Networking - encryption, IDS/IPS, and DDoS protection.
1. Encryption
Encryption is the process of converting readable data into unreadable ciphertext so that only authorized users can read it (using a key).
-
Why? Protects confidentiality of data during transmission or storage.
-
How?
-
Symmetric encryption (same key for encryption/decryption, e.g., AES).
-
Asymmetric encryption (public key for encryption, private key for decryption, e.g., RSA).
-
-
Example in networking:
-
HTTPS (TLS/SSL) encrypts web traffic.
-
VPNs use encryption to protect data across the internet.
-
Wi-Fi security uses WPA2/WPA3 encryption.
-
Think of it as locking a message in a safe — only the person with the key can open it.
2. IDS/IPS (Intrusion Detection/Prevention Systems)
These are security tools used to monitor and defend networks.
-
IDS (Intrusion Detection System)
-
Monitors traffic for suspicious activity.
-
Alerts admins but does not block traffic.
-
Example: Detecting repeated login attempts or malware patterns.
-
-
IPS (Intrusion Prevention System)
-
Like IDS, but also actively blocks malicious traffic in real time.
-
Example: Dropping packets from a known attacker’s IP.
-
-
How it works:
-
Signature-based detection (matches known attack patterns).
-
Anomaly-based detection (flags unusual traffic patterns).
-
IDS = Security camera (alerts).
IPS = Security guard (alerts + stops intruders).
3. DDoS Protection (Distributed Denial of Service)
A DDoS attack floods a server/network with massive fake traffic so legitimate users can’t access it.
-
How attackers do it:
-
Use a botnet (infected computers/IoT devices) to overwhelm the target.
-
-
Impact:
-
Website/server downtime, financial loss, reputational damage.
-
-
Defense methods:
-
Firewalls & rate limiting (basic defense).
-
DDoS mitigation services (e.g., Cloudflare, Akamai).
-
Load balancing and traffic filtering.
-
Anycast routing (distributes traffic across multiple servers).
-
Imagine a store flooded with fake customers — real customers can’t get in. DDoS protection is like having multiple entrances, bouncers, and fake-customer detection.
Putting It Together
-
Encryption → Protects data confidentiality.
-
IDS/IPS → Detects and blocks intrusions.
-
DDoS Protection → Ensures availability against floods of malicious traffic.
Together, they form part of the CIA Triad in network security:
-
Confidentiality → Encryption
-
Integrity → IDS/IPS
-
Availability → DDoS Protection