Chapter 2
Chapter 2
Chapter 2
Introduction
Securing Computer Network
Forms of protection
Authentication
Confidentiality and Integrity
COMPUTER NETWORK
SECURITY
FUNDAMENTALS
Chapter 2: Computer Network Security Fundamentals
CHAPTER – 2
1. INTRODUCTION
It seems that every other day there is a story in the newspapers about a computer network
being compromised by hackers. More recently, Yahoo, Amazon.com, eBay, and some other
popular World Wide Web (WWW) sites were targets of what appears to have been a
coordinated "denial-of-service" attack. During a three- or four-day period, the sites were
overwhelmed with massive bombardments of false traffic from multiple sites. As a result, the
sites were shut down for hours at a time. These attacks illustrate how pervasive the threat
from outside hackers has become.
At the same time, every organization that uses computers faces the threat of hacking from
individuals within the organization. Employees or former employees with malicious intent or
who want to obtain information such as employee salaries or view other employee's files are
also a threat to an organization's computers and networks.
Every organization should monitor its systems for possible unauthorized intrusion and other
attacks. This needs to be part of the daily routine of every organization's IT unit, as it is
essential to safeguarding a company's information assets.
Every year, Corporations, Governments, and other organizations spend billions of dollars on
expenditures related to network security. The rate at which these organizations are expending
funds seems to be increasing. However, when companies need to find areas in which they
can decrease spending, budget items such as security and business resumption planning
have historically been some of the first to be cut.
The meaning of the term securing computer network has evolved in recent years. Before the
problem of data security became widely publicized in the media, most people’s idea of
securing computer network focused on the physical machine. Traditionally, computer facilities
have been physically protected for three reasons:
• To prevent theft of or damage to the hardware
• To prevent theft of or damage to the information
• To prevent disruption of service
Securing Computer Network is security applied to computing devices such as computers and
smartphones, as well as computer networks such as private and public networks, including
the whole Internet. It includes physical security to prevent theft of equipment, and information
security to protect the data on that equipment. It is sometimes referred to as "cyber security"
or "IT security".
Generic Securities are:
Computer Security - generic name for the collection of tools designed to protect data and to
prevent hackers.
Network Security - measures to protect data during their transmission.
Internet Security - measures to protect data during their transmission over a collection
of interconnected networks.
3. FORMS OF PROTECTION
4. SECURITY SERVICES
There are four general categories of attacks, which are listed below:
Sender Receiver
Eavesdropper or Forger
Modification: An unauthorized party not only gains access to but tampers with an asset. This
is an attack on integrity.
For example,
i. Changing values in data file
ii. Altering a program
iii. Modifying the contents of messages being transmitted in a network.
Sender Receiver
Eavesdropper or Forger
Chapter 2: Computer Network Security Fundamentals
Fabrication: An unauthorized party inserts counterfeit objects into the system. This is an
attack on authenticity.
For example,
i. Insertion of unauthentic message in a network
ii. Addition of records to a file.
Sender Receiver
Eavesdropper or Forger
It is quite difficult to prevent active attacks absolutely, because to do so would require physical
protection of all communication facilities and paths at all times. Instead, the goal is to detect
them and to recover from any disruption or delays caused by them.
4.3 Symmetric and Public Key Algorithms
Encryption/Decryption methods fall into two categories.
i. Symmetric key
ii. Public key
In symmetric key algorithms, the encryption and decryption keys are known both to sender
and receiver. The encryption key is shared and the decryption key is easily calculated from
it. In many cases, the encryption and decryption keys are the same.
In public key cryptography, encryption key is made public, but it is computationally infeasible
to find the decryption key without the information known to the receiver.