Ch01 Introduction
Ch01 Introduction
Network Security
Eighth Edition
by William Stallings
The general security objectives comprise the following: availability; integrity, which
may include data authenticity and nonrepudiation; and confidentiality
Security
Security attack Security service
mechanism
A processing or
A process (or a device communication Intended to counter
Any action that security attacks, and
incorporating such a service that enhances
compromises the they make use of one
process) that is the security of the
security of or more security
designed to detect, data processing
information owned mechanisms to
prevent, or recover systems and the
by an organization provide the service
from a security attack information transfers
of an organization
• Access Control
• Data confidentiality
• Data Integrity
• Nonrepudiation
• Availability
© 2020 Pearson Education, Inc.,
Hoboken, NJ. All rights reserved
Authentication
• Concerned with assuring that a communication is
authentic
• In the case of a single message, assures the recipient
that the message is from the source that it claims to be
from
• In the case of ongoing interaction, assures the two
entities are authentic (each is the entity that it claims to
be) and that the connection is not interfered with in such
a way that a third party can masquerade as one of the
two legitimate parties
The MAC is designed so that someone in possession of the secret key can
verify the integrity of the message. Thus, the MAC algorithm takes as input a
message and secret key and produces the MAC.
The recipient of the message plus the MAC can perform the same calculation
on the message; if the calculated MAC matches the MAC accompanying the
message, this provides assurance that the message has not been altered
• Key exchange
• The process of securely distributing a symmetric key to
two or more parties
• User authentication
• The process of authenticating that a user attempting to
access an application or service is genuine and, similarly,
that the application or service is genuine