Network Security and Cryptography
Network Security and Cryptography
Definition:
Importance:
Prevents data breaches
Ensures privacy and confidentiality
Maintains integrity of communication
2.1 Current State of Affairs
■ Networks Are Targets
Example:
🔸
Types of Attack Vectors:
🔸
Internet-based (DDoS attacks, phishing)
Internal threats (disgruntled employees, weak
🔸
passwords)
Exploited vulnerabilities (unpatched software, zero-
day attacks)
2.4 Current State of Affairs
■ Data Loss
• Email & Social Media – IMs and emails can be intercepted, exposing
confidential data.
• Unencrypted Devices – Stolen laptops with unencrypted data pose a
security risk.
• Cloud Storage – Weak security settings can lead to unauthorized access
and data loss.
• Removable Media – USB drives can be lost or misused for unauthorized
data transfer.
• Hard Copy – Improper disposal of sensitive documents can lead to data
leaks.
• Access Control – Weak or stolen passwords allow unauthorized access
to critical data.
3. Common Threats in Network Security
Comparison Table:
Add
https://link.springer.com/article/10.1007/s11205-018-1837-z