a. steffen, 14.09.2013, 0-overview.pptx 1 information security 2 (infsi2) prof. dr. andreas steffen...

5
A. Steffen, 14.09.2013, 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications (ITA) Overview

Upload: brendan-carroll

Post on 02-Jan-2016

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: A. Steffen, 14.09.2013, 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications

A. Steffen, 14.09.2013, 0-Overview.pptx 1

Information Security 2 (InfSi2)

Prof. Dr. Andreas Steffen

Institute for Internet Technologies and Applications (ITA)

Overview

Page 2: A. Steffen, 14.09.2013, 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications

A. Steffen, 14.09.2013, 0-Overview.pptx 2

Random

Sources

Cryptographical Building Blocks

BlockCipher

s

Stream

Ciphers

Symmetric KeyCryptography

Authentication

Confidentiality

Encryption

HashFunction

s

Challenge

Response

IVs

MACsMICs

MessageDigests

Nonces

Secret Keys

SmartCards

DHRSA

Public KeyCryptography

EllipticCurve

s

Digital Signatures

DataIntegrity

Secure Network Protocols and Platforms

Non-Repudiatio

n

PseudoRandom

Page 3: A. Steffen, 14.09.2013, 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications

A. Steffen, 14.09.2013, 0-Overview.pptx 3

Security Protocols for the OSI Stack

Application layer Platform Security, Web Application Security, VoIP Security, SW SecurityTransport layer TLS

Network layer IPsec

Data Link layer [PPTP, L2TP], IEEE 802.1X,IEEE 802.1AE, IEEE 802.11i (WPA2)Physical layer Quantum Cryptography

Communication layers

Security protocols

Page 4: A. Steffen, 14.09.2013, 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications

A. Steffen, 14.09.2013, 0-Overview.pptx 4

Overview, Constant Cryptographic Strength, Elliptic Curves

Agenda of “InfSi2 – Network & Platform Security”

Physical Layer Security (Quantum Crypto, Random Numbers)

18.09.13

25.09.13

2.10.13

9.10.13

16.10.13

23.10.13

30.10.13

6.11.13

13.11.13

20.11.13

27.11.13

4.12.13

11.12.13

18.12.13

Link Layer Security (MAC, WLAN, 3G/4G, 802.1X, RADIUS)

Network Layer Security (Virtual Private Networks, IPsec)

Platform Security (Trusted Platform Module, Attestation)

Platform Security (Virtualization, Separation)

Network Layer Security (Internet Key Exchange)

Network Layer Security (DNSSEC)

Session Layer Security (VoIP Security via SRTP, MIKEY)

Network Access Control (Firewalls, Intrusion Detection/Prevention)

Network Access Control (Trusted Network Connect)

Platform Security (Smartcards, Hardware Security Modules)

Platform Security Threats (Buffer Overflows, Rootkits)

Network Anonymity (Mix Chains, Tor)

Page 5: A. Steffen, 14.09.2013, 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications

A. Steffen, 14.09.2013, 0-Overview.pptx 5

Recommended Literature – Network Security

• William Stallings,Network Security Essentials,Fifth Edition,International Edition,448 pages, 2013,Pearson Education, Inc.,ISBN 0-27-379336-5

41 € @ amazon.de