Network Security

  • David Salomon
Part of the Undergraduate Topics in Computer Science book series (UTICS)


A network vulnerability is an inherent weakness in the design, implementation, or use of a hardware component or a software routine. A vulnerability invites attacks and makes the network susceptible to threats.

A threat is anything that can disrupt the operation of the network. A threat can even be accidental or an act of nature, but threats are mostly intentional. A threat can damage the network, slow it down, or make it unavailable. Any type of rogue software represents a threat. An attack is a specific approach employed to exploit a known vulnerability. A passive attack is designed to monitor and record network activity in an attempt to collect information to be used later in an active attack. Examples of passive attacks are packet sniffing (page 226) and traffic analysis. Passive attacks are difficult to detect.


Data Packet Network Security Internet Service Provider Email Message Portable Document Format 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

  1. dslreports (2004) is
  2. IANA port (2004) is Scholar
  3. Information Week (2004) is Scholar
  4. insecure (2004) is
  5. Knowspam (2004) is
  6. Mailblocks (2004) is
  7. MailFrontier (2004) is
  8. RFC-862 (2004) is at
  9. RSAsecurity (2004) is
  10. send-safe (2005) is
  11. SpamArrest (2004) is
  12. spamcop (2005) is
  13. Spamhaus (2005) is
  14. takedown (2004) is

Copyright information

© Springer London 2010

Authors and Affiliations

  1. 1.Computer Science Dept.California State University, NorthridgeNorthridgeUSA

Personalised recommendations