Презентация Network security онлайн
На нашем сайте вы можете скачать и просмотреть онлайн доклад-презентацию на тему Network security абсолютно бесплатно. Урок-презентация на эту тему содержит всего 43 слайда. Все материалы созданы в программе PowerPoint и имеют формат ppt или же pptx. Материалы и темы для презентаций взяты из открытых источников и загружены их авторами, за качество и достоверность информации в них администрация сайта не отвечает, все права принадлежат их создателям. Если вы нашли то, что искали, отблагодарите авторов - поделитесь ссылкой в социальных сетях, а наш сайт добавьте в закладки.
Презентации » Интернет » Network security
Оцените!
Оцените презентацию от 1 до 5 баллов!
- Тип файла:ppt / pptx (powerpoint)
- Всего слайдов:43 слайда
- Для класса:1,2,3,4,5,6,7,8,9,10,11
- Размер файла:1.41 MB
- Просмотров:96
- Скачиваний:0
- Автор:неизвестен
Слайды и текст к этой презентации:
№6 слайд
![Background Information](/documents_6/f514bd047746504213a87b15b3400001/img5.jpg)
Содержание слайда: Background
Information Security requirements have changed in recent times
traditionally provided by physical and administrative mechanisms
computer use requires automated tools to protect files and other stored information
use of networks and communications links requires measures to protect data during transmission
№7 слайд
![Computer Security the](/documents_6/f514bd047746504213a87b15b3400001/img6.jpg)
Содержание слайда: Computer Security
the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, information/data, and telecommunications .
№9 слайд
![Key Security Concepts These](/documents_6/f514bd047746504213a87b15b3400001/img8.jpg)
Содержание слайда: Key Security Concepts
These three concepts form what is often referred to as the CIA triad (Figure 1.1). The three concepts embody the fundamental security objectives for both data and for information and computing services. FIPS PUB 199 provides a useful characterization of these three objectives in terms of requirements and the definition of a loss of security in each category:
№10 слайд
![Key Security Concepts](/documents_6/f514bd047746504213a87b15b3400001/img9.jpg)
Содержание слайда: Key Security Concepts
Confidentiality (covers both data confidentiality and privacy): preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information.
№11 слайд
![Key Security Concepts](/documents_6/f514bd047746504213a87b15b3400001/img10.jpg)
Содержание слайда: Key Security Concepts
• Integrity (covers both data and system integrity): Guarding against modification or destruction of information, and includes ensuring information non-repudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.
№14 слайд
![Key Security Concepts](/documents_6/f514bd047746504213a87b15b3400001/img13.jpg)
Содержание слайда: Key Security Concepts
• Authenticity: The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator.
• Accountability: The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.
№16 слайд
![Levels of Impact Low The loss](/documents_6/f514bd047746504213a87b15b3400001/img15.jpg)
Содержание слайда: Levels of Impact
• Low: The loss could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. A limited adverse effect means that, for example, the loss of confidentiality, integrity, or availability might (i) cause a degradation in mission capability to an extent and duration that the organization is able to perform its primary functions,
№18 слайд
![Levels of Impact Moderate The](/documents_6/f514bd047746504213a87b15b3400001/img17.jpg)
Содержание слайда: Levels of Impact
• Moderate: The loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. A serious adverse effect means that, for example, the loss might (i) cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced;
№20 слайд
![Levels of Impact High The](/documents_6/f514bd047746504213a87b15b3400001/img19.jpg)
Содержание слайда: Levels of Impact
High: The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. A severe or catastrophic adverse effect means that, for example, the loss might (i) cause a severe degradation in or loss of mission capability to an extent and duration that the organization is not able to perform one or more of its primary functions;
№22 слайд
![Definitions Computer Security](/documents_6/f514bd047746504213a87b15b3400001/img21.jpg)
Содержание слайда: Definitions
Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers
Network Security - measures to protect data during their transmission
Internet Security - measures to protect data during their transmission over a collection of interconnected networks
№26 слайд
![Security Attack any action](/documents_6/f514bd047746504213a87b15b3400001/img25.jpg)
Содержание слайда: Security Attack
any action that compromises the security of information owned by an organization
information security is about how to prevent attacks, or failing that, to detect attacks on information-based systems
often threat & attack used to mean same thing
have a wide range of attacks
can focus of generic types of attacks
passive
active
№28 слайд
![Passive Attacks Have passive](/documents_6/f514bd047746504213a87b15b3400001/img27.jpg)
Содержание слайда: Passive Attacks
Have “passive attacks” which attempt to learn or make use of information from the system but does not affect system resources.
By eavesdropping on, or monitoring of, transmissions to:
+ obtain message contents or
+ monitor traffic flows
Are difficult to detect because they do not involve any alteration of the data.
