{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:43:32Z","timestamp":1725497012674},"edition-number":"1","reference-count":17,"publisher":"Wiley","isbn-type":[{"type":"print","value":"9780471383932"},{"type":"electronic","value":"9780470050118"}],"license":[{"start":{"date-parts":[[2008,1,15]],"date-time":"2008-01-15T00:00:00Z","timestamp":1200355200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Communication is at the heart of computer systems. Information stored at one location is moved to another location, combined with data from other sources, and processed to meet the needs of the users. Rarely can user commands or the information they access avoid traversing networks, which leakes the data and systems vulnerable to a variety of attacks. A malicious intruder might intercept, falsify, damage, or altogether prevent the networked communications. Network security has become one of the more critical issues challenging businesses and our daily life.<\/jats:p><jats:p>In this chapter, we introduce the fundamentals of network security. The chapter comprises six sections. In the first section, we introduce basic security concepts such as CIA (confidentiality, integrity, and availability). In the second section, we discuss basic cryptography, such as secret key cryptography, public key cryptography, and hash functions. In the third section, we introduce basic security services such as key management and authentication. In the fourth section, we discuss a variety of attacks such as sniffing, spoofing, and DDoS (Distributed Denial of Service) to give a big picture of the cruel world of cyberspace. In the fifth section, we introduce some security systems and protocols such as Kerberos, IPSec, Firewall, and VPN to combat those attacks. Finally, we give a brief overview of wireless network security such as WEP and WPA.<\/jats:p>","DOI":"10.1002\/9780470050118.ecse268","type":"other","created":{"date-parts":[[2007,12,6]],"date-time":"2007-12-06T17:49:24Z","timestamp":1196963364000},"source":"Crossref","is-referenced-by-count":1,"title":["Network Security Fundamentals"],"prefix":"10.1002","author":[{"given":"Steven","family":"Graham","sequence":"first","affiliation":[]},{"given":"Xinwen","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Lu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2008,1,15]]},"reference":[{"key":"e_1_2_8_2_1_1","doi-asserted-by":"crossref","unstructured":"B.Kaliski The MD2 Message\u2010Digest Algorithm (Request for Comments: 1319) 1992. Available:http:\/\/www.ietf.org\/rfc\/rfc1319.txt.","DOI":"10.17487\/rfc1319"},{"key":"e_1_2_8_2_2_1","doi-asserted-by":"crossref","unstructured":"D.Eastlake 3 rd P.Jones US Secure Hash Algorithm 1 (SHA1) (Request for Comments: 3174) 2001. Available:http:\/\/www.ietf.org\/rfc\/rfc3174.txt.","DOI":"10.17487\/rfc3174"},{"key":"e_1_2_8_2_3_1","doi-asserted-by":"crossref","unstructured":"K.Zeilenga LDAP Authentication Password Schema (Request for Comments: 3112) 2001. Available:http:\/\/www.ietf.org\/rfc\/rfc3112.txt.","DOI":"10.17487\/rfc3112"},{"volume-title":"Designing Network Security, Second Edition","year":"2003","author":"Kaeo M.","key":"e_1_2_8_2_4_1"},{"key":"e_1_2_8_2_5_1","doi-asserted-by":"crossref","unstructured":"S.Kent R.Atkinson Secutiry Architecture for the Internet Protocol (Request for Comments: 2401) 1998. Available:http:\/\/www.ietf.org\/rfc\/rfc2401.txt.","DOI":"10.17487\/rfc2401"},{"key":"e_1_2_8_2_6_1","doi-asserted-by":"crossref","unstructured":"S.Kent R.Atkinson IP Authentication Header (Request for Comments: 2402) 1998. Available:http:\/\/www.ietf.org\/rfc\/rfc2402.txt.","DOI":"10.17487\/rfc2402"},{"key":"e_1_2_8_2_7_1","doi-asserted-by":"crossref","unstructured":"S.Kent R.Atkinson IP Encapsulating Security Payload (ESP) (Request for Comments: 2406) 1998. Available:http:\/\/www.ietf.org\/rfc\/rfc2406.txt.","DOI":"10.17487\/rfc2406"},{"key":"e_1_2_8_2_8_1","doi-asserted-by":"crossref","unstructured":"S.Savage D.Wetherall A.Karlin T.Anderson Practical network support for IP traceback inProceedings of the Conference on Applications Technologies Architectures and Protocols for Computer Communication Stockholm Sweden 2000 pp.295\u2013306.","DOI":"10.1145\/347057.347560"},{"key":"e_1_2_8_2_9_1","article-title":"A Hardware\u2010based memory acquisition procedure for digital investigations","volume":"1","author":"Carrier B. D.","year":"2004","journal-title":"Journal of Digital Investigations"},{"volume-title":"Network Security: Private Communication in a Public World","year":"2002","author":"Kaufman C.","key":"e_1_2_8_3_2_1"},{"volume-title":"Hack Proofing Your Network","year":"2002","author":"Russell R.","key":"e_1_2_8_3_3_1"},{"volume-title":"Snort 2.1 Intrusion Detection","year":"2004","author":"Beale J.","key":"e_1_2_8_3_4_1"},{"volume-title":"Incident Response and Computer Forensics","year":"2003","author":"Prosise C.","key":"e_1_2_8_3_5_1"},{"volume-title":"Exploiting Software: How to Break Code","year":"2004","author":"Hoglund G.","key":"e_1_2_8_3_6_1"},{"volume-title":"The Shellcoder's Handbook: Discovering and Exploiting Security Holes","year":"2004","author":"Koziol J.","key":"e_1_2_8_3_7_1"},{"key":"e_1_2_8_3_8_1","unstructured":"D. A.Wheeler Secure Programming for Linux and Unix HOWTO 2006 http:\/\/www.dwheeler.com\/secure\u2010programs\/Secure\u2010Programs\u2010HOWTO\/."},{"volume-title":"Computer Forensics: Incident Response Essentials","year":"2002","author":"Kruse W. G.","key":"e_1_2_8_3_9_1"}],"container-title":["Wiley Encyclopedia of Computer Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9780470050118.ecse268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T03:33:17Z","timestamp":1708399997000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/9780470050118.ecse268"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,15]]},"ISBN":["9780471383932","9780470050118"],"references-count":17,"alternative-id":["10.1002\/9780470050118.ecse268","10.1002\/9780470050118"],"URL":"https:\/\/doi.org\/10.1002\/9780470050118.ecse268","archive":["Portico"],"relation":{},"subject":[],"published":{"date-parts":[[2008,1,15]]}}}