Skip to Main Content
Fundamentals of Data Communication Networks
book

Fundamentals of Data Communication Networks

by Oliver C. Ibe
November 2017
Beginner content levelBeginner
320 pages
8h 38m
English
Wiley
Content preview from Fundamentals of Data Communication Networks

Chapter 12Introduction to Network Security

12.1 Introduction

Security concerns are very important in IP networks because such networks are inherently nonsecure. In this lecture, we first examine the types of attacks that can be launched on IP networks. We then examine the security mechanisms used in IP networks. Finally, we discuss the IP security (IPSec) protocol.

12.2 Types of Network Attacks

A network attack is an intrusion on a network infrastructure. The attacker first analyzes the environment and collects information in order to exploit the existing open ports or vulnerabilities. In some cases, the purpose of attack is only to learn and get some information from the system without altering or disabling it; this is referred to as a passive attack. In other cases called active attacks, the attacker accesses network resources to alter, disable, or destroy them. An attack can be performed either from outside of the organization by an unauthorized entity or from within the company by an “insider” that already has some access to the network.

There are different types of attacks that can be launched in a network. The following are some of the common ones:

  1. a. Network sniffing (packet sniffing) is a process of capturing the data packets traveling in the network. It is used by IT professionals to analyze and monitor the traffic to find such things as unexpected suspicious traffic. It is also used by attackers to collect data sent in clear text that is easily readable. In this ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Zero Trust Networks, 2nd Edition

Zero Trust Networks, 2nd Edition

Razi Rais, Christina Morillo, Evan Gilman, Doug Barth
CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, 2nd Edition

CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, 2nd Edition

Brad Edgeworth, Ramiro Garza Rios, David Hucaby, Jason Gooley

Publisher Resources

ISBN: 9781119436256Purchase book