Summary: Network Security
Network threats and defenses
· Most traffic on the Internet is unencrypted and
· This allows a range of attacks.
(But adding cryptography is not always a
· It also motivates a range of attack-detection
techniques and defenses.
· Attacker probes a network to learn
services running on hosts
· Probing is allowed by open, low-level network
protocols, e.g., pinging.