network security philosphy introduction
play

Network Security Philosphy & Introduction Dr. Enis Karaarslan - PowerPoint PPT Presentation

Network Security Philosphy & Introduction Dr. Enis Karaarslan Mula University Computer Engineering Department 4/30/15 Dr. Enis Karaarslan 1 4/30/15 Ar. Gr. Enis Karaaslan 2 SECURITY PHILOSPHY 4/30/15 Ar. Gr. Enis Karaaslan


  1. Network Security Philosphy & Introduction Dr. Enis Karaarslan Muğla University Computer Engineering Department 4/30/15 Dr. Enis Karaarslan 1

  2. 4/30/15 Ar. Gör. Enis Karaaslan 2

  3. SECURITY PHILOSPHY 4/30/15 Ar. Gör. Enis Karaaslan 3

  4.  Computer & Network Security has similarities with the security in normal life. 4/30/15 Ar. Gör. Enis Karaaslan 4

  5. There is no such thing as %100 Security 4/30/15 Ar. Gör. Enis Karaaslan 5

  6. Security at the gates only, is not enough 4/30/15 Ar. Gör. Enis Karaaslan 6

  7. A chain is only as strong as its weakest link 4/30/15 Ar. Gör. Enis Karaaslan 7

  8. As there is no %100 security … So give up? A possible solution: Use more than one chain 4/30/15 Ar. Gör. Enis Karaaslan 8

  9. MULTI LAYER SECURITY 4/30/15 Ar. Gör. Enis Karaaslan 9

  10. 4/30/15 Ar. Gör. Enis Karaaslan 10

  11. Security x Usability 4/30/15 Ar. Gör. Enis Karaaslan 11

  12.  Keep in mind that  When Security measures increase,  Usability decrease 4/30/15 Ar. Gör. Enis Karaaslan 12

  13. Value of Assets and Expenditures ● What is the VALUE of your asset (data, prestige …)? ● Keep in mind that ● Security expenditures should not be greater than the value of the assets 4/30/15 Ar. Gör. Enis Karaaslan 13

  14. Risk ... Smoking in the oil station … %99 percent nothing happens … %1 ... 4/30/15 Ar. Gör. Enis Karaaslan 14

  15. Risk ...

  16. It's discipline anyway … :)

  17. Mitigate (azaltmak) Risk

  18. Risk Analysis ● Risk analysis is essential ● If the risk is too low, that/some precaution(s) can be cancelled … 4/30/15 Ar. Gör. Enis Karaaslan 19

  19. False Sense of Security  A “false sense of security” is worse than “a true sense of insecurity”.  Solution: Never think your system is secure. 4/30/15 Ar. Gör. Enis Karaaslan 20

  20. No Template Which Suits All  There is no templates which suits all.  There is a different solution for different organizations • Different needs • Different assets 4/30/15 Ar. Gör. Enis Karaaslan 21

  21. To win a war, one must know the way Sun Tzu The Art of War 4/30/15 Ar. Gör. Enis Karaaslan 22

  22. Security is a process, not a product. Bruce Schneier 4/30/15 Ar. Gör. Enis Karaaslan 23

  23. MONITOR  The system should be monitored for intrusions  And immediate action should be taken at attacks 4/30/15 Ar. Gör. Enis Karaaslan 24

  24. Warn The Attacker 4/30/15 Ar. Gör. Enis Karaaslan 25

  25. Network Awareness  Know your enemy (?)  Know yourself, • know your assets • know what to protect  Know your systems more than the attacker 4/30/15 Ar. Gör. Enis Karaaslan 26

  26. Eğer bu kadar kötü yazılım güvenliğine sahip olmasaydık, Bu kadar çok ağ güvenliğine ihtiyacımız olmayacaktı Bruce Schneier

  27. (Web) Application Security ● Security by Design ● Secure coding ● And others ...

  28. FUNDAMENTALS 4/30/15 Ar. Gör. Enis Karaaslan 29

  29. Information System and Security ATTACK SECURITY ATTACKER MEASURES VULNERABILITY USERS INFORMATION SYSTEM

  30. Vulnerable Systems  The systems are vulnerable • Mainly because of bad coding • Must be patched (but can not be done rapidly as they should) • False sense of security 4/30/15 Ar. Gör. Enis Karaaslan 31

  31. A vulnerability timeline …

  32. The Attacker/Intruder  The attacker can be called as: Lamer, intruder, attacker … (wrongly used as hacker also)  Also secret organizations?  Also companies (serious antivirus/defence economy) 4/30/15 Ar. Gör. Enis Karaaslan 33

  33. Hacker /Lamer /Attacker … Hacker is used as attacker/lamer, in the meaning: The intruder, who gets in your system and intends to use for his/her own aims. 4/30/15 Ar. Gör. Enis Karaaslan 34

  34. The Attacker  The attackers strength is Dedication • Will not stop until he/she gets in • Can use the computer for days long sleepless • Knows the vulnerabilities of systems 4/30/15 Ar. Gör. Enis Karaaslan 35

  35. 4/30/15 Ar. Gör. Enis Karaaslan 36

  36. Network Security Assets  Network Security Overall • Network Awareness • Firewall, Intrusion Detection Systems … etc • More …  Host (Computer/Server/NW Device) Security • Physical Security • OS and Application Security • User Management  Encryption 4/30/15 Ar. Gör. Enis Karaaslan 37

  37. Firewall 4/30/15 Ar. Gör. Enis Karaaslan 38

  38. Firewall Basics  Rule based access control between networks.  Software/hardware based  Architecture • Static Packet Filtering • Dynamic Packet Filtering (Statefull inspection) • Application Level Protection  Logging and alert capabilities 4/30/15 Ar. Gör. Enis Karaaslan 39

  39. Encryption  Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. (Encryption x Decryption) 4/30/15 Ar. Gör. Enis Karaaslan 40

  40. Encryption  Two different methods (according to key use) • Conventional– Two keys are the same • Asymetric – ( Public Key Encryption ) – Key pair (public, private) 4/30/15 Ar. Gör. Enis Karaaslan 41

  41. Encryption  To decyrpt an encrypted data • How much time? • How much Processing (Computing power)?  The science which deals with encryption is Cryptology 4/30/15 Ar. Gör. Enis Karaaslan 42

  42. END OF THE SESSION Dr. Enis Karaaslan enis.karaarslan@mu.edu.tr 4/30/15 Ar. Gör. Enis Karaaslan 43

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend