tailieunhanh - NETWORK SECURITY BY CHRISTOS DOULIGERIS AND PANAYIOTIS KOTZANIKOLAOU

Document external code dependencies and include these in the packaging if possible. Correct behaviour of software usually depends on the build environment and a large number of external components. Wherever possible the development and packaging should actively prevent an insecure deployment by dependency management. However, it should be noted that overly strict and detailed dependency specification may lead to restrictions in upgradeability. For instance, it should not be required that the version number of a shared library is exactly equal to the version with a critical security bug fix, but rather, equal or greater. . | TELECOMMUNICATION SYSTEMS AND TECHNOLOGIES - Vol. II - Network Security - Christos Douligeris and Panayiotis Kotzanikolaou NETWORK SECURITY Christos Douligeris and Panayiotis Kotzanikolaou Department of Informatics University of Piraeus Greece Keywords Security Confidentiality Integrity Availability Threats Attacks Security Service Security Mechanism IPSec Firewall IDS VPN cryptography Contents 1. Introduction . Security in Information Technology . Computer Networks . Telecommunication Networks . The Goals of Network Security 2. Network Security Threats and Attacks 3. Security Services and Security Mechanisms . Security Services . Security Mechanisms 4. Security Issues in Wireless Networks 5. Conclusion Glossary Bibliography Biographical Sketches Summary The wide deployment of several networks such as the Internet 3G networks enterprise networks WiFi networks and Bluetooth networks to name just a few has made networking a common task. However the social economical commercial and ethical aspects of the various network applications have raised several security considerations deriving from network usage. This article is concerned with network security issues. First the concepts related with information security and networks are presented and the goals of network security are analyzed. The concepts of threats vulnerabilities and risks are briefly explained and some basic categories of network security threats and attacks are described. Security in networks is accomplished through security services. These services are described along with several widely used network security mechanisms which are commonly used to implement the security services. Finally the differences in the security requirements of wireless networks in contrast with fixed networks are briefly explained in the last section of this article. 1. Introduction This chapter discusses network security. Computer networks are analyzed and discussed in the previous related chapters. Based on the