Network security associates to the security when browsing the web, including protect sensitive information and maintain privacy. For a secure network connection, it is ideal that it provides confidentiality, integrity, and authentication which comply to the security triad. Cryptography is built via maths/algorithm, it is a process for hiding or coding information that only a person a message is intended for can read it.
Confidentiality - encryption
Protecting information from interception and ensuring information remains confidential if intercepted.
Modern encryption systems generally adhere to Kerckhoffs’s principle that a crypto system should remain secure even if everything about the system, except the secret key, is public knowledge, including the encryption algorithm.
Real-world application:
Integrity - hashing
Detecting whether information has been tampered with.
Real-world Application:
Authenticity
Verify a user or a device before allowing access to a system or resources
Authentication and key distribution
Identify a party we are communicating with
Real-life applications
- Transport Layer Security (TLS)
- Network Attacks and Preventions
- HTTP Secure (HTTPS)
- Secure Shell (SSH)
- HMAC Key Derivation Function (HKDF)
Back to parent node: Cyber Security and Security Engineering
Computer_networks Network_security INFO1112 INFO2222 CSEC3616
Reference: