Chapter-01PPT課件_第1頁
Chapter-01PPT課件_第2頁
Chapter-01PPT課件_第3頁
Chapter-01PPT課件_第4頁
Chapter-01PPT課件_第5頁
已閱讀5頁,還剩17頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

1、The art of war teaches us to rely not on the likelihood of the enemys not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. The Art of War, Sun Tzu第1頁/共22頁The combination of space, time, and st

2、rength that must be considered as the basic elements of this theory of defense makes this a fairly complicated matter. Consequently, it is not easy to find a fixed point of departure. On War, Carl Von Clausewitz第2頁/共22頁Computer Security the protection afforded to an automated information system in o

3、rder to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)第3頁/共22頁Key Security Concepts第4頁/共22頁Levels of Impact can define 3 levels of impact

4、from a security breach Low Moderate High第5頁/共22頁Examples of Security Requirements confidentiality student grades integrity patient information availability authentication service第6頁/共22頁Computer Security Challenges第7頁/共22頁OSI Security Architecture ITU-T X.800 “Security Architecture for OSI” defines

5、a systematic way of defining and providing security requirements for us it provides a useful, if abstract, overview of concepts we will studyM acintosh P IC Tim age form atis not supported第8頁/共22頁Aspects of Security consider 3 aspects of information security: security attack security mechanism secur

6、ity service note termsthreat a potential for violation of securityattack an assault on system security, a deliberate attempt to evade security services第9頁/共22頁Passive Attacks第10頁/共22頁Active Attacks第11頁/共22頁Security Service enhance security of data processing systems and information transfers of an o

7、rganization intended to counter security attacks using one or more security mechanisms often replicates functions normally associated with physical documents which, for example, have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded

8、 or licensed第12頁/共22頁Security Services X.800:“a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers” RFC 2828:“a processing or communication service provided by a system to give a specific kind of protection to syste

9、m resources”第13頁/共22頁Security Services (X.800) Authentication - assurance that communicating entity is the one claimed have both peer-entity & data origin authentication Access Control - prevention of the unauthorized use of a resource Data Confidentiality protection of data from unauthorized disclo

10、sure Data Integrity - assurance that data received is as sent by an authorized entity Non-Repudiation - protection against denial by one of the parties in a communication Availability resource accessible/usable第14頁/共22頁Security Mechanism feature designed to detect, prevent, or recover from a securit

11、y attack no single mechanism that will support all services required however one particular element underlies many of the security mechanisms in use: cryptographic techniques hence our focus on this topic第15頁/共22頁Security Mechanisms (X.800)specific security mechanisms: encipherment, digital signatur

12、es, access controls, data integrity, authentication exchange, traffic padding, routing control, notarizationpervasive security mechanisms: trusted functionality, security labels, event detection, security audit trails, security recovery第16頁/共22頁Model for Network Security第17頁/共22頁Model for Network Se

13、curityusing this model requires us to: ldesign a suitable algorithm for the security transformation lgenerate the secret information (keys) used by the algorithm ldevelop methods to distribute and share the secret information 1.specify a protocol enabling the principals to use the transformation and

14、 secret information for a security service 第18頁/共22頁Model for Network Access Security第19頁/共22頁Model for Network Access Securityusing this model requires us to: lselect appropriate gatekeeper functions to identify users 1.implement security controls to ensure only authorised users access designated information or resources 第20頁/共22頁Summary topic

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論