0% found this document useful (0 votes)
21 views4 pages

Network and Security Concepts

The document outlines key concepts in Network and Security, focusing on Information Assurance, Cryptography, DNS, and Firewalls. It details the five pillars of Information Assurance, types of encryption, the functioning of DNS, and various types of firewalls. Each section emphasizes the importance of security measures in protecting data and maintaining network integrity.

Uploaded by

Aravindan .s.m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views4 pages

Network and Security Concepts

The document outlines key concepts in Network and Security, focusing on Information Assurance, Cryptography, DNS, and Firewalls. It details the five pillars of Information Assurance, types of encryption, the functioning of DNS, and various types of firewalls. Each section emphasizes the importance of security measures in protecting data and maintaining network integrity.

Uploaded by

Aravindan .s.m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Network and Security Concepts

1. Information Assurance Fundamentals

Information Assurance (IA) involves protecting and securing digital and non-digital information by ensuring

the confidentiality, integrity, availability, authentication, and non-repudiation of data.

Five Pillars of Information Assurance:

1. Confidentiality - Ensures only authorized users can access data.

2. Integrity - Data remains accurate and unaltered.

3. Availability - Systems and data are accessible when needed.

4. Authentication - Verifies the identity of users and systems.

5. Non-repudiation - Prevents denial of actions, usually through logging or digital signatures.

IA is implemented using policies, risk management, security tools, and training.

2. Basic Cryptography

Cryptography is the science of securing information by converting it into an unreadable format, only reversible

with a key or password.

Main Concepts:

- Plaintext: Original, readable data.

- Ciphertext: Encrypted, unreadable data.

- Encryption: Process of converting plaintext to ciphertext.

- Decryption: Converting ciphertext back to plaintext.

- Key: A string of characters used to encrypt/decrypt data.

Types:

- Symmetric encryption (same key for both encryption and decryption).

- Asymmetric encryption (public/private key pairs).

Cryptography ensures confidentiality, integrity, and authentication in data transmission and storage.
Network and Security Concepts

3. Symmetric Encryption

Symmetric encryption uses the same secret key for both encryption and decryption.

Features:

- Fast and efficient

- Requires secure method to share the secret key

Examples:

- AES (Advanced Encryption Standard)

- DES (Data Encryption Standard)

- 3DES

Use case: Encrypting large amounts of data quickly (e.g., database encryption).

4. Public Key Encryption (Asymmetric Encryption)

Public key encryption uses two keys:

- Public key (shared with everyone)

- Private key (kept secret)

How it works:

- Encryption: Sender encrypts the message using the receiver's public key.

- Decryption: Receiver uses their private key to decrypt it.

Also used for digital signatures to verify authenticity.

Examples:

- RSA

- ECC (Elliptic Curve Cryptography)

Use case: Secure email, SSL/TLS, digital certificates.


Network and Security Concepts

5. The Domain Name System (DNS)

DNS (Domain Name System) translates human-readable domain names (like www.example.com) into IP

addresses (like 93.184.216.34) that computers use to identify each other on the network.

How DNS Works:

1. You type a domain in the browser.

2. Request goes to a DNS resolver.

3. Resolver queries root, TLD, and authoritative name servers.

4. Returns IP address to your browser.

Common DNS Records:

- A Record: Maps domain to IPv4 address

- AAAA Record: Maps domain to IPv6

- MX Record: Email server

- CNAME: Alias of another domain

DNS attacks like spoofing and cache poisoning can misdirect users to malicious sites.

6. Firewalls

A firewall is a network security device or software that monitors and controls incoming and outgoing network

traffic based on security rules.

Types of Firewalls:

1. Packet Filtering Firewall - Filters packets based on IP address, port, protocol.

2. Stateful Inspection Firewall - Tracks active connections.

3. Proxy Firewall - Acts as an intermediary between users and services.

4. Next-Gen Firewalls (NGFW) - Includes deep packet inspection, intrusion detection/prevention (IDS/IPS),

and app awareness.

Functions:

- Prevent unauthorized access


Network and Security Concepts

- Block malicious traffic

- Enforce network policies

Use case: Protect internal networks from external threats and restrict unauthorized web traffic.

You might also like