Network Security

Network Security

Ramakrishna Thurimella, Leemon C. Baird
ISBN13: 9781615207831|ISBN10: 161520783X|EISBN13: 9781615207848
DOI: 10.4018/978-1-61520-783-1.ch001
Cite Chapter Cite Chapter

MLA

Thurimella, Ramakrishna, and Leemon C. Baird. "Network Security." Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, edited by Hamid R. Nemati and Li Yang, IGI Global, 2011, pp. 1-31. https://doi.org/10.4018/978-1-61520-783-1.ch001

APA

Thurimella, R. & Baird, L. C. (2011). Network Security. In H. Nemati & L. Yang (Eds.), Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering (pp. 1-31). IGI Global. https://doi.org/10.4018/978-1-61520-783-1.ch001

Chicago

Thurimella, Ramakrishna, and Leemon C. Baird. "Network Security." In Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, edited by Hamid R. Nemati and Li Yang, 1-31. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61520-783-1.ch001

Export Reference

Mendeley
Favorite

Abstract

Three pillars of security—confidentiality, integrity, and availability—are examined in the context of networks. Each is explained with known practical attacks and possible defenses against them, demonstrating that strong mathematical techniques are necessary but not sufficient to build practical systems that are secure. We illustrate how adversaries commonly side-step cryptographic protections. In addition, we contend that effective key management techniques, along with privacy concerns must be taken into account during the design of any secure online system. We conclude with a discussion of open problems for which fundamentally new methods are needed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.