network security philosphy introduction
play

Network Security Philosphy & Introduction Dr. Enis Karaarslan - PowerPoint PPT Presentation

Network Security Philosphy & Introduction Dr. Enis Karaarslan Mula University Computer Engineering Department 4/30/15 Dr. Enis Karaarslan 1 4/30/15 Ar. Gr. Enis Karaaslan 2 SECURITY PHILOSPHY 4/30/15 Ar. Gr. Enis Karaaslan


  1. Network Security Philosphy & Introduction Dr. Enis Karaarslan Muğla University Computer Engineering Department 4/30/15 Dr. Enis Karaarslan 1

  2. 4/30/15 Ar. Gör. Enis Karaaslan 2

  3. SECURITY PHILOSPHY 4/30/15 Ar. Gör. Enis Karaaslan 3

  4.  Computer & Network Security has similarities with the security in normal life. 4/30/15 Ar. Gör. Enis Karaaslan 4

  5. There is no such thing as %100 Security 4/30/15 Ar. Gör. Enis Karaaslan 5

  6. Security at the gates only, is not enough 4/30/15 Ar. Gör. Enis Karaaslan 6

  7. A chain is only as strong as its weakest link 4/30/15 Ar. Gör. Enis Karaaslan 7

  8. As there is no %100 security … So give up? A possible solution: Use more than one chain 4/30/15 Ar. Gör. Enis Karaaslan 8

  9. MULTI LAYER SECURITY 4/30/15 Ar. Gör. Enis Karaaslan 9

  10. 4/30/15 Ar. Gör. Enis Karaaslan 10

  11. Security x Usability 4/30/15 Ar. Gör. Enis Karaaslan 11

  12.  Keep in mind that  When Security measures increase,  Usability decrease 4/30/15 Ar. Gör. Enis Karaaslan 12

  13. Value of Assets and Expenditures ● What is the VALUE of your asset (data, prestige …)? ● Keep in mind that ● Security expenditures should not be greater than the value of the assets 4/30/15 Ar. Gör. Enis Karaaslan 13

  14. Risk ... Smoking in the oil station … %99 percent nothing happens … %1 ... 4/30/15 Ar. Gör. Enis Karaaslan 14

  15. Risk ...

  16. It's discipline anyway … :)

  17. Mitigate (azaltmak) Risk

  18. Risk Analysis ● Risk analysis is essential ● If the risk is too low, that/some precaution(s) can be cancelled … 4/30/15 Ar. Gör. Enis Karaaslan 19

  19. False Sense of Security  A “false sense of security” is worse than “a true sense of insecurity”.  Solution: Never think your system is secure. 4/30/15 Ar. Gör. Enis Karaaslan 20

  20. No Template Which Suits All  There is no templates which suits all.  There is a different solution for different organizations • Different needs • Different assets 4/30/15 Ar. Gör. Enis Karaaslan 21

  21. To win a war, one must know the way Sun Tzu The Art of War 4/30/15 Ar. Gör. Enis Karaaslan 22

  22. Security is a process, not a product. Bruce Schneier 4/30/15 Ar. Gör. Enis Karaaslan 23

  23. MONITOR  The system should be monitored for intrusions  And immediate action should be taken at attacks 4/30/15 Ar. Gör. Enis Karaaslan 24

  24. Warn The Attacker 4/30/15 Ar. Gör. Enis Karaaslan 25

  25. Network Awareness  Know your enemy (?)  Know yourself, • know your assets • know what to protect  Know your systems more than the attacker 4/30/15 Ar. Gör. Enis Karaaslan 26

  26. Eğer bu kadar kötü yazılım güvenliğine sahip olmasaydık, Bu kadar çok ağ güvenliğine ihtiyacımız olmayacaktı Bruce Schneier

  27. (Web) Application Security ● Security by Design ● Secure coding ● And others ...

  28. FUNDAMENTALS 4/30/15 Ar. Gör. Enis Karaaslan 29

  29. Information System and Security ATTACK SECURITY ATTACKER MEASURES VULNERABILITY USERS INFORMATION SYSTEM

  30. Vulnerable Systems  The systems are vulnerable • Mainly because of bad coding • Must be patched (but can not be done rapidly as they should) • False sense of security 4/30/15 Ar. Gör. Enis Karaaslan 31

  31. A vulnerability timeline …

  32. The Attacker/Intruder  The attacker can be called as: Lamer, intruder, attacker … (wrongly used as hacker also)  Also secret organizations?  Also companies (serious antivirus/defence economy) 4/30/15 Ar. Gör. Enis Karaaslan 33

  33. Hacker /Lamer /Attacker … Hacker is used as attacker/lamer, in the meaning: The intruder, who gets in your system and intends to use for his/her own aims. 4/30/15 Ar. Gör. Enis Karaaslan 34

  34. The Attacker  The attackers strength is Dedication • Will not stop until he/she gets in • Can use the computer for days long sleepless • Knows the vulnerabilities of systems 4/30/15 Ar. Gör. Enis Karaaslan 35

  35. 4/30/15 Ar. Gör. Enis Karaaslan 36

  36. Network Security Assets  Network Security Overall • Network Awareness • Firewall, Intrusion Detection Systems … etc • More …  Host (Computer/Server/NW Device) Security • Physical Security • OS and Application Security • User Management  Encryption 4/30/15 Ar. Gör. Enis Karaaslan 37

  37. Firewall 4/30/15 Ar. Gör. Enis Karaaslan 38

  38. Firewall Basics  Rule based access control between networks.  Software/hardware based  Architecture • Static Packet Filtering • Dynamic Packet Filtering (Statefull inspection) • Application Level Protection  Logging and alert capabilities 4/30/15 Ar. Gör. Enis Karaaslan 39

  39. Encryption  Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. (Encryption x Decryption) 4/30/15 Ar. Gör. Enis Karaaslan 40

  40. Encryption  Two different methods (according to key use) • Conventional– Two keys are the same • Asymetric – ( Public Key Encryption ) – Key pair (public, private) 4/30/15 Ar. Gör. Enis Karaaslan 41

  41. Encryption  To decyrpt an encrypted data • How much time? • How much Processing (Computing power)?  The science which deals with encryption is Cryptology 4/30/15 Ar. Gör. Enis Karaaslan 42

  42. END OF THE SESSION Dr. Enis Karaaslan enis.karaarslan@mu.edu.tr 4/30/15 Ar. Gör. Enis Karaaslan 43

Recommend


More recommend