This document provides an overview of network security. It discusses security attacks like passive attacks (eavesdropping) and active attacks (modifying data). It outlines security services like confidentiality, authentication, integrity, non-repudiation, and access control. It also discusses methods of defense against attacks, including encryption, software/hardware controls, security policies, and physical controls. The document defines key security terms and concepts.