




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
NetworkSecurityandPrivacyChapter1:SecurityIntroduction西电电子对抗所Security:IntheBeginning……Intheearlydaysofdataprocessing,thesecurityofinformationwasprovidedprimarilybyphysicalandadministrativemeans.Computerbuildings,floors,roomswereguardedandalarmedtopreventoutsidesfromintrudinganddisruptingoperations.Thefocuswasonphysicalbreak-ins,thetheftofcomputerequipment,andthephysicaltheftordestructionofdiskpacks,tapereels,punchcards,orothermedia.Insiderswerekeptatbyandaccesswaslimitedtoasmallsetofcomputerprofessionals.西电电子对抗所InformationSecurityTherequirementsofinformationsecuritywithinorganizationshaveundergonetwomajorchanges:Theintroductionofsharedsystemssuchastime-sharedand/orsystemsthatcanbeaccessedoverthepublictelephoneordatanetworks.Theintroductionofdistributedsystemsandtheuseofnetworksandcommunicationsfacilitiesforcarryingdatabetweenterminaluserandcomputerandbetweencomputerandcomputer.西电电子对抗所SecurityIntroduction
Computervs.NetworkSecurityComputersecurityisthegenerictermforacollectionoftoolsdesignedtoprotectdataandtothwarthackers.Networksecurityisthesecuritymeasuresthatareneededtoprotectduringtheirtransmission.Inmostsystems,theboundariesbetweencomputersecurityandnetworksecurityareblurredsincemost,ifnotall,oftoday’ssystemsaredistributedinnature.Networkingisacorepartoftoday’senvironment.西电电子对抗所ThedegreeofSecurityCurtainLockDemi-wolfSecurityalarmingsystemFencing,guard西电电子对抗所SecurityGoalsIntegrityConfidentialityAvailability西电电子对抗所SecurityIntroduction
SecurityServicesConfidentialityistheprotectionoftransmitteddatafrompassiveattacks.Authenticationisconcernedwithassuringthatacommunicationisauthentic.Integrityassuresthatmessagesarereceivedassent.Aconnection-orientedintegrityserviceshouldassurethattherearenoduplicates,insertions,deletions,modifications,reordering,orreplays.Aconnectionlessintegrityservicesdealsonlywithanindividualmessage.西电电子对抗所SecurityIntroduction
SecurityServicesNon-repudiationpreventseitherthesenderorreceiverfromdenyingatransmittedmessage.AccessControlistheabilitytolimitandcontroltheaccesshostsystemsandapplicationsviacommunicationslinks.Availabilityistheabilitytopreventthelossorareductioninavailabilityofelementsofadistributedsystem.西电电子对抗所NetworkTopology西电电子对抗所HierarchyofNetworkSecurityPhysicalSecuritySecurityControlSecurityServicePhysicalmediumOS,NICInternetworkingDeviceSecurityMechanismSecurityconnectionSecurityprotocolSecuritypolicy西电电子对抗所SecurityRisksExploitationofvulnerabilityUnauthorizedAccessInformationdisclosureInformationexhaustInformationtheft西电电子对抗所TypesofRisksSniffer
窃听Impersonate
假冒Replay
重放Trafficanalysis
通信量分析Loseofintegrity
破坏完整性Denialofservice
拒绝服务UnauthorizedAccess
非授权访问Trapdoor/TrojanHorse/Virii
恶意代码西电电子对抗所MotivesIndustryespionageFinancialgainsRevenge/publicityInnocence西电电子对抗所NetworkAttacksSecurityAttack:Anyactionthatcompromisesthesecurityofinformationownedbyanorganization.SecurityMechanism:Amechanismthatisdesignedtodetect,prevent,orrecoverfromasecurityattack.SecurityService:Aservicethatenhancesthesecurityofdataprocessingsystemsandinformationtransfers.Asecurityservicemakesuseofoneormoresecuritymechanisms.Designedtocountersecurityattacks西电电子对抗所StepsofNetworkAttacksInformationgatheringScanningvulnerabilitiesAttacking…西电电子对抗所16TheStagesofaNetworkIntrusion1.Scanthenetworkto: •locatewhichIPaddressesareinuse, •whatoperatingsystemisinuse, •whatTCPorUDPportsare“open”.2.Run“Exploit”scriptsagainstopenports3.GetaccesstoShellprogramwhichis“suid”(has“root”privileges).4.DownloadfromHackerWebsitespecialversionsofsystemsfilesthatwillletCrackerhavefreeaccessinthefuturewithouthiscputimeordiskstoragespacebeingnoticedbyauditingprograms.5.UseIRC(InternetRelayChat)toinvitefriendstothefeast.西电电子对抗所AttackingMethodsSystembugs/BackdoorsSecurityAwarenessFirewallInternalusersLackofMeanstoSecurityAuditingPasswordDenialofServiceWeb/CGI西电电子对抗所FourSecurityAttackCategoriesInterruptionAttackonavailabilityInterceptionAttackonconfidentialityModificationAttackonintegrityFabricationAttackonauthenticity西电电子对抗所
