Introduction To Network Security
Introduction To Network Security
keep information confidentiality and integrity
provide availability to authorized users
P assive attack—attacker does
not modify data but snoops
and monitors information transit.
Security Threats Attacker performs traffic analysis to
obtain original content. Threat to
Passive confidentiality.
Confidentiality Snooping
Integrity
Traffic Analysis
Active
Modification
Masquerading
A ctive attack—attacker modifies
data. Threat to data integrity
and availability.
Replaying
Repudiation
C
Denial of Service
onfidentiality through (1) sym-
metric-key or (2) asymmetric-
key cryptography
Definition
Masquerade—attacker pretends to be another entity
Replaying—data units are captured and resent
I ntegrity through message digest,
digital signature