Network security aims to prevent unauthorized access and misuse of network infrastructure through authentication, firewalls, and encryption. It seeks to protect a network's confidentiality, integrity, and availability by mitigating vulnerabilities, threats like attacks, and risks. The goals are to ensure secrecy, prevent unauthorized modifications, maintain availability of information and services, and provide authenticity and non-repudiation between senders and receivers.
Network security aims to prevent unauthorized access and misuse of network infrastructure through authentication, firewalls, and encryption. It seeks to protect a network's confidentiality, integrity, and availability by mitigating vulnerabilities, threats like attacks, and risks. The goals are to ensure secrecy, prevent unauthorized modifications, maintain availability of information and services, and provide authenticity and non-repudiation between senders and receivers.
Network security aims to prevent unauthorized access and misuse of network infrastructure through authentication, firewalls, and encryption. It seeks to protect a network's confidentiality, integrity, and availability by mitigating vulnerabilities, threats like attacks, and risks. The goals are to ensure secrecy, prevent unauthorized modifications, maintain availability of information and services, and provide authenticity and non-repudiation between senders and receivers.
• Preventive process to mitigate un-desirable information flow as well as to protect the network infrastructure from un- authorized access, misuse, malfunctions, modifications and destructions. (Fails to function normally or not/wrong functioning)
• Network security starts from authenticating the user, once
authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users • Securing of Information & access control requires Cryptographic techniques as a weapon. Basic Terminologies • Vulnerability: A state of being exposed to the possibility of being attacked or harmed due to the defect or weakness in feasibility, design, implementation or operation of a system • Threat: anything that has the potential to cause serious security harms. It is based on vulnerability and it may happen or may not be happened. • Attack: An attempt to destroy the security of system • Attacker: Person who initiate attack • Attack Vector: the route or means adopted by attacker to approach target e.g. path , tools & techniques etc. • Defender: Person or process that prevent attack(s) • Risk: A dangerous situation that likely to be happened due any threat. Security Goals Network Security Goals • Confidentiality: concerns with secrecy and privacy which means message should only be “understandable” to sender and intended receiver. • Integrity: assures that message is free from fake modifications (false addition or deletion) • Origin Authenticity • Non-repudiation • Availability: means information (message, key, Certificate Verification) and medium (Certification Authority Server, online services) should be timely available on needed Network Security Goals (Cont…) • Authenticity: Sender and Receiver wants to confirm the identity of each other
• Non-repudiation: Sender and Receiver cannot deny that