CNET 334 Network Security Chapter 1 Introduction Dr

  • Slides: 18
Download presentation
CNET 334 - Network Security Chapter 1 - Introduction Dr. Bremnavas Ismail Mohideen Network

CNET 334 - Network Security Chapter 1 - Introduction Dr. Bremnavas Ismail Mohideen Network Security (N. Dulay & M. Huth) Introduction (1. 1)

Network Security Essentials (4 th ed. ) Ø William Stallings, Prentice-Hall International, 2011 Network

Network Security Essentials (4 th ed. ) Ø William Stallings, Prentice-Hall International, 2011 Network Security (N. Dulay & M. Huth) Introduction (1. 2)

Course objectives Ø Ø Ø Computer Security Concepts, The OSI Security Architecture, Security Attacks,

Course objectives Ø Ø Ø Computer Security Concepts, The OSI Security Architecture, Security Attacks, Security Services Security Mechanisms, A Model for Network Security, Network Security (N. Dulay & M. Huth) Introduction (1. 3)

Computer Security - Definition Ø the protection afforded to an automated information system in

Computer Security - Definition Ø the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications) Network Security (N. Dulay & M. Huth) Introduction (1. 4)

Computer Security Objectives Network Security (N. Dulay & M. Huth) Introduction (1. 5)

Computer Security Objectives Network Security (N. Dulay & M. Huth) Introduction (1. 5)

Network Security (N. Dulay & M. Huth) Introduction (1. 6)

Network Security (N. Dulay & M. Huth) Introduction (1. 6)

Network Security (N. Dulay & M. Huth) Introduction (1. 7)

Network Security (N. Dulay & M. Huth) Introduction (1. 7)

Network Security (N. Dulay & M. Huth) Introduction (1. 8)

Network Security (N. Dulay & M. Huth) Introduction (1. 8)

Network Security (N. Dulay & M. Huth) Introduction (1. 9)

Network Security (N. Dulay & M. Huth) Introduction (1. 9)

Network Security (N. Dulay & M. Huth) Introduction (1. 10)

Network Security (N. Dulay & M. Huth) Introduction (1. 10)

Network Security (N. Dulay & M. Huth) Introduction (1. 11)

Network Security (N. Dulay & M. Huth) Introduction (1. 11)

Network Security (N. Dulay & M. Huth) Introduction (1. 12)

Network Security (N. Dulay & M. Huth) Introduction (1. 12)

Security Services Network Security (N. Dulay & M. Huth) Introduction (1. 13)

Security Services Network Security (N. Dulay & M. Huth) Introduction (1. 13)

Network Security (N. Dulay & M. Huth) Introduction (1. 14)

Network Security (N. Dulay & M. Huth) Introduction (1. 14)

Network Security (N. Dulay & M. Huth) Introduction (1. 15)

Network Security (N. Dulay & M. Huth) Introduction (1. 15)

Network Security (N. Dulay & M. Huth) Introduction (1. 16)

Network Security (N. Dulay & M. Huth) Introduction (1. 16)

Network Security (N. Dulay & M. Huth) Introduction (1. 17)

Network Security (N. Dulay & M. Huth) Introduction (1. 17)

Network Security (N. Dulay & M. Huth) Introduction (1. 18)

Network Security (N. Dulay & M. Huth) Introduction (1. 18)