INTRODUCTION TO NETWORK SECURITY
By: Judy Oscillada
P rotection of data or fil es against
threats
Security Attacks
keep information confidentiality and integrity
provide availability to authorized users
P assive attack—attacker does
not modify data but snoops
and monitors information transit.
Security Threats Attacker performs traffic analysis to
obtain original content. Threat to
Passive confidentiality.
Confidentiality Snooping
Integrity
Traffic Analysis
Active
Modification
Masquerading
A ctive attack—attacker modifies
data. Threat to data integrity
and availability.
Replaying
Repudiation
Active Security Services
Availability
C
Denial of Service
onfidentiality through (1) sym-
metric-key or (2) asymmetric-
key cryptography
Definition
Masquerade—attacker pretends to be another entity
Replaying—data units are captured and resent
I ntegrity through message digest,
digital signature
Repudiation—denial that message has been sent or
received
Denial of Service—denies authorized users of access
A uthentication through mes-
sage authentication code
(MAC) and hash function
effectively interrupts service
PROTECT AGAINST THREATS!
F irewall—barrier to separate trusted from untrusted networks using packet filter-
ing. Additional security when connecting to public networks
A nti-virus software—dedicated to detect, prevent, and remove malicious entity.
Famous software: Norton, AVG, Mcafee
V irtual Private Network (VPN)—secure data transmission over public network or
Internet using encryption