Chapter-01PPT課件_第1頁(yè)
Chapter-01PPT課件_第2頁(yè)
Chapter-01PPT課件_第3頁(yè)
Chapter-01PPT課件_第4頁(yè)
Chapter-01PPT課件_第5頁(yè)
已閱讀5頁(yè),還剩17頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、The art of war teaches us to rely not on the likelihood of the enemys not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. The Art of War, Sun Tzu第1頁(yè)/共22頁(yè)The combination of space, time, and st

2、rength that must be considered as the basic elements of this theory of defense makes this a fairly complicated matter. Consequently, it is not easy to find a fixed point of departure. On War, Carl Von Clausewitz第2頁(yè)/共22頁(yè)Computer Security the protection afforded to an automated information system in o

3、rder to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)第3頁(yè)/共22頁(yè)Key Security Concepts第4頁(yè)/共22頁(yè)Levels of Impact can define 3 levels of impact

4、from a security breach Low Moderate High第5頁(yè)/共22頁(yè)Examples of Security Requirements confidentiality student grades integrity patient information availability authentication service第6頁(yè)/共22頁(yè)Computer Security Challenges第7頁(yè)/共22頁(yè)OSI Security Architecture ITU-T X.800 “Security Architecture for OSI” defines

5、a systematic way of defining and providing security requirements for us it provides a useful, if abstract, overview of concepts we will studyM acintosh P IC Tim age form atis not supported第8頁(yè)/共22頁(yè)Aspects of Security consider 3 aspects of information security: security attack security mechanism secur

6、ity service note termsthreat a potential for violation of securityattack an assault on system security, a deliberate attempt to evade security services第9頁(yè)/共22頁(yè)P(yáng)assive Attacks第10頁(yè)/共22頁(yè)Active Attacks第11頁(yè)/共22頁(yè)Security Service enhance security of data processing systems and information transfers of an o

7、rganization intended to counter security attacks using one or more security mechanisms often replicates functions normally associated with physical documents which, for example, have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded

8、 or licensed第12頁(yè)/共22頁(yè)Security Services X.800:“a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers” RFC 2828:“a processing or communication service provided by a system to give a specific kind of protection to syste

9、m resources”第13頁(yè)/共22頁(yè)Security Services (X.800) Authentication - assurance that communicating entity is the one claimed have both peer-entity & data origin authentication Access Control - prevention of the unauthorized use of a resource Data Confidentiality protection of data from unauthorized disclo

10、sure Data Integrity - assurance that data received is as sent by an authorized entity Non-Repudiation - protection against denial by one of the parties in a communication Availability resource accessible/usable第14頁(yè)/共22頁(yè)Security Mechanism feature designed to detect, prevent, or recover from a securit

11、y attack no single mechanism that will support all services required however one particular element underlies many of the security mechanisms in use: cryptographic techniques hence our focus on this topic第15頁(yè)/共22頁(yè)Security Mechanisms (X.800)specific security mechanisms: encipherment, digital signatur

12、es, access controls, data integrity, authentication exchange, traffic padding, routing control, notarizationpervasive security mechanisms: trusted functionality, security labels, event detection, security audit trails, security recovery第16頁(yè)/共22頁(yè)Model for Network Security第17頁(yè)/共22頁(yè)Model for Network Se

13、curityusing this model requires us to: ldesign a suitable algorithm for the security transformation lgenerate the secret information (keys) used by the algorithm ldevelop methods to distribute and share the secret information 1.specify a protocol enabling the principals to use the transformation and

14、 secret information for a security service 第18頁(yè)/共22頁(yè)Model for Network Access Security第19頁(yè)/共22頁(yè)Model for Network Access Securityusing this model requires us to: lselect appropriate gatekeeper functions to identify users 1.implement security controls to ensure only authorised users access designated information or resources 第20頁(yè)/共22頁(yè)Summary topic

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論