Abstract
A network vulnerability is an inherent weakness in the design, implementation, or use of a hardware component or a software routine. A vulnerability invites attacks and makes the network susceptible to threats.
A threat is anything that can disrupt the operation of the network. A threat can even be accidental or an act of nature, but threats are mostly intentional. A threat can damage the network, slow it down, or make it unavailable. Any type of rogue software represents a threat. An attack is a specific approach employed to exploit a known vulnerability. A passive attack is designed to monitor and record network activity in an attempt to collect information to be used later in an active attack. Examples of passive attacks are packet sniffing (page 226) and traffic analysis. Passive attacks are difficult to detect.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
apsa (2009) is http://www.adobe.com/support/security/advisories apsa09-01.html.
dslreports (2004) is http://www.dslreports.com/scan.
IANA port (2004) is iana.org/assignments/port-numbers.
Information Week (2004) is informationweek.com/story/showArticle.jhtml?articleID=52601698.
insecure (2004) is http://nmap.org/.
Knowspam (2004) is http://www.Knowspam.net/.
Mailblocks (2004) is http://www.mailwasher.net/.
MailFrontier (2004) is http://www.exclaimer.com.
Network solutions (2004) is http://www.networksolutions.com/en_US/whois/index.jhtml.
ping (2004) is http://ftp.arl.mil/˜mike/ping.html.
RFC-862 (2004) is at www.faqs.org/rfcs/rfc862.html.
RSAsecurity (2004) is http://www.rsa.com/.
send-safe (2005) is http://www.send-safe.com.
spam (2004) is http://www.spam.com/about/history/default.aspx.
spam abuse (2004) is http://spam.abuse.net/others/sites.shtml.
SpamArrest (2004) is http://www.SpamArrest.com.
spamcop (2005) is http://www.spamcop.com/.
Spamhaus (2005) is http://www.spamhaus.org/.
spamhauslasso (2005) is http://readerszone.com/security/top-10-spam-friendly-isps.html.
takedown (2004) is http://www.takedown.com/.
Vupen (2009) is http://www.vupen.com/english/advisories/2009/2891.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer London
About this chapter
Cite this chapter
Salomon, D. (2010). Network Security. In: Elements of Computer Security. Undergraduate Topics in Computer Science. Springer, London. https://doi.org/10.1007/978-0-85729-006-9_7
Download citation
DOI: https://doi.org/10.1007/978-0-85729-006-9_7
Published:
Publisher Name: Springer, London
Print ISBN: 978-0-85729-005-2
Online ISBN: 978-0-85729-006-9
eBook Packages: Computer ScienceComputer Science (R0)