NormalFlowNormalFlowistheflowofinformationfromaninformationsource,suchasafile,oraregionofmainmemory,toadestination,suchasanotherfileoruser.西电电子对抗所InterruptionAnassetofthesystemisdestroyedorbecomesunavailableorunusable.Thisisanattackonavailability.Examples:Thedestructionofhardware,thecuttingofacommunicationline,orthedisablingofthefilemanagementsystem.西电电子对抗所InterceptionAnunauthorizedpartygainsaccesstoanasset.Thisisanattackonconfidentiality.Theunauthorizedpartycouldbeaperson,aprogram,oracomputer.Examples:Wiretappingtocapturedatainanetworkandtheunauthorizedcopyingoffilesorprograms.西电电子对抗所ModificationAnauthorizedpartynotonlygainsaccesstobuttamperswithanasset.Thisisanattackonintegrity.Examples:Changingvaluesinadatafile,alteringaprogramsothatitperformsdifferently,ormodifyingthecontentofmessagesbeingtransmittedinanetwork.西电电子对抗所FabricationAnauthorizedpartyinsertscounterfeitobjectsintothesystem.Thisanattackonauthenticity.Examples:theinsertionofspuriousmessagesinanetworkortheadditionofrecordstoafile.西电电子对抗所PassiveAttacksPassiveattackseavesdrop,ormonitor,transmission.Goal:Toobtaintransmittedinformation.2Typesofpassiveattacks西电电子对抗所
PassiveAttackTypesReleaseofcontents:Atelephoneconversation,anelectronicmailmessage,orconfidentialinformation.Trafficanalysis:Usingthelocationandidentitiesofhostsandthefrequencyandlengthofmessagestodeterminethetypeofcommunicationtakingplace.Passiveattacksaredifficulttodetectsincetheydonotinvolveanyalterationofdata.Theemphasisisonpreventionratherthandetection.西电电子对抗所ActiveAttacksAnactiveattackinvolvethemodificationofthedatastreamorthecreationofafalsestream.4Typesofactiveattacks.西电电子对抗所ActiveAttackTypesMasqueradetakesplacewhenoneentitypretendstobeadifferententity.Thisformusuallyincludesoneoftheothersformsofactiveattack.Replayinvolvesthepassivecaptureofadataunitanditssubsequentretransmissiontoproduceanunauthorizedeffect.西电电子对抗所ActiveAttackTypesIIModificationoccurswhenanunauthorizedpartygainsaccesstoandtamperswithanasset.Thisisanattackonintegrity.DenialofServicepreventsorinhibitsthenormaluseormanagementofcommunicationsfacilities.西电电子对抗所ModelforNetworkSecurity西电电子对抗所ModelforNetworkSecurityThismodeloperatesasfollows:Amessageispresentedtobetransferredfromonepartytoanotheracrosssomesortofinternet.Thetwoparties(principals)inthetransactionmustcooperatefortheexchangetotakeplace.AlogicalinformationchannelisestablishedbydefiningaroutethroughtheinternetfromsourcetodestinationusingacommunicationsprotocolsuchasTCP/IP.西电电子对抗所SecurityComponentsSecurityisanissuewhenitisnecessarytoprotectthetransmissionfromanopponent.Alltechniquesforprovidingsecurityhavetwocomponents:Asecurity-relatedtransformationontheinformationtobesent.Somesecretinformationsharebythetwoprincipalsandhopefullyunknowntoopponent.Additionally,insomecasesatrustedthirdpartymaybeusedfordistributingthesecretinformationorarbitratingdisputesbetweenthetwopartiesoverauthenticity.西电电子对抗所DesignGoalsforASecurityServiceDesignanalgorithmforperformingthesecurity-relatedtransformations.Anopponentshouldnotbeabletodefeatit!Generatethesecretinformationtobeusedwiththealgorithm.Developmethodsfordistributionandsharingofthesecretinformation.Specifyaprotocoltobeusedbythetwoprincipalsthatmakeuseofthesecurityalgorithmsandthesecretinformationtoachieveaparticularsecurityservice.西电电子对抗所NetworkAccessSecurityModel西电电子对抗所SecuritytechnologiesFirewallEncryptionAuthenticationDigitalsignatureContentinspection西电电子对抗所35Application
Layer
(HTTP)TransportLayer(TCP,UDP)NetworkLayer(IP)E'netDataLinkLayerEthernetPhys.LayerNetworkLayerE'net
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 食品代加工工厂合同范本
- 股东投资入股医院协议书
- 门面解除合同协议书范本
- 防疫应急物资保障协议书
- 管件提前终止合同协议书
- 村集体经济出租合同协议
- 泰兴虹桥港码头合同范本
- 银行资料库租赁合同范本
- 竞业协议签几百万的合同
- 海产品出口代理合同协议
- 呼吸内科质控体系构建与实施
- 山西烟草专卖局笔试试题2025含答案
- 养生馆礼仪培训
- 内科四大穿刺诊疗规范
- 2025年安全生产法知识竞赛试题(附答案)
- 医源性早发性卵巢功能不全临床治疗与管理指南
- 甲肝健康知识课件
- 商务客服礼仪培训
- 2025至2030中国防辐射服行业发展趋势分析与未来投资战略咨询研究报告
- 2025年汽车维修工职业资格考试试卷及答案
- 安全B证题库-安全生产知识考试用书
评论
0/150
提交评论