№30 слайд
![Active Attacks active attacks](/documents_6/f514bd047746504213a87b15b3400001/img29.jpg)
Содержание слайда: Active Attacks
“active attacks” which attempt to alter system resources or affect their operation.
By modification of data stream to:
masquerade of one entity as some other
replay previous messages (as shown above in Stallings Figure 1.4b)
modify messages in transit
denial of service
№31 слайд
![Active Attacks Active attacks](/documents_6/f514bd047746504213a87b15b3400001/img30.jpg)
Содержание слайда: Active Attacks
Active attacks present the opposite characteristics of passive attacks. Whereas passive attacks are difficult to detect, measures are available to prevent their success. On the other hand, it is quite difficult to prevent active attacks absolutely, because of the wide variety of potential physical,software,and network vulnerabilities. Instead, the goal is to detect active attacks and to recover from any disruption or delays caused by them.
№32 слайд
![Security Service enhance](/documents_6/f514bd047746504213a87b15b3400001/img31.jpg)
Содержание слайда: Security Service
enhance security of data processing systems and information transfers of an organization
intended to counter security attacks
using one or more security mechanisms
often replicates functions normally associated with physical documents
which, for example, have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded or licensed
№33 слайд
![Security Mechanism feature](/documents_6/f514bd047746504213a87b15b3400001/img32.jpg)
Содержание слайда: Security Mechanism
feature designed to detect, prevent, or recover from a security attack
no single mechanism that will support all services required
however one particular element underlies many of the security mechanisms in use:
cryptographic techniques
hence our focus on this topic
№34 слайд
![Security Services X. a](/documents_6/f514bd047746504213a87b15b3400001/img33.jpg)
Содержание слайда: Security Services
X.800:
“a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers”
RFC 2828:
“a processing or communication service provided by a system to give a specific kind of protection to system resources”
№35 слайд
![Security Services X.](/documents_6/f514bd047746504213a87b15b3400001/img34.jpg)
Содержание слайда: Security Services (X.800)
Authentication - assurance that the communicating entity is the one claimed
Access Control - prevention of the unauthorized use of a resource
Data Confidentiality –protection of data from unauthorized disclosure
Data Integrity - assurance that data received is as sent by an authorized entity
Non-Repudiation - protection against denial by one of the parties in a communication
№36 слайд
![Security Mechanisms X.](/documents_6/f514bd047746504213a87b15b3400001/img35.jpg)
Содержание слайда: Security Mechanisms (X.800)
specific security mechanisms:
encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization
pervasive security mechanisms:
trusted functionality, security labels, event detection, security audit trails, security recovery
№38 слайд
![Model for Network Security In](/documents_6/f514bd047746504213a87b15b3400001/img37.jpg)
Содержание слайда: Model for Network Security
In considering the place of encryption, its useful to use the following two models
The first, illustrated in Figure 1.5, models information flowing over an insecure communications channel, in the presence of possible opponents. Hence an appropriate security transform (encryption algorithm) can be used, with suitable keys, possibly negotiated using the presence of a trusted third party.
№39 слайд
![Model for Network Security](/documents_6/f514bd047746504213a87b15b3400001/img38.jpg)
Содержание слайда: Model for Network Security
using this model requires to:(there are four basic tasks in designing a particular security service)
design a suitable algorithm for the security transformation
generate the secret information (keys) used by the algorithm
develop methods to distribute and share the secret information
specify a protocol enabling the principals to use the transformation and secret information for a security service
№40 слайд
![Model for Network Security](/documents_6/f514bd047746504213a87b15b3400001/img39.jpg)
Содержание слайда: Model for Network Security
The second, illustrated in Figure 1.6, model is concerned with controlled access to information or resources on a computer system, in the presence of possible opponents. Here appropriate controls are needed on the access and within the system, to provide suitable security. Some cryptographic techniques are useful here also.
№42 слайд
![Model for Network Access](/documents_6/f514bd047746504213a87b15b3400001/img41.jpg)
Содержание слайда: Model for Network Access Security
using this model requires us to:
select appropriate gatekeeper functions to identify users
implement security controls to ensure only authorised users access designated information or resources
trusted computer systems may be useful to help implement this model
Скачать все slide презентации Network security одним архивом:
Похожие презентации
-
The role of social networks in youth's life
-
Компьютерная сеть (Computer Network)
-
Cybersecurity
-
Техніка безпеки. Електронна пошта. Урок 1
-
Топ 10 сайтов
-
Залогинивание
-
Концепция сайта кафе Авокадо
-
Правила участия в скайп-конференциях
-
Информационная кампания для родителей (законных представителей) ДДЮТ
-
Сервис Рука помощи на официальном сайте Череповца
-
Задача регистрации курсов (use case)