11. Network security Flashcards
Why do we need network security?
Attacks: Routing, Naming
Internet is by design insecure/secure?
insecure
Any host is on by default for other hosts to connect
True
Packet switched networks are vulnerable to ______ attacks
resource exhaustion
Components of security
Availability
Confidentiality
Authenticity
Integrity
availability
ability to use resource
Confidentiality
concealing information (Bank account)
Authenticity
assures origin of information
Integrity
prevents unauthorized changes
Security Threat definition
Anything that is a potential violation of the components of security
Security Attack definition
action that results in a violation of the components of security
Attack on confidentiality
Eavesdropping - listening to people
Negative impacts of attacks
theft of confidential info
unauthorized use
false info
disruption of service
Control plane authentication
Session: point-to-point b/w routes
Path: protects AS paths
Origin: ensures that AS advertising prefix is the owner
Route Attacks: How?
configuration error (accident)
router compromised by attacker
unscrupulous isp