Network security associates to the security when browsing the web, including protect sensitive information and maintain privacy. For a secure network connection, it is ideal that it provides confidentiality, integrity, and authentication which comply to the security triad. Cryptography is built via maths/algorithm, it is a process for hiding or coding information that only a person a message is intended for can read it.

Confidentiality - encryption

Protecting information from interception and ensuring information remains confidential if intercepted.

Modern encryption systems generally adhere to Kerckhoffs’s principle that a crypto system should remain secure even if everything about the system, except the secret key, is public knowledge, including the encryption algorithm.

Real-world application:

Integrity - hashing

Detecting whether information has been tampered with.

Real-world Application:

Authenticity

Verify a user or a device before allowing access to a system or resources

Real-life applications


Back to parent node: Computer Networks

Computer_networksNetwork_securityINFO1112INFO2222CSEC3616

Reference: