Network Security
Network Security
Network Security
Security Goals
• Confidentiality
• Integrity
• Availability
Snooping
▪The sender of the message might later deny that she has sent the
message; the receiver of the message might later deny that he has
received the message.
▪An example of denial by the receiver could occur when a person buys a
product from a manufacturer and pays for it electronically, but the
manufacturer later denies having received the payment and asks to be
paid.
Denial of Service
▪The attacker can use several strategies to achieve this. She might
send so many bogus requests to a server that the server crashes
because of the heavy load.
▪The attacker may also intercept requests from the clients, causing
the clients to send requests many times and overload the system.
Cryptography
▪Some security services can be implemented using
cryptography. Cryptography, a word with Greek origins,
means “secret writing.”
A-Z
B-Y BAD – YZW-------- YZW – BAD in, is, of,
the, what
C-X
D-W
Transposition Cipher
Asymmetric-key ciphers are sometimes called
public-key ciphers.