Network security
Pages
Network Protocol Attacks
Denial of Service (against availability) Make the service unavailable to legitimate users. Killer Packets Ping of Death Pathological ICMP echo request that exploit a memory error in the protocol…
Firewalls
Firewall: network access control system that verifies all the packets flowing through it. Its main functions are usually: IP packet filtering Network address translation (NAT) Must be the single…
Architectures for secure networks
Dual- or Multi-zone Architectures In most cases, the perimeter defense works on the assumption that what is “good” is inside, and what's outside should be kept outside if possible. There are two…
TLS and SET
Issues of Transactions Security : Problems of remoteness Trust factor between parties Use of sensitive data Atomicity of transaction Internet protocol problems Authentication Confidentiality…
Exercises on network security
2021-2022 DEMO Exam exercise 5 (6 points) Consider the above network diagram, describing a company’s network structure, composed of a subnetwork with employees computers and another with the…