CS 352 Network Security: Introduction CS 352,
1 / 1

CS 352 Network Security: Introduction CS 352,

Author : olivia-moreira | Published Date : 2025-05-16

Description: CS 352 Network Security Introduction CS 352 Lecture 251 httpwwwcsrutgersedusn624352 Srinivas Narayana 1 Security and the Network Stack Application Transport Network Link HTTPS Security cuts across all parts of the network

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "CS 352 Network Security: Introduction CS 352," is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:CS 352 Network Security: Introduction CS 352,:
CS 352 Network Security: Introduction CS 352, Lecture 25.1 http://www.cs.rutgers.edu/~sn624/352 Srinivas Narayana 1 Security and the Network Stack Application Transport Network Link HTTPS Security: cuts across all parts of the network stack! Why network security? The Internet is used for all sorts of things Banking and commerce Interconnecting electronic voting machines Interacting with the Government, your employer, school, … Shopping online, including essentials like milk or groceries Sometimes, even basic social interactions require the Internet! But malicious people share your network People who want to snoop, pretend, steal “Attacks” can be passive or active Sit and snoop (e.g., credit card info) Actively target (e.g., phishing) Some key aspects of network security Confidentiality: only the sender and the intended receiver should understand the message contents Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection Authentication: confirm the identity of communicating parties Non-repudiation: Once someone sends a message, or conducts a transaction, they can’t later deny the contents of that message Availability: sender and receiver able to communicate at all Friends and enemies: Alice, Bob, Trudy Two parties, Bob and Alice, want to communicate securely Often used in network security examples Trudy (intruder) may intercept, delete, add messages secure sender secure receiver channel data, control messages data data Alice Bob Trudy Who/what might Bob and Alice be? Real humans  Web browser/server for electronic transactions e.g., on-line purchases, or online banking DNS clients and servers Routers exchanging routing table updates Two mail clients Many other examples! What might Trudy do? Eavesdrop: intercept messages Entity in the middle: actively insert messages into connection Impersonation: can fake (spoof) source address in packet (or any field in packet) Hijacking: “take over” ongoing connection by removing sender or receiver, inserting itself in place Denial of service: prevent service from being used by others (e.g., by overloading resources) What we will learn in the next lectures Principles of network security Primitives for confidentiality, authentication, integrity, non-repudiation How to apply these principles to secure: An application: e-mail Transport: TLS (Transport Layer Security for TCP) Network security is a broad area Many exciting topics! Security for apps and transport protocols: e.g., QUIC Security at all layers: Network layer (e.g., IPSec, VPNs); Link layer (e.g., WPA) Security for protocols, e.g., DNSSEC, BGPSEC Operational security: how to secure a network Firewalls, intrusion detection/prevention, data breach security, … Covering these and other topics in network &

Download Document

Here is the link to download the presentation.
"CS 352 Network Security: Introduction CS 352,"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations

PETERPALZUBCSEK ༀᘀሀက�ᜀ1)250$7,21�ἀ+((7� WOat If I Am Being Stockroom Manager:  Gary Frenza Telephone:   352-338-0346  352-372-856 LaGrange Park, IL 60526 ጀ*(ᴀ%ἀ* ̀ᘀᴀ()ᤀ*!#!*.& LIFE12 ENV/IT/352 Project LIFE12 ENV/IT/352 Support for the future Questions Lec4: Network Models 1 Relationship Between Network Security & Cost Project LIFE12 ENV/IT/352 H12-721 : HCNP-Security-CISN (Huawei Certified Network Professional - Constructing Infrastructure (BOOK)-Cryptography and Network Security: Demystifying the ideas of Network Security,