Network Security Basics Flashcards
Protection of computer systems and networks from theft / damage to hardware / software or electronic data
Computer Security / Cybersecurity
Protection of networks and underlying infrastructure
Network Security
Assurance that network performs critical functions correctly
Network Security
Protection of network devices such as routers and switches, and end systems
Device Security
Hardware / software to limit access between network and device attached to network, according to policy
Firewall
Hardware / software to gather analyze info from various areas within computer or network
Intrusion detection
- Requires constant monitoring
- All potential attacks need to be considered
- Often an afterthought
Security Challenges
Eavesdropping on, or monitoring of, transmissions
Passive attack
Goal of opponent is to obtain information being transmitted
Passive attack
- Release of message contents
- Traffic analysis
Passive attack types
Modifying the data stream or creation of a false stream
Active attack
Difficult to prevent because of large attack surface
Active attack
Goal is to detect attacks and recover
Active attack
One entity pretending to be another entity
Masquerade
Passive capture of a data unit and subsequent retransmission to produce unauthorized effect
Replay
Parts of message are altered or delayed to produce unauthorized effect
Data modification
Prevent or inhibit normal use or management of communication facilities
Denial of service
Protection of transmitted data from passive attack
Data confidentiality
Protection of traffic flow from analysis
Data confidentiality
Applicable to stream of messages, single message, or selected fields in a message
Data integrity
Connection-oriented: no messages sent with duplication, insertion, etc.
Connection-less: protect again message modification alone
Data integrity
Protect a system to ensure availability
Availability service
Service addresses concerns raised by DoS
Availability service
Concerns with assuring a communication is authentic
Authentication
Single message: assure recipient that message from source is who it claims to be from
Ongoing interaction: assure two entities are authentic and connection has no masquerading
Authentication
Ability to limit and control access to host systems
Access control
Prevent sender or receiver from denying a transmitted message
Nonrepudiation