Download 12_hSecurityRequirements

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cracking of wireless networks wikipedia , lookup

Mobile security wikipedia , lookup

Cyberattack wikipedia , lookup

Network tap wikipedia , lookup

Information privacy law wikipedia , lookup

Data remanence wikipedia , lookup

Computer security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
HIGHER COMPUTER NETWORKING
Lesson 12 Network Security Requirements
Description of computer and network security
requirements (confidentiality, data integrity and
availability).
Description of threats to network security in terms of
passive (monitoring of transmission) and active
(modification of the data stream or the creation of a false
stream) attacks.
McLean 2006
1
HIGHER COMPUTER NETWORKING
What You Should Know About Security Requirements
Computer and Network Security Requirements
It is required by law (The Data Protection Act) that all data held
about individuals must be protected from unauthorised
access.
Confidentiality - All network data must be kept confidential. This
can be for commercial as well as security reasons.
Data Integrity - All network data must be secure from
corruption, data loss and has to be correct and up to date.
Availability - All network data must be available to authorised
users only, but on demand! Network security systems have to
be effective but must also allow immediate authorised user
access to data.
McLean 2006
2
HIGHER COMPUTER NETWORKING
What You Should Know About Passive & Active Attacks
Threats to network security are classified as Passive or Active
Attacks.
1 Passive Attacks
A passive attack is an attempt to intercept and copy network
data.
Hackers use programs to monitor the transmission of data
travelling on the network, thus threatening the confidentiality
of the data.
Passive attacks often go unnoticed by authorised network users.
The best method of defence against passive attacks is
encryption.
McLean 2006
3
HIGHER COMPUTER NETWORKING
What You Should Know About Passive & Active Attacks
2 Active Attacks
An active attack is an attempt to damage or destroy network
data.
Hackers often modify the data stream of the network by
diverting data through a computer system which corrupts the
data before sending it on to it’s original destination.
A similar method can be used which uses false data streams i.e.
the data is diverted to a computer which replaces it with false
data which is then sent on to the destination computer.
McLean 2006
4