尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Inam Ul Haq
MS Computer Science (Sweden)
Inam.bth@gmail.com, mr.inam.ulhaq@ieee.org
Discussion forum: questions.computingcage.com
Member of IEEE, ACM, Movement Disorder Society, PDF, BossMedia,
Michealjfox, Association for Information Systems and Internet Society.
Network Security
1 Network Security, University of Okara
Lecture 2: Terminologies
Table of Contents
Network Security, University of Okara2
 Terminologies
 White Hacking
 Exercise
Terminologies
Network Security, University of Okara3
 Threats
 Attacks
 Risk Analysis
 Dependability Overview
 Terms: Cipher, Cryptology, Cryptanalysis,
Cryptography
 Exercise
Threat
Network Security, University of Okara4
 A risk of attack, or, chance of getting attacked.
 Attack: when a risk/treat is implemented.
 Omini-Present Security: more or less all
systems have security aspects that need to be
discussed. So Security Engineering deals with
ALL aspects of security.
 Example: ATM (placing metal to fool customers)
4 Common Threats
Network Security, University of Okara5
 Common threats in a computer setting include:
 Spoofing: the attacker pretends to be somebody
else
 Tampering with data: e.g. security settings are
changed to
give an attacker more privileges
 Repudiation: a user denies having performed an
action like
mounting an attack
 Denial-of-Service: DoS attacks can make for
instance web
sites temporarily unavailable
Risk Analysis
Network Security, University of Okara6
1.Identify the assets to protect
2.Find the threats for each asset
3.Prioritize each of these risks
(asset x vulnerability x threat)
4.Implement controls for each risk, or accept it
5.Monitor the effectiveness of these controls and
reiterate
Network Security, University of Okara7
Network Security, University of Okara8
Exercise
Network Security, University of Okara9
 How to find a vulnerability?
 How to remove a vulnerability?
 Windows XP (in 2002) = 35M LOC
 How to develop and exploit?
 How to prevent against exploits?

More Related Content

What's hot

Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
GAURAV. H .TANDON
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
 
Application security
Application securityApplication security
Application security
Hagar Alaa el-din
 
12 security policies
12 security policies12 security policies
12 security policies
Saqib Raza
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
Nikhil Mashruwala
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
swapneel07
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
DUET
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
Carl Ceder
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
Binghamton University
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
eiramespi07
 
User authentication
User authenticationUser authentication
User authentication
CAS
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
 
Cloud security
Cloud securityCloud security
Cloud security
BikashPokharel3
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
EdFeranil
 
Intruders
IntrudersIntruders
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Sagar Verma
 

What's hot (20)

Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Application security
Application securityApplication security
Application security
 
12 security policies
12 security policies12 security policies
12 security policies
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Network security
Network securityNetwork security
Network security
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
User authentication
User authenticationUser authentication
User authentication
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cloud security
Cloud securityCloud security
Cloud security
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
 
Intruders
IntrudersIntruders
Intruders
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 

Viewers also liked

Do you know, where your sensitive data is?
Do you know, where your sensitive data is?Do you know, where your sensitive data is?
Do you know, where your sensitive data is?
SPC Adriatics
 
Deploying and Managing Project Online and Project Server 2016
Deploying and Managing Project Online and Project Server 2016Deploying and Managing Project Online and Project Server 2016
Deploying and Managing Project Online and Project Server 2016
Rolly Perreaux, PMP
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
Computing Cage
 
Securing Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSecuring Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management Services
SPC Adriatics
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
university of education,Lahore
 
PMO + MS Project EPM 2013
PMO + MS Project EPM 2013PMO + MS Project EPM 2013
PMO + MS Project EPM 2013
SPC Adriatics
 
Project proposal to start a new enterprise
Project proposal to start a new enterpriseProject proposal to start a new enterprise
Project proposal to start a new enterprise
Samaira Mujeeb
 
PMO and Project Server 2013 main features
PMO and Project Server 2013 main features PMO and Project Server 2013 main features
PMO and Project Server 2013 main features
Ahmad Hammoud,CPM,IBA,MSE,NLP
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
university of education,Lahore
 
What’s New in Project 2016, Project Server 2016, Project Online and Office 36...
What’s New in Project 2016, Project Server 2016, Project Online and Office 36...What’s New in Project 2016, Project Server 2016, Project Online and Office 36...
What’s New in Project 2016, Project Server 2016, Project Online and Office 36...
Rolly Perreaux, PMP
 
Microsoft project
Microsoft projectMicrosoft project
Microsoft project
mabe
 
New Business Development Proposal - Adding Project Portfolio Management (PPM)...
New Business Development Proposal - Adding Project Portfolio Management (PPM)...New Business Development Proposal - Adding Project Portfolio Management (PPM)...
New Business Development Proposal - Adding Project Portfolio Management (PPM)...
Rolly Perreaux, PMP
 
Integracion requisto entregable linea de base
Integracion requisto entregable linea de baseIntegracion requisto entregable linea de base
Integracion requisto entregable linea de base
ALPHIL CONSULTORES SOC.RESP.LIMITADA
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
university of education,Lahore
 
Amarnath gupta an educationist and mentor
Amarnath gupta   an educationist and mentorAmarnath gupta   an educationist and mentor
Amarnath gupta an educationist and mentor
Amarnath Gupta
 
A Fractal Approach To Innovation
A Fractal Approach To InnovationA Fractal Approach To Innovation
A Fractal Approach To Innovation
Steve Gladstone
 
7 Updates in Microsoft Project 2016
7 Updates in Microsoft Project 20167 Updates in Microsoft Project 2016
7 Updates in Microsoft Project 2016
Advaiya Solutions, Inc.
 
How to secure your data in Office 365
How to secure your data in Office 365 How to secure your data in Office 365
How to secure your data in Office 365
SPC Adriatics
 
Steganography
SteganographySteganography
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 

Viewers also liked (20)

Do you know, where your sensitive data is?
Do you know, where your sensitive data is?Do you know, where your sensitive data is?
Do you know, where your sensitive data is?
 
Deploying and Managing Project Online and Project Server 2016
Deploying and Managing Project Online and Project Server 2016Deploying and Managing Project Online and Project Server 2016
Deploying and Managing Project Online and Project Server 2016
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Securing Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSecuring Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management Services
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
PMO + MS Project EPM 2013
PMO + MS Project EPM 2013PMO + MS Project EPM 2013
PMO + MS Project EPM 2013
 
Project proposal to start a new enterprise
Project proposal to start a new enterpriseProject proposal to start a new enterprise
Project proposal to start a new enterprise
 
PMO and Project Server 2013 main features
PMO and Project Server 2013 main features PMO and Project Server 2013 main features
PMO and Project Server 2013 main features
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
What’s New in Project 2016, Project Server 2016, Project Online and Office 36...
What’s New in Project 2016, Project Server 2016, Project Online and Office 36...What’s New in Project 2016, Project Server 2016, Project Online and Office 36...
What’s New in Project 2016, Project Server 2016, Project Online and Office 36...
 
Microsoft project
Microsoft projectMicrosoft project
Microsoft project
 
New Business Development Proposal - Adding Project Portfolio Management (PPM)...
New Business Development Proposal - Adding Project Portfolio Management (PPM)...New Business Development Proposal - Adding Project Portfolio Management (PPM)...
New Business Development Proposal - Adding Project Portfolio Management (PPM)...
 
Integracion requisto entregable linea de base
Integracion requisto entregable linea de baseIntegracion requisto entregable linea de base
Integracion requisto entregable linea de base
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
Amarnath gupta an educationist and mentor
Amarnath gupta   an educationist and mentorAmarnath gupta   an educationist and mentor
Amarnath gupta an educationist and mentor
 
A Fractal Approach To Innovation
A Fractal Approach To InnovationA Fractal Approach To Innovation
A Fractal Approach To Innovation
 
7 Updates in Microsoft Project 2016
7 Updates in Microsoft Project 20167 Updates in Microsoft Project 2016
7 Updates in Microsoft Project 2016
 
How to secure your data in Office 365
How to secure your data in Office 365 How to secure your data in Office 365
How to secure your data in Office 365
 
Steganography
SteganographySteganography
Steganography
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 

Similar to Network Security Terminologies

Lecture 1
Lecture 1Lecture 1
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
OWASP EEE
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
Baggam Sailusha
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
VishwanathMahalle
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
Information Technology
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
abrahamermias1
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
Pankaj Jha
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
Rohana K Amarakoon
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
IJNSA Journal
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture A
CMDLearning
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
spoonerneddy
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-Security
Phdtopiccom
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
ssuserec53e73
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
Pandiya Rajan
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
Tamer Nadeem
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
Rohana K Amarakoon
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
newbie2019
 
Information security power point slides.ppt
Information security power point slides.pptInformation security power point slides.ppt
Information security power point slides.ppt
MuhammadAbdullah311866
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
Abdelkhalik Mosa
 
The VTC experience
The VTC experienceThe VTC experience
The VTC experience
frisksoftware
 

Similar to Network Security Terminologies (20)

Lecture 1
Lecture 1Lecture 1
Lecture 1
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture A
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-Security
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Information security power point slides.ppt
Information security power point slides.pptInformation security power point slides.ppt
Information security power point slides.ppt
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
 
The VTC experience
The VTC experienceThe VTC experience
The VTC experience
 

More from university of education,Lahore

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
university of education,Lahore
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
university of education,Lahore
 
ePayment Methods
ePayment MethodsePayment Methods
SEO
SEOSEO
A Star Search
A Star SearchA Star Search
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
university of education,Lahore
 
Uml Diagrams
Uml DiagramsUml Diagrams
eDras Max
eDras MaxeDras Max
RAD Model
RAD ModelRAD Model
Microsoft Project
Microsoft ProjectMicrosoft Project
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
university of education,Lahore
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
university of education,Lahore
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
university of education,Lahore
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
university of education,Lahore
 
Java Script
Java ScriptJava Script
Group 10 flip flop and rs latch 1
Group 10 flip flop and rs latch 1Group 10 flip flop and rs latch 1
Group 10 flip flop and rs latch 1
university of education,Lahore
 
Group 11 introduction to registers and counters
Group 11 introduction to registers and countersGroup 11 introduction to registers and counters
Group 11 introduction to registers and counters
university of education,Lahore
 
Group 9 flip flops
Group 9 flip flopsGroup 9 flip flops
Group 9 flip flops
university of education,Lahore
 
Group 12 ram
Group 12 ramGroup 12 ram
Group 7 combinational logic
Group 7 combinational logicGroup 7 combinational logic
Group 7 combinational logic
university of education,Lahore
 

More from university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 
Java Script
Java ScriptJava Script
Java Script
 
Group 10 flip flop and rs latch 1
Group 10 flip flop and rs latch 1Group 10 flip flop and rs latch 1
Group 10 flip flop and rs latch 1
 
Group 11 introduction to registers and counters
Group 11 introduction to registers and countersGroup 11 introduction to registers and counters
Group 11 introduction to registers and counters
 
Group 9 flip flops
Group 9 flip flopsGroup 9 flip flops
Group 9 flip flops
 
Group 12 ram
Group 12 ramGroup 12 ram
Group 12 ram
 
Group 7 combinational logic
Group 7 combinational logicGroup 7 combinational logic
Group 7 combinational logic
 

Recently uploaded

Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptxScience-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Catherine Dela Cruz
 
Interprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdfInterprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdf
Ben Aldrich
 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
khabri85
 
Creativity for Innovation and Speechmaking
Creativity for Innovation and SpeechmakingCreativity for Innovation and Speechmaking
Creativity for Innovation and Speechmaking
MattVassar1
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
Celine George
 
pol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdfpol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdf
BiplabHalder13
 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
Quizzito The Quiz Society of Gargi College
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity
RuchiRathor2
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 
Keynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse CityKeynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse City
PJ Caposey
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
Derek Wenmoth
 
Post init hook in the odoo 17 ERP Module
Post init hook in the  odoo 17 ERP ModulePost init hook in the  odoo 17 ERP Module
Post init hook in the odoo 17 ERP Module
Celine George
 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
MattVassar1
 
bryophytes.pptx bsc botany honours second semester
bryophytes.pptx bsc botany honours  second semesterbryophytes.pptx bsc botany honours  second semester
bryophytes.pptx bsc botany honours second semester
Sarojini38
 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
EducationNC
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
Nguyen Thanh Tu Collection
 
Cross-Cultural Leadership and Communication
Cross-Cultural Leadership and CommunicationCross-Cultural Leadership and Communication
Cross-Cultural Leadership and Communication
MattVassar1
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 

Recently uploaded (20)

Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptxScience-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
 
Interprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdfInterprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdf
 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
 
Creativity for Innovation and Speechmaking
Creativity for Innovation and SpeechmakingCreativity for Innovation and Speechmaking
Creativity for Innovation and Speechmaking
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
 
pol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdfpol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdf
 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 
Keynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse CityKeynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse City
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
 
Post init hook in the odoo 17 ERP Module
Post init hook in the  odoo 17 ERP ModulePost init hook in the  odoo 17 ERP Module
Post init hook in the odoo 17 ERP Module
 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
 
bryophytes.pptx bsc botany honours second semester
bryophytes.pptx bsc botany honours  second semesterbryophytes.pptx bsc botany honours  second semester
bryophytes.pptx bsc botany honours second semester
 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
 
Cross-Cultural Leadership and Communication
Cross-Cultural Leadership and CommunicationCross-Cultural Leadership and Communication
Cross-Cultural Leadership and Communication
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 

Network Security Terminologies

  • 1. Inam Ul Haq MS Computer Science (Sweden) Inam.bth@gmail.com, mr.inam.ulhaq@ieee.org Discussion forum: questions.computingcage.com Member of IEEE, ACM, Movement Disorder Society, PDF, BossMedia, Michealjfox, Association for Information Systems and Internet Society. Network Security 1 Network Security, University of Okara Lecture 2: Terminologies
  • 2. Table of Contents Network Security, University of Okara2  Terminologies  White Hacking  Exercise
  • 3. Terminologies Network Security, University of Okara3  Threats  Attacks  Risk Analysis  Dependability Overview  Terms: Cipher, Cryptology, Cryptanalysis, Cryptography  Exercise
  • 4. Threat Network Security, University of Okara4  A risk of attack, or, chance of getting attacked.  Attack: when a risk/treat is implemented.  Omini-Present Security: more or less all systems have security aspects that need to be discussed. So Security Engineering deals with ALL aspects of security.  Example: ATM (placing metal to fool customers)
  • 5. 4 Common Threats Network Security, University of Okara5  Common threats in a computer setting include:  Spoofing: the attacker pretends to be somebody else  Tampering with data: e.g. security settings are changed to give an attacker more privileges  Repudiation: a user denies having performed an action like mounting an attack  Denial-of-Service: DoS attacks can make for instance web sites temporarily unavailable
  • 6. Risk Analysis Network Security, University of Okara6 1.Identify the assets to protect 2.Find the threats for each asset 3.Prioritize each of these risks (asset x vulnerability x threat) 4.Implement controls for each risk, or accept it 5.Monitor the effectiveness of these controls and reiterate
  • 9. Exercise Network Security, University of Okara9  How to find a vulnerability?  How to remove a vulnerability?  Windows XP (in 2002) = 35M LOC  How to develop and exploit?  How to prevent against exploits?
  翻译: