Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
College of Informatics
Department of Computer Science
Computer Security (CoSc4035)
Chapter Four: Network Security
University of Gondar
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security
Objectives
By the end of this lesson, you will be able to:
• Explain fundamental concepts of network security
• Identify and analyze common network threats Compare and evaluate
security mechanisms at the application, transport, network, link, and
physical layers
• Demonstrate the use of network security protocols (e.g., TLS, IPsec,
HTTPS, secure email protocols)
• Identify WEP, WEP+, and WEP2 wireless network security
mechanisms
1
2
3
4
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Basics
Threat on Networks
Network Security Protocols
Wireless Security
Contents
1
2
3
4
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Basics
1
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Basics Cont’d
1
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Threats on Network
2
 It’s any attempt by an individual or organization to
use computers or digital systems to steal, alter, expose,
disable, or destroy information, or to breach computer
systems, networks, or infrastructures
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Threats on Network Cont’d
2
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Threats on Network Cont’d
2
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Threats on Network Cont’d
2
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Threats on Network Cont’d
2
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Threats on Network Cont’d
2
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Threats on Network Cont’d
2
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Protocols
3
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Protocols Cont’d
3
• How does ARP work?
– A computer that wants to access another computer for which it
knows its IP address broadcasts this address
– The owner responds by sending its Ethernet (MAC) address
Link Layer: ARP Spoofing
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Protocols Cont’d
3
• ARP Spoofing (also called ARP cache poisoning or ARP poison
routing) is a link layer attack
• It is a technique by which an attacker sends (spoofed) Address
Resolution Protocol (ARP) messages onto a local area network
• The aim is to associate the attacker's MAC address with the IP
address of another host, such as the default gateway, causing any
traffic meant for that IP address to be sent to the attacker
instead
• ARP spoofing may allow an attacker to intercept data frames on
a network, modify the traffic, or stop all traffic
• Often the attack is used as an opening for other attacks, such as
denial of service, man in the middle, or session hijacking attacks
Link Layer: ARP Spoofing
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Protocols Cont’d
3
• How does it happen?
– Because ARP is a stateless protocol
– Hosts will automatically cache any ARP replies they
receive, regardless of whether they requested them. Even
ARP entries which have not yet expired will be
overwritten when a new ARP reply packet is received
– There is no method in the ARP protocol by which a host
can authenticate the peer from which the packet
originated
– This behavior is the vulnerability which allows ARP
spoofing to occur
Link Layer: ARP Spoofing
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Protocols Cont’d
3
Network Layer Security: IPSec
 Internet Protocol Security (IPsec) provides for various
security services on the IP layer, in IPv4 as well as IPv6,
thus offering protection for protocols in the upper layers
 IPsec is typically used to secure communications between
hosts and security gateways
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
 The set of security services that IPsec provides includes
 access control
 data integrity protection
 data origin authentication
 anti-replay protection
 confidentiality
 limited traffic flow confidentiality
Network Security Protocols Cont’d
3
Network Layer Security: IPSec
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Protocols Cont’d
3
• Origin authentication (assures that a received packet was, in fact,
transmitted by the party identified as the source in the packet header and
the packet has not been altered in transit); IP-level authentication is
provided by inserting an Authentication Header (AH) into the packets
– AH also provides message integrity and anti-replay services
• Confidentiality (encrypts messages to prevent eavesdropping by third
parties); IP-level confidentiality is provided by inserting an Encapsulated
Security Payload (ESP) header into the packets.
• An ESP header can also do the job of the AH header in addition to
confidentiality
• Key management (concerned with the secure exchange of keys); Before
ESP can be used, it is necessary for the two ends of a communication link
to exchange the secret key that will be used for encryption.
• Similarly, AH needs an authentication key; Keys are exchanged with a
protocol called Internet Key Exchange (IKE)
• Note: the use of encryption always means the need for key management
Network Layer Security: IPSec
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
 TLS provides transport layer security for Internet
applications
 It provides for confidentiality and data integrity over a
connection between two end points
 TLS operates on a reliable transport, such as TCP, and is
itself layered into
 TLS Record Protocol
 TLS Handshake Protocol
Network Security Protocols Cont’d
3
Transport Layer Security (TLS)
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
 Advantage of TLS
 applications can use it transparently to securely
communicate with each other
 TLS is visible to applications, making them aware of
the cipher suites and authentication certificates
negotiated during the set-up phases of a TLS session
Network Security Protocols Cont’d
3
Transport Layer Security (TLS)
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
 TLS Record Protocol layers on top of a reliable
connection-oriented transport, such as TCP
 TLS Record Protocol
 provides data confidentiality using symmetric key
cryptography
 provides data integrity using a keyed message
authentication checksum (MAC)
 The keys are generated uniquely for each session based
on the security parameters agreed during the TLS
handshake
Network Security Protocols Cont’d
3
Transport Layer Security (TLS)
TLS Record Protocol
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
 Basic operation of the TLS Record Protocol
1. read messages for transmit
2. fragment messages into manageable chunks of data
3. compress the data, if compression is required and
enabled
4. calculate a MAC
5. encrypt the data
6. transmit the resulting data to the peer
Network Security Protocols Cont’d
3
Transport Layer Security (TLS)
TLS Record Protocol
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
 At the opposite end of the TLS connection, the basic
operation of the sender is replicated, but in the reverse
order
1. read received data from the peer
2. decrypt the data
3. verify the MAC
4. decompress the data, if compression is required and
enabled
5. reassemble the message fragments
6. deliver the message to upper protocol layers
Network Security Protocols Cont’d
3
Transport Layer Security (TLS)
TLS Record Protocol
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
 TLS Handshake Protocol is layered on top of the TLS
Record Protocol
 TLS Handshake Protocol is used to
 authenticate the client and the server
 exchange cryptographic keys
 negotiate the used encryption and data integrity
algorithms before the applications start to
communicate with each other
Network Security Protocols Cont’d
3
Transport Layer Security (TLS)
TLS Handshake Protocol
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Protocols Cont’d
3
DNS Spoofing
• If the attacker has access to a name server it can modify it so that it gives
false information
e.g., redirecting www.ebay.com to map to own (attacker’s) IP address
• ƒ
The cache of a DNS name server can be poisoned with false information
using some simple techniques
Web Browsers as Threats
• ƒ
We obtain most of our browsers on-line
• ƒ
Potential problems that can come from malicious code within the browser
– ƒ
Inform the attacker of the activities of the user
– Inform the attacker of passwords typed in by the user
– ƒ
Downgrade browser security (e.g., reduce key length used in SSL)
Application Layer Security
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Protocols Cont’d
3
• E-mails transit through various servers before reaching
their destinations
• ƒ
By default, they are visible by anybody who has access
to the servers
• ƒ
SMTP protocol has security holes and operational
limitations
• ƒ
E-mail security can be improved using tools and
protocols like PGP and S/MIME
– ƒ
PGP: Pretty Good Privacy
– ƒ
S/MIME: Secure Multi-Purpose Internet Mail Extension
E-mail Security
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Protocols Cont’d
3
PGP
• ƒ
Philip R. Zimmerman is the creator of PGP
• ƒ
PGP is an open-source, freely available software package for e-mail security
• ƒ
There are several software implementations available as freeware for most
desktop operating systems
• PGP provides confidentiality and authentication services that can be used for
e-mail and file storage applications
• It provides authentication through the use of digital signature, confidentiality
through the use of symmetric encryption, compression using the ZIP
algorithm, and e-mail compatibility using the radix-64 (Base 64) encoding
scheme
• PGP incorporates tools for developing a public-key trust model and public-
key certificate management
E-mail Security
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Protocols Cont’d
3
S/MIME Functions
• S/MIME is a protocol used for encrypting or decrypting digitally signed E-
mails
• This means that users can digitally sign their emails as the owner(sender) of
the e-mail
• Emails could only be sent in NVT 7-bit format in the past, due to which
images, videos, or audio were not a part of e-mail attachments.
• Bell Communications launched the MIME standard protocol in 1991 to
increase the email's restricted functionality.
• S/MIME is an upgrade of MIME (Multipurpose Internet Mail Extensions).
Due to the limitations of MIME, S/MIME came into play.
• S/MIME is based on asymmetric cryptography which means that
communications can be encrypted or decrypted using a pair of related keys
namely public and private keys
E-mail Security
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Protocols Cont’d
3
• Advantages of S/MIME
o It offers verification.
o It offers integrity to the message.
o By the use of digital signatures, it facilitates non-repudiation of origin.
o It offers seclusion.
o Data security is ensured by the utilization of encryption.
o Transfer of data files like images, audio, videos, documents, etc. in a
secure manner
E-mail Security
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security Protocols Cont’d
3
E-mail Security
Network Security
Feature PGP S/MIME
Design Primarily designed for
processing plain text.
Designed to process both emails
and multimedia files
cost Less expensive More expensive
Use case Suitable for personal and office
use
Primarily used in industrial
environment and large
organizations
Efficiency Less efficient More efficient
Key exchange Depends on user key exchange
(e.g., Web of Trust).
Relies on a hierarchically valid
certificate (PKI) for key exchange
Public Keys Typically supports up to 4096-
bit public keys.
Generally uses smaller 1024-bit
public keys
Used in VPNs Can be used in VPNs Primarily used for email services,
not in VPNs
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Wireless Security
4
 WEP is a protocol that adds security to wireless local area networks (WLANs)
based on the 802.11 Wi-Fi standard
 It’s used to protect wireless communication from eavesdropping and to prevent
from unauthorized access to a wireless network
 The original implementation of WEP supported so-called 40-bit encryption,
having a key of length 40 bits and 24 additional bits (IVs) of system
generated data (64 bits total)
 40 bit WEP encryption is too easy to decode
 WEP relies on a secret key
 WEP uses the RC4 encryption algorithm, which is known as a stream cipher
 WEP has significant weaknesses, such as vulnerabilities to various hacking
methods, making it easy for attackers to break the encryption and access the
network. Because of these issues
 WEP has been largely replaced by more secure protocols like WPA and WPA2
Wireless Equivalent Privacy (WEP)
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Wireless Security
4
 Is also known as WEP+
 WEP+ enhances WEP security by avoiding weak IVs
 It is only completely effective when WEP+ is used at both ends of the wireless
connection.
 WPA use Temporal Key Integrity Protocol (TKIP) to addresses the encryption
weaknesses of WEP
 TKIP employs a per-packet key, which means that it dynamically generates a
new 128-bit key for each packet and thus prevents the types of attacks that
compromise WEP
 Key component of WPA is built-in authentication that WEP doesn’t offer
 WPA provides roughly comparable security to VPN tunneling with WEP, with
the benefit of easier administration and use
Wi-Fi Protected Access (WPA)
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Wireless Security
4
 One variation of WPA is called WPA pre shared key or WPA-PSK
 To use WPA-PSK, a person sets a static key or “passphrase” as with WEP
 By using TKIP, WPA-PSK automatically changes the keys at a present time
interval, making it much more difficult for hackers to find and exploit them
 WPA uses the RC4 cipher
 Keys are rotated frequently, and the packet counter prevents packet replay or
packet re injection attacks
Wi-Fi Protected Access (WPA)
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Wireless Security
4
 Wi-Fi protected access 2 (WPA2) gives wireless networks both confidentiality
and data integrity
 The layer 2-based WPA2 better protect the network
 WPA2 uses a new encryption method called CCMP (counter-mode with
CBC-MAC protocol)
 CCMP is based on advanced encryption standard (AES)
 Compared to the original Temporal Key Integrity Protocol (TKIP) used by
WPA, CCMP is more robust and dependable
 AES is stronger algorithm than RC4
Wi-Fi Protected Access 2 (WPA2)
Network Security
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026
Network Security
Thank You

Chapter 4 Network Security in computer security

  • 1.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 College of Informatics Department of Computer Science Computer Security (CoSc4035) Chapter Four: Network Security University of Gondar
  • 2.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Objectives By the end of this lesson, you will be able to: • Explain fundamental concepts of network security • Identify and analyze common network threats Compare and evaluate security mechanisms at the application, transport, network, link, and physical layers • Demonstrate the use of network security protocols (e.g., TLS, IPsec, HTTPS, secure email protocols) • Identify WEP, WEP+, and WEP2 wireless network security mechanisms 1 2 3 4
  • 3.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Basics Threat on Networks Network Security Protocols Wireless Security Contents 1 2 3 4 Network Security
  • 4.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Basics 1 Network Security
  • 5.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Basics Cont’d 1 Network Security
  • 6.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Threats on Network 2  It’s any attempt by an individual or organization to use computers or digital systems to steal, alter, expose, disable, or destroy information, or to breach computer systems, networks, or infrastructures Network Security
  • 7.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Threats on Network Cont’d 2 Network Security
  • 8.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Threats on Network Cont’d 2 Network Security
  • 9.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Threats on Network Cont’d 2 Network Security
  • 10.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Threats on Network Cont’d 2 Network Security
  • 11.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Threats on Network Cont’d 2 Network Security
  • 12.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Threats on Network Cont’d 2 Network Security
  • 13.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Protocols 3 Network Security
  • 14.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Protocols Cont’d 3 • How does ARP work? – A computer that wants to access another computer for which it knows its IP address broadcasts this address – The owner responds by sending its Ethernet (MAC) address Link Layer: ARP Spoofing Network Security
  • 15.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Protocols Cont’d 3 • ARP Spoofing (also called ARP cache poisoning or ARP poison routing) is a link layer attack • It is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network • The aim is to associate the attacker's MAC address with the IP address of another host, such as the default gateway, causing any traffic meant for that IP address to be sent to the attacker instead • ARP spoofing may allow an attacker to intercept data frames on a network, modify the traffic, or stop all traffic • Often the attack is used as an opening for other attacks, such as denial of service, man in the middle, or session hijacking attacks Link Layer: ARP Spoofing Network Security
  • 16.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Protocols Cont’d 3 • How does it happen? – Because ARP is a stateless protocol – Hosts will automatically cache any ARP replies they receive, regardless of whether they requested them. Even ARP entries which have not yet expired will be overwritten when a new ARP reply packet is received – There is no method in the ARP protocol by which a host can authenticate the peer from which the packet originated – This behavior is the vulnerability which allows ARP spoofing to occur Link Layer: ARP Spoofing Network Security
  • 17.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Protocols Cont’d 3 Network Layer Security: IPSec  Internet Protocol Security (IPsec) provides for various security services on the IP layer, in IPv4 as well as IPv6, thus offering protection for protocols in the upper layers  IPsec is typically used to secure communications between hosts and security gateways Network Security
  • 18.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026  The set of security services that IPsec provides includes  access control  data integrity protection  data origin authentication  anti-replay protection  confidentiality  limited traffic flow confidentiality Network Security Protocols Cont’d 3 Network Layer Security: IPSec Network Security
  • 19.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Protocols Cont’d 3 • Origin authentication (assures that a received packet was, in fact, transmitted by the party identified as the source in the packet header and the packet has not been altered in transit); IP-level authentication is provided by inserting an Authentication Header (AH) into the packets – AH also provides message integrity and anti-replay services • Confidentiality (encrypts messages to prevent eavesdropping by third parties); IP-level confidentiality is provided by inserting an Encapsulated Security Payload (ESP) header into the packets. • An ESP header can also do the job of the AH header in addition to confidentiality • Key management (concerned with the secure exchange of keys); Before ESP can be used, it is necessary for the two ends of a communication link to exchange the secret key that will be used for encryption. • Similarly, AH needs an authentication key; Keys are exchanged with a protocol called Internet Key Exchange (IKE) • Note: the use of encryption always means the need for key management Network Layer Security: IPSec Network Security
  • 20.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026  TLS provides transport layer security for Internet applications  It provides for confidentiality and data integrity over a connection between two end points  TLS operates on a reliable transport, such as TCP, and is itself layered into  TLS Record Protocol  TLS Handshake Protocol Network Security Protocols Cont’d 3 Transport Layer Security (TLS) Network Security
  • 21.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026  Advantage of TLS  applications can use it transparently to securely communicate with each other  TLS is visible to applications, making them aware of the cipher suites and authentication certificates negotiated during the set-up phases of a TLS session Network Security Protocols Cont’d 3 Transport Layer Security (TLS) Network Security
  • 22.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026  TLS Record Protocol layers on top of a reliable connection-oriented transport, such as TCP  TLS Record Protocol  provides data confidentiality using symmetric key cryptography  provides data integrity using a keyed message authentication checksum (MAC)  The keys are generated uniquely for each session based on the security parameters agreed during the TLS handshake Network Security Protocols Cont’d 3 Transport Layer Security (TLS) TLS Record Protocol Network Security
  • 23.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026  Basic operation of the TLS Record Protocol 1. read messages for transmit 2. fragment messages into manageable chunks of data 3. compress the data, if compression is required and enabled 4. calculate a MAC 5. encrypt the data 6. transmit the resulting data to the peer Network Security Protocols Cont’d 3 Transport Layer Security (TLS) TLS Record Protocol Network Security
  • 24.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026  At the opposite end of the TLS connection, the basic operation of the sender is replicated, but in the reverse order 1. read received data from the peer 2. decrypt the data 3. verify the MAC 4. decompress the data, if compression is required and enabled 5. reassemble the message fragments 6. deliver the message to upper protocol layers Network Security Protocols Cont’d 3 Transport Layer Security (TLS) TLS Record Protocol Network Security
  • 25.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026  TLS Handshake Protocol is layered on top of the TLS Record Protocol  TLS Handshake Protocol is used to  authenticate the client and the server  exchange cryptographic keys  negotiate the used encryption and data integrity algorithms before the applications start to communicate with each other Network Security Protocols Cont’d 3 Transport Layer Security (TLS) TLS Handshake Protocol Network Security
  • 26.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Protocols Cont’d 3 DNS Spoofing • If the attacker has access to a name server it can modify it so that it gives false information e.g., redirecting www.ebay.com to map to own (attacker’s) IP address • ƒ The cache of a DNS name server can be poisoned with false information using some simple techniques Web Browsers as Threats • ƒ We obtain most of our browsers on-line • ƒ Potential problems that can come from malicious code within the browser – ƒ Inform the attacker of the activities of the user – Inform the attacker of passwords typed in by the user – ƒ Downgrade browser security (e.g., reduce key length used in SSL) Application Layer Security Network Security
  • 27.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Protocols Cont’d 3 • E-mails transit through various servers before reaching their destinations • ƒ By default, they are visible by anybody who has access to the servers • ƒ SMTP protocol has security holes and operational limitations • ƒ E-mail security can be improved using tools and protocols like PGP and S/MIME – ƒ PGP: Pretty Good Privacy – ƒ S/MIME: Secure Multi-Purpose Internet Mail Extension E-mail Security Network Security
  • 28.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Protocols Cont’d 3 PGP • ƒ Philip R. Zimmerman is the creator of PGP • ƒ PGP is an open-source, freely available software package for e-mail security • ƒ There are several software implementations available as freeware for most desktop operating systems • PGP provides confidentiality and authentication services that can be used for e-mail and file storage applications • It provides authentication through the use of digital signature, confidentiality through the use of symmetric encryption, compression using the ZIP algorithm, and e-mail compatibility using the radix-64 (Base 64) encoding scheme • PGP incorporates tools for developing a public-key trust model and public- key certificate management E-mail Security Network Security
