Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Network Security (assorted topics)
 

Summary: Network Security
(assorted topics)
Network threats and defenses
2
· Most traffic on the Internet is unencrypted and
unauthenticated.
· This allows a range of attacks.
(But adding cryptography is not always a
satisfactory solution!)
· It also motivates a range of attack-detection
techniques and defenses.
Network mapping
3
· Attacker probes a network to learn
­ topology/architecture
­ host information
­ services running on hosts
­ vulnerabilities
· Probing is allowed by open, low-level network
protocols, e.g., pinging.

  

Source: Abadi, Martín - Department of Computer Science, University of California at Santa Cruz

 

Collections: Computer Technologies and Information Sciences