3
As with anything that resides on a network, IP security
software, systems and devices are susceptible to a variety
of attacks. Understanding the threats implicit in network
streaming is step one. The main external threats include:
• Network sniffing (eavesdropping): an adversary with
access to the same network as two communicating devices
can capture data packets. Any data — even sensitive
and critical data — can be easily compromised if it is not
protected.
• Network spoofing (resource integrity): a malicious
computer can impersonate a network resources luring the
other part to expose sensitive information or altering the
data (integrity).
• Man-in-the-middle (information integrity): an adversary
that is able redirect and intercept traffic has the ability to
alter the communication between two parties.
Specific threats for encrypting
network streaming
Chapter 1
Step one:
understand your
threats