Computer Networks - Chapter 8
Computer Networks - Chapter 8
Key Concepts:
Important Questions:
1. Q: What are the primary goals of network security? A: The primary goals are
confidentiality, integrity, availability, authentication, authorization, and non-repudiation.
2. Q: How do authentication and authorization differ? A: Authentication verifies the
identity of a user or device, while authorization determines the permissions and access
rights granted to the authenticated user.
Key Concepts:
Important Questions:
Key Concepts:
• Firewalls: Devices or software that monitor and control incoming and outgoing network
traffic based on predetermined security rules.
o Packet-Filtering Firewalls: Inspect each packet and block or allow it based on
source and destination IP addresses, ports, or protocols.
o Stateful Inspection Firewalls: Track the state of active connections and make
decisions based on the context of the traffic.
• Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS): Monitor
network or system activities for malicious activities or policy violations.
o IDS: Detect and alert on suspicious activity but do not take action to prevent it.
o IPS: Detect and automatically take action to block or mitigate the suspicious
activity.
• Virtual Private Networks (VPNs): Create secure, encrypted connections over public
networks, protecting data transmission and providing remote access.
• Access Control Lists (ACLs): Rules that define which users or systems can access
resources and what operations they can perform.
Important Questions:
1. Q: What is the difference between an IDS and an IPS? A: An IDS detects and alerts on
suspicious activities but does not take action to prevent them. An IPS, on the other hand,
detects and actively blocks or mitigates the threats.
2. Q: How do firewalls enhance network security? A: Firewalls enhance security by
filtering traffic based on rules that define allowed and blocked traffic, helping to prevent
unauthorized access and protect the network from attacks.
Key Concepts:
• Secure Sockets Layer (SSL) and Transport Layer Security (TLS): Protocols that
provide secure communication over a network, using encryption and authentication to
protect data.
• Secure Email Protocols:
o S/MIME: Secure/Multipurpose Internet Mail Extensions, provides encryption and
digital signatures for email.
o PGP (Pretty Good Privacy): Encrypts and signs emails, ensuring confidentiality
and authenticity.
• Secure File Transfer Protocols:
o SFTP: Secure File Transfer Protocol, uses SSH for secure file transfers.
o FTPS: FTP Secure, uses SSL/TLS for secure file transfers.
• Secure Web Communications: HTTPS (HTTP over SSL/TLS) secures web browsing
by encrypting the communication between the client and server.
Important Questions:
1. Q: How does HTTPS ensure secure web communications? A: HTTPS encrypts the
communication between the client and server using SSL/TLS, protecting the data from
eavesdropping and tampering, and ensuring the authenticity of the server.
2. Q: What are the differences between SFTP and FTPS? A: SFTP uses SSH to provide a
secure file transfer, encrypting both the data and the command channels. FTPS uses
SSL/TLS to secure FTP, encrypting data and command channels separately.
Key Concepts:
• WEP (Wired Equivalent Privacy): An early, now considered insecure, protocol for
securing wireless networks.
• WPA/WPA2 (Wi-Fi Protected Access): Security protocols that improve upon WEP,
using stronger encryption (e.g., TKIP and AES) and authentication methods.
• 802.1X Authentication: A network access control protocol that provides an
authentication mechanism for devices trying to connect to a LAN or WLAN.
• Rogue Access Points: Unauthorized wireless access points that can be used to intercept
or tamper with network traffic.
Important Questions:
1. Q: Why is WEP considered insecure for wireless network security? A: WEP has several
vulnerabilities, such as weak encryption keys and predictable key streams, making it
susceptible to various attacks that can easily compromise the network.
2. Q: What enhancements do WPA2 provide over WEP for securing wireless networks? A:
WPA2 uses stronger encryption algorithms (e.g., AES), provides more robust
authentication through 802.1X, and includes mechanisms to ensure the integrity of the
network traffic.
Key Concepts:
Important Questions:
1. Q: How does IPsec in tunnel mode differ from transport mode? A: Tunnel mode encrypts
the entire IP packet, including the header, encapsulating it within a new packet. Transport
mode encrypts only the payload, leaving the original header intact, suitable for end-to-
end communication.
2. Q: What is the role of Kerberos in network security? A: Kerberos provides secure
authentication by using secret-key cryptography, issuing tickets that prove the identity of
users and services, preventing eavesdropping and replay attacks.
Key Concepts:
Important Questions:
Key Concepts:
• Security Policies: Documents that define the rules, guidelines, and procedures for
maintaining security in an organization.
• Incident Response: Processes and actions taken to manage and mitigate the effects of a
security breach or attack.
• Security Audits: Systematic evaluations of an organization’s security posture,
identifying vulnerabilities and ensuring compliance with policies.
• User Education and Training: Programs to educate users on security best practices and
how to recognize and avoid security threats.
Important Questions:
Key Concepts