csg513 netsec lecture 1 jan 09 2012

14
BITS Pilani Pilani | Dubai | Goa | Hyderabad Network Security Lecture-1, January 9, 2012 Rahul Banerjee , PhD (CSE) Professor, Department of Computer Science & Information Systems E-mail:[email protected], Home: http://universe.bits-pilani.ac.in/pilani/rahulbanerjee/Profile  

Upload: neha-sharma

Post on 06-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 1/14

BITS PilaniPilani | Dubai | Goa | Hyderabad

Network SecurityLecture-1, January 9, 2012

Rahul Banerjee, PhD (CSE)

Professor, Department of Computer Science & Information Systems

E-mail:[email protected], Home: http://universe.bits-pilani.ac.in/pilani/rahulbanerjee/Profile  

Page 2: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 2/14

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

About the focus of the course

How shall this course be conducted?

Resources & Timelines for the course

What is Network Security?

Elements involved in Network Security

Select References to the literature Summary

Interaction Points

Page 3: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 3/14

11/01/12 (c)Dr.RahulBanerjee,BITSPilani,INDIA 3

AbouttheFocusoftheCourse

This course aims at:•  Learning about the basics of Computer Networking

•  Developing an ability to:

 –  Understand security requirements of a given network or 

internetwork,

 –  Conceptualizing a simple but effective solution to reasonably

secure a given network or internetwork,

 –  Designing a verifiable network security system,

 –  Configure a simple network for ensuring required level of 

security, –  Analyze a given network security system’s architecture /

design &

 –  Selecting / developing software element required to secure a

simple network / internetwork / service

Page 4: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 4/14

11/01/12 4

TheCoursePlan• Methodologytobeused:

• 42Classroomlectures(threeperweek,aspertheprovidedcoursehandout)

• LearningReinforcementsthrough:• OnlineDiscussionForum(attheLMS:hp://nalanda.bits-pilani.ac.in/)•  Case-studiesinterlacedwithdesigndiscussions(inclassroom)• Mini-project/TheoreQcalStudy/ResearchSeminar/LaboratoryExperiments:25%

•  Self-studyassignments<forlearningenhancementatappropriatepointsofQme,noevaluaQonweightage>

• OnlyONETest:Mid-SemesterTest<closedbook>30%• uizzes<OpenBook/OpenNotes>5%•  ComprehensiveExaminaQon<OpenBook:20%,ClosedBook:20%>30%

<YouareallowedtocarryLaptops/Notebooks/Netbooks/Tablets/iPadsetc.withwirelessaccess

disabledinclassroomsaswellasinopen-bookexaminaQonsandquizzes>(c) Dr. Rahul Banerjee, BITS Pilani, INDIA

Page 5: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 5/14

11/01/12 (c)Dr.RahulBanerjee,BITSPilani,INDIA 5

ResourcesfortheCourse•  Course Home Page: 

 –  URL: http://universe.bits-pilani.ac.in/pilani/rahulbanerjee/NetworkSecurity 

 –  This page shall have the original slides <in PDF> developed by me

•  Course Forum at the Nalanda LMS portal: –  URL: http://nalanda.bits-pilani.ac.in 

 –  This page shall carry links to:

•  Discussion Forum

•  Reading advisories

•  Challenges for bright students <meant for self-learning, noevaluation weightage>

•  Occasional Links to News items of contemporary relevance to

the topic under discussion•  Laboratory tips developed with the help of student volunteers

•  Indicative Solutions to Test / Quiz / Compre. Exam papers 

•  IntraBITS Page for Course: –  http://intraBITS.bits-pilani.ac.in <January 15, 2012 onward>

Page 6: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 6/14

11/01/12 (c)Dr.RahulBanerjee,BITSPilani,INDIA 6

AddiQonalResourcesfortheCourse

• 

Digital Library resources: – As accessible from the http://library.bits-pilani.ac.in <including relevant online IEEE / ACM journals /magazines / standards & e-books as advisedthrough Reading Advisories>>

 – Access to select complete E-books via Books 24x7

•  Laboratory resources:

 – Fixed and Mobile Networking equipment located at•  IBM Laboratory for Open Source Computing,

•  Microsoft Laboratory for Mobile Computing and

•  Chamber Consultation Hours: –  Monday: 1700 – 1800 Hrs.

Page 7: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 7/14

11/01/12 (c)Dr.RahulBanerjee,BITSPilani,INDIA 7

NetworkSecurity:AnIntroducQon

• NetworkSecurity – NetworkSecurityiso^enviewedasthebranchofstudydealingwithneedtoprotect:

• oneormoreaspectsofoperaQonofComputerNetworks;and,• permieduse(access,behaviour,performance,privacyandconfidenQality),

 – SecurityrequirementsofaNetworkmaybeLocalorGlobalintheirscope,dependinguponthenetwork’sorinternetwork’spurposeofdesignanddeployment.

