1.6 Network Security
Overview of Network Security
Network security is a key focus of computer networking studies.
Important questions to consider:
Types of attacks bad actors can launch on networks.
Broad categories of defenses against these attacks.
Historical Context
Original Internet architecture lacked security as a design criterion.
Designed for a trusted group of users on a transparent network.
Current security measures are reactive due to this lack of built-in security.
Types of Attacks by Bad Actors
Packet Sniffing: Bad actors can intercept packets on shared media (e.g., wireless channels) using tools like Wireshark.
Packet Injection: Attackers can send fake packets to impersonate legitimate users (e.g., spoofing).
Denial of Service (DoS): Overloading network devices with requests, potentially leading to a DDoS attack using compromised hosts.
Defensive Strategies
Authentication: Verify user identity before granting network access (e.g., passwords, SIM card technology).
Encryption: Protect data integrity by encrypting packet contents to prevent unauthorized access.
Digital Signatures: Confirm sender identity and ensure data hasn't been tampered with.
Access Control: Define user actions based on identity (e.g., UMass campus wireless network authentication).
Firewalls: Hardware designed to detect and mitigate attacks; regulates traffic at the network's edge and core.
Conclusion
Understanding potential attacks and defenses is crucial in network security.
Future discussions in the course will delve deeper into security measures, particularly in relation to the network protocol stack.