Anda di halaman 1dari 38

Management and Security of

Telecommunication Networks
1. Introduction

Things you need to know

Instructor:

Dr. Rehan Qureshi

Text Books:

Cryptography and Network Security

Network Management Principles and Practices

Mani Subramanian

Email:

RQ

William Stallings

riqureshi@gmail.com , rqureshi@iqra.edu.pk

Standardized Protocol
Architectures

Required for devices to communicate


Vendors have more marketable products
Customers can insist on standards based
equipment
Two standards:

OSI Reference model

TCP/IP protocol suite

RQ

Never lived up to early promises


Most widely used

Also: IBM Systems Network Architecture


(SNA)
3

The OSI Model

International Standards Organization (ISO)

An organization dedicated to worldwide


agreement on international standards.

Open Systems Interconnection (OSI)

RQ

An ISO standard/model that covers all aspects


of network communications.
4

OSI Model

RQ

All
People
Seems
To
Need
Data
Processing
5

The OSI model

RQ

OSI
vs.
TCP/IP

RQ

Internet (TCP/IP) Model

RQ

Protocol Hierarchies

The entities
comprising the
corresponding
layers on
different
machines are
called peers.

RQ

Protocol Hierarchies
Layer 5
(Application)

RQ

10

Protocol Hierarchies

RQ

11

Internet Layers

RQ

12

Physical Layer

It is responsible for transmitting


individual bits from one node to the
next.
It is mainly concerned with

RQ

Characteristics of transmission medium


Signal levels
Data rates

13

Data Link Layer

It is responsible for transmitting frames from

one node to the next.


Its major duties are
Framing
Physical Addressing
Flow Control
Error Control
Access
Control

RQ

14

Node to node delivery

RQ

15

Network Layer

RQ

Responsible for the delivery of packets from the


original source to the final destination.
Performs routing functions across multiple
networks
Implemented in end systems and routers

16

Source to destination delivery

RQ

17

Transport Layer

It is responsible for delivery of a message


from one process to another.
Its major functions are

RQ

Port Addressing
Connection Control
Flow Control
Error Control

18

Process to process delivery

RQ

19

Application Layer

RQ

It is responsible for providing services to the


user.

20

Summary

RQ

21

Information security

The information stored in physical form


requires physical security mechanisms

With computers managing the most of


the information, tools are required for
1.
2.

RQ

e.g. rugged filing cabinets for paper


based filing systems

Computer security
Network or Internet security
22

Computer security

RQ

The collection of tools designed to


protect data on computers

23

Network security

RQ

Network or Internet security consists of


measures to deter, prevent, detect,
and correct security violations that
involve the transmission of information

24

Attacks, Mechanisms and Services

need systematic way to define


requirements
consider three aspects of information
security:

RQ

security attack
security mechanism
security service
25

Attacks, Mechanisms and Services

Security Attack: Any action that compromises


the security of information.
Security Mechanism: A mechanism that is
designed to detect, prevent, or recover from a
security attack.
Security Service: A service that enhances the
security of data processing systems and
information transfers. A security service makes
use of one or more security mechanisms
RQ

26

OSI Security Architecture

RQ

ITU-T X.800 Security Architecture for


OSI
It defines a systematic way of defining
and providing security requirements
It provides a useful, if abstract,
overview of concepts we will study

27

Security Services

RQ

X.800 defines it as: a service provided


by a protocol layer of communicating
open systems, which ensures
adequate security of the systems or of
data transfers
RFC 2828 defines it as: a processing
or communication service provided by
a system to give a specific kind of
protection to system resources
28

Security Attacks or Threats

A threat is a danger which could affect


the security (confidentiality, integrity,
availability) of assets, leading to a
potential loss or damage.

RQ

Interruption
Interception
Modification
Fabrication
29

Security Attacks

RQ

30

Security Attacks

Interruption: This is an
attack on availability
Interception: This is an
attack on confidentiality
Modification: This is
an attack on integrity
Fabrication: This is an
attack on authenticity
RQ

31

Passive and Active Attacks

RQ

32

Passive and Active Attacks

RQ

33

Security Services

Confidentiality (privacy)
Authentication (who created or sent the data)
Integrity (has not been altered)
Non-repudiation (the order is final)
Access control (prevent misuse of resources)
Availability (permanence, non-erasure)

RQ

Denial of Service Attacks


Virus that deletes files

34

Methods of Defence

RQ

Encryption
Software Controls (access limitations
in a data base, in operating system
protect each user from other users)
Hardware Controls (smartcard)
Policies (frequent changes of
passwords)
Physical Controls
35

Model for Network Security

RQ

36

Network Access Security Model

RQ

37

Summary

have considered:

RQ

standardized protocol architectures


computer, network and internet security
security services, mechanisms, attacks
OSI security architecture
models for network (access) security

38

Anda mungkin juga menyukai