Page 8: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 8/14

(c)RahulBanerjee,BITS,Pilani(India)

8

AcQveversusPassiveAacks

•  AcQveaacksinvolveac.vea0emptsonsecurityleadingtomodifica.on,redirec.on,blockageordestruc.onofdata,devicesorlinks – Examples:

• ModificaQon/corrupQonofdataoraccesscontrolbits

•  Denial-ofServiceaacks•  Passiveaacksinvolvesimplygengaccesstolinkordeviceandconsequentlydata.

Page 9: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 9/14

(c)RahulBanerjee,BITS,Pilani(India)

9

RoleofCryptography,OS&

ConfiguraQon•  RoleofCryptography

 – Symmetric/ConvenQonalcryptography – Asymmetriccryptography

•  RoleofOperaQngSystems – Built-inOSSecurityattheKernel-level – SupportforCryptographicAPIs – NetworkProtocolStackdesignbasedsecurity

•  RoleofConfiguraQoninSecurity – NetworkconfiguraQon – OSconfiguraQon – ApplicaQonconfiguraQon – SecuritySystemconfiguraQon

Page 10: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 10/14

(c)RahulBanerjee,BITS,Pilani(India)

10

Symmetric-KeyCryptography•  Symmetric-Keycryptographyiscalledsosinceinthisclassofcryptographicalgorithms,encrypQonaswellasdecrypQonprocessesareperformedusingthesame(i.e.symmetric)key.

•  Thealgorithms/schemes/programsthatusethisparadigmareo^entermedasSymmetric-KeyCiphers/Private-KeyCiphers/Secret-KeyCiphers/ConvenQonalCiphersetc.

•  Insuchcases,Plaintext,EncrypQon-DecrypQonAlgorithm,KeyandCiphertextformfourbasiccomponentsoftheSymmetricCipherModel.

•  Suchschemesshould exhibit:•  SecurityofKeyDistribu0ontothelegalrecipients)•  AdequatestrengthofEncryp0on

Page 11: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 11/14

(c)RahulBanerjee,BITS,Pilani(India)

11

References

• BruceSchneier:AppliedCryptography,WileyStudentEdiQon,SecondEdiQon,Singapore,1996.

•  AlfredMenezes,PaulvanOorschot,andScoVanstone:HandbookofAppliedCryptography.CRCPress,NY.

•  WilliamStallings:CryptographyandNetworkSecurity.Fi^hEdiQon,Pearson,NewDelhi,2011.

•  C.Kauffman,R.PerlmanandM.Spenser:NetworkSecurity,SecondEdiQon,PrenQceHall,EnglewoodCliffs,2002.

•  S.BellovinandW.Chesvick:InternetSecurityandFirewalls,SecondEdiQon,Addison-Wesley,Reading,1998.

Page 12: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 12/14

(c)RahulBanerjee,BITS,Pilani(India)

12

RecommendaQonsforFurtherReading

•  Journals&Magazines –  IEEE/ACMTransacQonsonNetworking –  IEEETransacQonsonWirelessCommunicaQons –  IEEETransacQonsonComputers –  IEEESecurity&Privacy –  IEEProceedingsonInformaQonSecurity –  IEEENetwork –  IEEEComputer –  IEEEPervasiveCompuQng –  IEEEPersonalCommunicaQons –  Elsevier’sPervasiveCompuQng

Page 13: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 13/14

(c)RahulBanerjee,BITS,Pilani(India)

13

RecommendaQonsforFurtherReading

•  On-lineResources –  IETFPosQngsatie.org –  Periodicupdatesatnist.gov –

  SelectFIPSdocumentsatfips.org –  DigitalLibraries/Archives/TechnicalReportsatmajorresearchuniversiQesacQveinthisareaasshallbemenQonedfromQmetoQmeduringlectures

 –  RahulBanerjee:LectureNotesonNetworkSecurity,ElectronicRead-onlyediQontobeavailablejustbeforeMid-SemTestatthecoursepage

Page 14: CSG513 NetSEc Lecture 1 Jan 09 2012

8/3/2019 CSG513 NetSEc Lecture 1 Jan 09 2012

http://slidepdf.com/reader/full/csg513-netsec-lecture-1-jan-09-2012 14/14

BITS PilaniPilani | Dubai | Goa | Hyderabad

Rahul Banerjee

Thank you for your kind attention!