  • 29.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Protocols Cont’d 3 S/MIME Functions • S/MIME is a protocol used for encrypting or decrypting digitally signed E- mails • This means that users can digitally sign their emails as the owner(sender) of the e-mail • Emails could only be sent in NVT 7-bit format in the past, due to which images, videos, or audio were not a part of e-mail attachments. • Bell Communications launched the MIME standard protocol in 1991 to increase the email's restricted functionality. • S/MIME is an upgrade of MIME (Multipurpose Internet Mail Extensions). Due to the limitations of MIME, S/MIME came into play. • S/MIME is based on asymmetric cryptography which means that communications can be encrypted or decrypted using a pair of related keys namely public and private keys E-mail Security Network Security
  • 30.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Protocols Cont’d 3 • Advantages of S/MIME o It offers verification. o It offers integrity to the message. o By the use of digital signatures, it facilitates non-repudiation of origin. o It offers seclusion. o Data security is ensured by the utilization of encryption. o Transfer of data files like images, audio, videos, documents, etc. in a secure manner E-mail Security Network Security
  • 31.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Protocols Cont’d 3 E-mail Security Network Security Feature PGP S/MIME Design Primarily designed for processing plain text. Designed to process both emails and multimedia files cost Less expensive More expensive Use case Suitable for personal and office use Primarily used in industrial environment and large organizations Efficiency Less efficient More efficient Key exchange Depends on user key exchange (e.g., Web of Trust). Relies on a hierarchically valid certificate (PKI) for key exchange Public Keys Typically supports up to 4096- bit public keys. Generally uses smaller 1024-bit public keys Used in VPNs Can be used in VPNs Primarily used for email services, not in VPNs
  • 32.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Wireless Security 4  WEP is a protocol that adds security to wireless local area networks (WLANs) based on the 802.11 Wi-Fi standard  It’s used to protect wireless communication from eavesdropping and to prevent from unauthorized access to a wireless network  The original implementation of WEP supported so-called 40-bit encryption, having a key of length 40 bits and 24 additional bits (IVs) of system generated data (64 bits total)  40 bit WEP encryption is too easy to decode  WEP relies on a secret key  WEP uses the RC4 encryption algorithm, which is known as a stream cipher  WEP has significant weaknesses, such as vulnerabilities to various hacking methods, making it easy for attackers to break the encryption and access the network. Because of these issues  WEP has been largely replaced by more secure protocols like WPA and WPA2 Wireless Equivalent Privacy (WEP) Network Security
  • 33.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Wireless Security 4  Is also known as WEP+  WEP+ enhances WEP security by avoiding weak IVs  It is only completely effective when WEP+ is used at both ends of the wireless connection.  WPA use Temporal Key Integrity Protocol (TKIP) to addresses the encryption weaknesses of WEP  TKIP employs a per-packet key, which means that it dynamically generates a new 128-bit key for each packet and thus prevents the types of attacks that compromise WEP  Key component of WPA is built-in authentication that WEP doesn’t offer  WPA provides roughly comparable security to VPN tunneling with WEP, with the benefit of easier administration and use Wi-Fi Protected Access (WPA) Network Security
  • 34.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Wireless Security 4  One variation of WPA is called WPA pre shared key or WPA-PSK  To use WPA-PSK, a person sets a static key or “passphrase” as with WEP  By using TKIP, WPA-PSK automatically changes the keys at a present time interval, making it much more difficult for hackers to find and exploit them  WPA uses the RC4 cipher  Keys are rotated frequently, and the packet counter prevents packet replay or packet re injection attacks Wi-Fi Protected Access (WPA) Network Security
  • 35.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Wireless Security 4  Wi-Fi protected access 2 (WPA2) gives wireless networks both confidentiality and data integrity  The layer 2-based WPA2 better protect the network  WPA2 uses a new encryption method called CCMP (counter-mode with CBC-MAC protocol)  CCMP is based on advanced encryption standard (AES)  Compared to the original Temporal Key Integrity Protocol (TKIP) used by WPA, CCMP is more robust and dependable  AES is stronger algorithm than RC4 Wi-Fi Protected Access 2 (WPA2) Network Security
  • 36.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, January 11 , 2026 Network Security Thank You