Transmission security (Schneier, Bruce, 2000). is the ability to send data from one computer system to another computer system so that only the intended recipient gets the data. In addition, the data received has to be identical to the data sent. Transmission security gets implemented through secure networks. Any attempt by the intruder to intercept the data stream (Bishop, Matt, 2003) over a fiber through tapping can be more easily detected than a tap into the copper wire. This is because the tap in to fiber damages the network and alters the topology that can be easily detected. The intrusion of data over a physical medium is shown in figure 1. On the other hand, detection of an intrusion that takes place over the air would be nearly impossible.
Intrusion of data over physical medium
The security components involved in the transfer of data consists of (Gollmann, Dieter, 1999):
Authentication: The authentication is required to prove the identity of the client and the server.
Authorization: Based on the identity of the client, authorization will be provided to access the data and the applications.
Encryption: After the authorization is provided, data transfer happens in encrypted form.