0% found this document useful (0 votes)
78 views

Introduction To Network Security

This document provides an introduction to network security. It outlines the goals of security which are confidentiality, integrity, and availability. It describes security threats such as passive attacks like snooping and traffic analysis, and active attacks like modification, masquerading, replaying, and denial of service. It also defines security services like confidentiality, integrity, and authentication. Finally, it recommends ways to protect against threats such as using firewalls, anti-virus software, and virtual private networks.

Uploaded by

Judy Oscillada
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views

Introduction To Network Security

This document provides an introduction to network security. It outlines the goals of security which are confidentiality, integrity, and availability. It describes security threats such as passive attacks like snooping and traffic analysis, and active attacks like modification, masquerading, replaying, and denial of service. It also defines security services like confidentiality, integrity, and authentication. Finally, it recommends ways to protect against threats such as using firewalls, anti-virus software, and virtual private networks.

Uploaded by

Judy Oscillada
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

INTRODUCTION TO NETWORK SECURITY

By: Judy Oscillada

P rotection of data or fil es against


threats
Security Attacks


keep information confidentiality and integrity
provide availability to authorized users
P assive attack—attacker does
not modify data but snoops
and monitors information transit.
Security Threats Attacker performs traffic analysis to
obtain original content. Threat to
Passive confidentiality.
Confidentiality  Snooping

Integrity
 Traffic Analysis
Active
 Modification
 Masquerading
A ctive attack—attacker modifies
data. Threat to data integrity
and availability.
 Replaying
 Repudiation

Active Security Services


Availability

C
 Denial of Service
onfidentiality through (1) sym-
metric-key or (2) asymmetric-
key cryptography
Definition
Masquerade—attacker pretends to be another entity
Replaying—data units are captured and resent
I ntegrity through message digest,
digital signature

Repudiation—denial that message has been sent or


received
Denial of Service—denies authorized users of access
A uthentication through mes-
sage authentication code
(MAC) and hash function
effectively interrupts service

PROTECT AGAINST THREATS!

F irewall—barrier to separate trusted from untrusted networks using packet filter-


ing. Additional security when connecting to public networks

A nti-virus software—dedicated to detect, prevent, and remove malicious entity.


Famous software: Norton, AVG, Mcafee

V irtual Private Network (VPN)—secure data transmission over public network or


Internet using encryption

You might also like