Published online by Cambridge University Press: 09 January 2021
Learning Outcomes
After reading this chapter, the reader will be able to:
Understand the concepts of network security
List the basic terminologies and technologies associated with security, privacy, and authenticity
Explain functioning of digital signatures and key management
Differentiate between network layer, transport layer, and application layer security
Explain firewalls
Relate new concepts with concepts learned before to make a smooth transition to IoT
Introduction
The range of operations dependent on computers, computer networks, and the Internet is vast. Healthcare, banking, governance, security, military, research, power, agriculture, and other fields are nowadays largely dependent on networked systems. The huge implications of the failure of one of these domains due to computerbased security lapses are undeniable. This necessitates the need for various security protocols for computer networks and computer-based systems. Typically, security in networks focuses on preventing unauthorized or forced access to a user's or organization's system or systems. The concept of security applies even to computers or systems which are not connected to a network or the Internet. The main aspects of securing a system are security, privacy, and authenticity. The security operations in computers encapsulate protection of hardware, software, data, and identity.
The various forms of network attacks are classified into two broad categories: General cyber threats, and threats to web databases [1]. Attacks such as authentication violation, non-repudiation, Trojan horses, viruses, fraud, sabotage, denial of service, and even natural disasters are categorized as general cyber threats. In contrast, attacks such as access control violations, integrity violations, confidentiality violations, privacy violations, authenticity violations, and identity thefts are categorized as threats to web databases. Most of the commonly available security tools are antiviruses, anti-malware, anti-spyware, and firewalls. These are mostly software-based tools and used by individuals or for personal computing systems. However, costlier options such as hardware-based systems and hardware–software hybrid systems such as access control mechanisms, hardware firewalls, and proxy servers are the most opted for security measures for large organizations. These tools are designed to protect a user from a range of attacks.
Points to ponder
Zero day attacks are exploits (attacks) that make use of a previously unknown security vulnerability in a system (software or hardware) to gain access to the system or take over it. The term `zero day’ refers to the time duration of the discovery of the vulnerability and the launch of attack (the attack is launched on the day of the discovery of the vulnerability).
To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.