Chapter 8
Security
A note on the use of these PowerPoint slides:
We’re making these slides freely available to all (faculty, students,
readers). They’re in PowerPoint form so you see the animations; and
can add, modify, and delete slides (including this one) and slide content
to suit your needs. They obviously represent a lot of work on our part.
In return for use, we only ask the following:
If you use these slides (e.g., in a class) that you mention their
source (after all, we’d like people to use our book!)
If you post any slides on a www site, that you note that they are
adapted from (or perhaps identical to) our slides, and note our
copyright of this material.
Computer Network
For a revision history, see the slide note for this page.
Top-Down Approac
Thanks and enjoy! JFK/KWR 8th edition
All material copyright 1996-2020
Jim Kurose, Keith Ross
J.F Kurose and K.W. Ross, All Rights Reserved Pearson, 2020
,Security: overview
Chapter goals:
understand principles of network security:
• cryptography and its many uses beyond “confidentiality”
• authentication
• message integrity
security in practice:
• firewalls and intrusion detection systems
• security in application, transport, network, link layers
,Chapter 8 outline
What is network security?
Principles of cryptography
Message integrity, authentication
Securing e-mail
Securing TCP connections: TLS
Network layer security: IPsec
Security in wireless and mobile networks
Operational security: firewalls and IDS
, What is network security?
confidentiality: only sender, intended receiver should “understand
message contents
• sender encrypts message
• receiver decrypts message
authentication: sender, receiver want to confirm identity of each
other
message integrity: sender, receiver want to ensure message not
altered (in transit, or afterwards) without detection
access and availability: services must be accessible and available
users
Security
A note on the use of these PowerPoint slides:
We’re making these slides freely available to all (faculty, students,
readers). They’re in PowerPoint form so you see the animations; and
can add, modify, and delete slides (including this one) and slide content
to suit your needs. They obviously represent a lot of work on our part.
In return for use, we only ask the following:
If you use these slides (e.g., in a class) that you mention their
source (after all, we’d like people to use our book!)
If you post any slides on a www site, that you note that they are
adapted from (or perhaps identical to) our slides, and note our
copyright of this material.
Computer Network
For a revision history, see the slide note for this page.
Top-Down Approac
Thanks and enjoy! JFK/KWR 8th edition
All material copyright 1996-2020
Jim Kurose, Keith Ross
J.F Kurose and K.W. Ross, All Rights Reserved Pearson, 2020
,Security: overview
Chapter goals:
understand principles of network security:
• cryptography and its many uses beyond “confidentiality”
• authentication
• message integrity
security in practice:
• firewalls and intrusion detection systems
• security in application, transport, network, link layers
,Chapter 8 outline
What is network security?
Principles of cryptography
Message integrity, authentication
Securing e-mail
Securing TCP connections: TLS
Network layer security: IPsec
Security in wireless and mobile networks
Operational security: firewalls and IDS
, What is network security?
confidentiality: only sender, intended receiver should “understand
message contents
• sender encrypts message
• receiver decrypts message
authentication: sender, receiver want to confirm identity of each
other
message integrity: sender, receiver want to ensure message not
altered (in transit, or afterwards) without detection
access and availability: services must be accessible and available
users