifications should be directed to the
instructor.

4. All students are to appear in the approved dress-code always.

5. Class attendance will be conducted within the first 1-5 minutes of class
resumption. Students who come to class between the first 5-10 minutes
will be marked as LATE attendance while those afterwards will be marked
as ABSENT.

6. There is only 24 hours grace period for every missed assessment


submission with cogent reason. After this period, submissions are no
longer accepted
Course Learning Objectives - NCS-2101

 CLO1. Classify security principles used to protect


computer networks
 CLO2. Identify various security threats and attacks on
computer networks
 CLO3. Apply Access Control Lists (ACLs) to improve
network security
 CLO4. Evaluate different security solutions for
computer networks
 CLO5. Choose best critical network security controls
given certain requirements
 CLO6. Devise appropriate defense mechanisms for
typical network attacks
 CLO7. Demonstrate the use of cryptographic protocols
Outline

 Security Problem
 What is “Security”?
 Security Objectives
 OSI Security Architecture
 Security Parameters
 Security Services
 Security Mechanism
 Network Security Model
 Security Trinity
 Goals of Network Security
 Who are potential attackers?
Security Problem
Security Problem

 The evolution of technology has been


focused on ease of use more than security.
 Increased network environments and
network-based applications have
introduced new ways of systems security
explosion.
 With the development of information
systems, the methods of attacking such
systems have also evolved rapidly
What is “Security”?
Security Objectives
Security Objectives
OSI Network Layers

10 of 23
OSI Security Architecture
Security Parameters
Security Attacks
Passive Attacks
Active Attacks
Examples of Active Attacks
Security Services
Security Services
Security Mechanism
Security services vs Security mechanisms
Network Security Model
The Security Trinity

The three legs of the "security


trinity," prevention, detection,
and response, comprise the
basis for network security.

The security trinity should be


the foundation for all security
policies and measures that an
organization develops and
deploys.
The Security Trinity: Overview

Prevention:
To provide some level of security, it is necessary to
implement measures to prevent the exploitation of
vulnerabilities. It is the foundation of the security trinity.

Detection
Once preventative measures are implemented,
procedures need to be put in place to detect potential
problems or security breaches; in the event preventative
measures fail. It is very important that problems be
detected immediately. The sooner a problem is detected
the easier it is to correct and cleanup.

Response
Organizations need to develop a plan that identifies the
appropriate response to a security breach.
The Security Trinity: Tools

1. Prevention:
•Firewalls
•Intrusion Prevention Systems (IPS)
•Access Control
•Patch Management
•Network Segmentation

2. Detection:
•Intrusion Detection Systems (IDS)
•Security Information and Event Management (SIEM)
•Anomaly Detection
•Packet Analysis
•Behavioral Analysis

3. Response:
•Incident Response Plan
•Threat Hunting
•Isolation and Quarantine.
•Forensics
•Communication
Who are the potential attackers?

1. Script Kiddies and Opportunistic Attackers:


•These individuals have limited technical skills and often use pre-existing tools and
scripts to launch attacks.
•Their motivations might be curiosity or a desire to cause chaos, and they tend to target
low-hanging fruit with known vulnerabilities.
2. Hackers and Cybercriminals:
•These individuals or groups have more advanced technical skills and target
organizations or individuals for financial gain.
•Motivations include stealing credit card information, personal data, or using
ransomware to extort money.
3. Insiders:
•Insiders have legitimate access to systems but misuse that access for personal gain or
to harm the organization.
•Motivations could range from financial motives to a desire for revenge or exposure of
sensitive information.
4. Nation-State Actors and APTs (Advanced Persistent Threats):
•State-sponsored attackers have significant resources and advanced capabilities.
•They engage in espionage, cyberwarfare, and strategic attacks to further political,
military, or economic agendas.
5. Hacktivists:
•These attackers are motivated by political or social causes and target organizations to
raise awareness or promote their ideologies.
•Their actions could include website defacements, data leaks, and Distributed Denial of
Service (DDoS) attacks.
Who are the potential attackers?

6. Competitors and Corporate Espionage:


•Rival companies or individuals seek to gain a competitive edge by stealing
proprietary information, trade secrets, or intellectual property.
7. Malware Developers and Distributors:
•These individuals or groups create and distribute malicious software,
including viruses, worms, and Trojans.
•Their motivations can range from financial gain to causing disruption.
8. Phishers and Social Engineers:
•Attackers in this category manipulate human psychology to trick individuals
into revealing sensitive information.
•Their tactics include phishing emails, phone scams, and other forms of social
engineering.
9. Disgruntled Individuals:
•Former employees, users, or partners who hold a grudge against an
organization and seek to harm its reputation or operations.
10. Organized Crime Groups:
•Well-coordinated criminal organizations engage in cybercrime for financial
gain, targeting businesses, individuals, and critical infrastructure.
11. Black Hat vs. White Hat Hackers:
•Black hat hackers engage in malicious activities for personal gain or
disruption.
•White hat hackers, also known as ethical hackers, use their skills to identify
27

Q &A
References

 Design Zone for Security: SAFE - Cisco

You might also like