Computer Network Unit 4 Module 1 2
Computer Network Unit 4 Module 1 2
UNIT 4
Module 1
# Network security: Introduction to network
security principles
Network security is essential for safeguarding the
integrity, availability, and confidentiality of data transmitted
across computer networks.
1. Confidentiality
Purpose: Ensures that sensitive information is only
accessible to authorized users and systems.
Techniques: Encryption (e.g., AES, RSA), access control,
and authentication mechanisms to restrict access.
2. Integrity
Purpose: Protects data from being altered or tampered
with during transmission or storage.
Techniques: Hash functions (e.g., SHA-256) and digital
signatures can help verify that data has not been modified.
3. Availability
Purpose: Ensures that network resources and services are
available to users when needed, protecting against
disruptions like Distributed Denial of Service (DDoS)
attacks.
Techniques: Redundancy, load balancing, backup
solutions, and DDoS mitigation strategies.
4. Authentication
Purpose: Verifies the identity of users, devices, and
systems accessing the network.
Techniques: Passwords, two-factor authentication (2FA),
biometrics, certificates, and public-key infrastructure
(PKI) are commonly used.
5. Authorization
Purpose: Controls access rights by ensuring that
authenticated users can only access resources for which
they have permissions.
Techniques: Access control lists (ACLs), role-based
access control (RBAC), and security policies define and
enforce permissions.
6. Non-repudiation
Purpose: Ensures that parties in a communication cannot
deny their actions or participation.
Techniques: Digital signatures, logging, and audit trails
help to verify and log the actions performed by users.
7. Risk Management
Purpose: Identifies, assesses, and mitigates potential
security risks to the network.
Techniques: Regular vulnerability assessments,
penetration testing, and security audits.
8. Security Policies and Compliance
Purpose: Sets guidelines and standards to ensure network
security aligns with industry and legal requirements.
Techniques: Security frameworks (e.g., NIST, ISO/IEC
27001), and compliance with regulations like GDPR,
HIPAA, or CCPA.
client identity)
o Data integrity through message integrity checks
modes
Comparison and Considerations
Layer of Operation: SSL/TLS operates at the application
layer, while IPsec works at the network layer, meaning
TLS secures data once it’s sent from the application, and
IPsec secures it at the IP packet level.
Performance: IPsec tends to require more processing
power due to the encryption of every IP packet, while TLS
is often more efficient for end-to-end encrypted sessions.
attributes
o Flexibility to define allow/deny rules
5. Network Segmentation
Purpose: Divides a network into smaller subnetworks to
control traffic flow and reduce the potential spread of
security incidents.
How it Works: By creating isolated network segments,
access to sensitive resources can be limited, and
unauthorized movement within the network can be
prevented.
Use Cases: Widely used in large networks, especially for
isolating guest, production, and administrative networks.
Key Features:
o Limits access to specific network segments
and no encryption.
o SNMPv2: Introduced performance improvements