network security shortnote

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

What is network security?

Network security is activities designed to protect a network and its data from threats such as viruses,
hacker attacks, denial of service attacks, data interception and theft and equipment failure.

It covers a wide range of activities that protect data from threats to its:

1. Confidentiality
2. Integrity (Correctness)
3. Availability

Threats posed to networks


 Malware
 Phishing
 Brute force
 Denial of services
 Data interception and theft
 SQL injection
 Social engineering

Methods to secure a network


1) Authentication and validation
2) Access control
3) Firewall
4) Adding physical security
1) Authentication and validation
 Authentication is the process of checking the identity of a user of a computer system
or network. Ex: user name & password
PIN
This security can be improved with two-factor
two authentication.

2) Access control
In many computer systems, user accounts control a user’s rights.
 Read only access
 Read and write access ((modify access)
3) Firewall
A firewall can be either software or hardware. It sits between the user’s computer and an external
network (for example, the internet) and filters information in and out of the computer
The main tasks carried out by a firewall include:
 to examine the ‘traffic’ between user’s computer (or internal network) and a
public network (for example, the internet)
 checks whether incoming or outgoing data meets a given set of criteria

1|Page
 if the data fails the criteria, the firewall will block the ‘traffic’ and give the user
(or network manager) a warning that there may be a security issue
 the firewall can be used to log all incoming and outgoing ‘traffic’ to allow later
interrogation by the user (or network manager)
 criteria can be set so that the firewall prevents access to certain undesirable
sites; the firewall can keep a list of all undesirable IP addresses
 it is possible for firewalls to help prevent viruses or hackers entering the user’s
computer (or internal network)
4) Physical security

 Digital/biometric locks, magnetic card scanners, security personnel could be put on


the office door to prevent unauthorized access.
 Movement sensors to activate an alarms and light
 Burglar alarms or alerts could trigger because there is unauthorized access
 The servers/assets could have security tags, so that the owner can be tracked if
stolen.
 ID cards could be issued to all staff to prevent impersonation.

Cloud storage and security


Cloud storage is a method of data storage where data is stored on remote servers. It can
access via an internet. The same data is stored on more than one server in case of
maintenance or repair, allowing clients to access data at any time.

Advantages and disadvantages of cloud storage related to network security

Contemporary storage and security


Contemporary storage devices in networking refer to modern technologies and hardware solutions
designed for storing and managing data within a networked environment.

1. Network Attached Storage (NAS)


2. Cloud Storage

2|Page
3. Solid state
4. USB

Cyber attacks
Social Engineering
Any kind of attack on a computer system or network that takes advantages of how people behave
and respond to certain situations.
E.g.: Phishing
Shoulder surfing
Pharming

1. Phishing
Phishing is attempting to get confidential information by sending a user message that appears to
come from a trust worthy person or organization
Through the email or fake websites look legitimate they collect usernames and passwords or
financial details of the people. Rarely phishing can happen via phone calls or messages.
2. Shoulder surfing
Shoulder surfing means gaining access to confidential information by directlyobserving a user,
possibly literally looking over their shoulder, as they complete a task.
Often shoulder surfing happens in busy places and used to get a person’s username/password or
PIN

3. Pharming
Pharming is directing internet users to a fake web site that looks like a real one , in order to obtain
personal information such as password, account details etc .

Technical weaknesses
1. Unpatched software attacks
Unpatched software refers to programs, applications, or operating systems that have known
vulnerabilities but have not yet been updated or patched to fix those security flaws

2 Spreading malware through USB devices and copying data


2. Eavesdropping attacks (intercepting data, reading data without copying or stealing).

Protecting against security weaknesses

During Design and implementation process of software.


Security must be considered at the system /software design stage. The software and system
designers will need to consider
 What kind of authentication is needed?
 Do different users need different levels of access?
 Does stored data need to be encrypted?
 What threats will the software face?

3|Page
Issues in design and implementation process

Code vulnerabilities- Code vulnerabilities are weaknesses or flaws in a software program's code that
attackers can exploit to harm the system, steal data, or gain unauthorized access.

How to identify code vulnerabilities?

 Code reviews
o Review by another programmer-use more senior and more experienced person-use
special software to examine the code.
o An Automated review
 Modular testing- Testing each block of ode as it is completed to ensure the code works as
expected.
 Audit trial-A record of activities that have taken place on a computer system .This record is
generated automatically and will record what has happened and who or what made the
change.
 Use secure operating system
 Provide effective network security

How to identify vulnerabilities?

 Penetration Testing
Penetration testing, often called “pen testing”, is where the IT systems of an organization
are deliberately attacked to find any weaknesses.
These arracks are authorized by the organization and are therefore legal.
The pen tester is likely to ty to gain access to all the systems that the organization has and
the attacks will often include looking for technical weaknesses and trying social engineering
methods

 Commercial analysis tools


It is possible to use software tools to scan a system for vulnerabilities. These commercial
analysis tools or vulnerability scanners can be either purchased or hired. The tools look for
common issues and alert the user to them.

 Reviews of network and user policies


All networks should have written policies that document:

4|Page

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy