NetworkSecurity - Lecture 1
NetworkSecurity - Lecture 1
NCS2101
Class Management Rules
5. Class attendance will be conducted within the first 1-5 minutes of class
resumption. Students who come to class between the first 5-10 minutes
will be marked as LATE attendance while those afterwards will be marked
as ABSENT.
Security Problem
What is “Security”?
Security Objectives
OSI Security Architecture
Security Parameters
Security Services
Security Mechanism
Network Security Model
Security Trinity
Goals of Network Security
Who are potential attackers?
Security Problem
Security Problem
10 of 23
OSI Security Architecture
Security Parameters
Security Attacks
Passive Attacks
Active Attacks
Examples of Active Attacks
Security Services
Security Services
Security Mechanism
Security services vs Security mechanisms
Network Security Model
The Security Trinity
Prevention:
To provide some level of security, it is necessary to
implement measures to prevent the exploitation of
vulnerabilities. It is the foundation of the security trinity.
Detection
Once preventative measures are implemented,
procedures need to be put in place to detect potential
problems or security breaches; in the event preventative
measures fail. It is very important that problems be
detected immediately. The sooner a problem is detected
the easier it is to correct and cleanup.
Response
Organizations need to develop a plan that identifies the
appropriate response to a security breach.
The Security Trinity: Tools
1. Prevention:
•Firewalls
•Intrusion Prevention Systems (IPS)
•Access Control
•Patch Management
•Network Segmentation
2. Detection:
•Intrusion Detection Systems (IDS)
•Security Information and Event Management (SIEM)
•Anomaly Detection
•Packet Analysis
•Behavioral Analysis
3. Response:
•Incident Response Plan
•Threat Hunting
•Isolation and Quarantine.
•Forensics
•Communication
Who are the potential attackers?
Q &A
References