Network Security Case Study

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

NETWORK SECURITY FOR A SMALL

COMPANY
Presented By:
Emireddy, Mamatha Reddy
NimmaReddy, Vanitha
Sree, Venkata Lakshmi Geetha Swetha

OBJECTIVES
Basic structure of a small business company
General security measures
Firewalls.
Block Pings.
Password Protection.

Potential Attacks and Security Measures


DOS attacks
Intrusion Detection

Man-In-The-Middle attack
Cryptographic Hash Function

XYZ Accounts Receivables Company


AR Module
(Company)
Claims

Deductions

5. Account
validates claims

4.
A

ll

da

ta

Invoice

Account/Manufacturer
(Companys client)

1. Order
2. Invoice
3. C
laim
s

6.
S

Remainder
en
ds

Em

Administrat
ion

ai
l

Customer
(Accounts client)

General security measures


Firewalls

By far the most common security measure these days is afirewall.

Firewall is a perimeter device that permits or denies traffic based on a set of rules
configured by the administrator.

A firewall may be as simple as a router with access lists or as complex as a set of


modules distributed through the network controlled from one central location.

Block Pings

One of the simplest methods that a hacker uses to find a network is by sending a ping
request, which is just a network request to see if something will respond.

If a network device responds, there is something there that the hacker can then
explore further and potentially exploit.

Configure your firewall so that it wont respond to network pings.

Establish strong passwords:

Easiest thing you can do to strengthen your security.

Your administrative password is the most important password of all, since anyone with
that password can configure any and all servers on your computer.

Password Protect your Firewall:

One of the most common mistakes in configuring network equipment is keeping the
default password.

Take the time to make this easy fix. Log into your router/firewall, and you'll get the
option to set a password.

Potential Attacks and Security


Measures

DOS attack :Adenial of service(DoS)attackis a malicious attempt to


make a server or a network resource unavailable to users, usually by
temporarily interrupting or suspending the services of a host connected
to the Internet.

Scenarios in relation to the company:

Intruder tries to log in with unauthorized access continuously, trying to increase load on
the server.

Intruder or hacker continuously perform actions on the applications thereby making the
server down and inaccessible to the active users.

Defense
IDPS( INTRUSION DETECTION PREVENTION SYSTEM)

Intrusion detection and prevention systems (IDPS) are primarily focused on identifying
possible incidents, logging information about them, and reporting attempts.

In addition, organizations use IDPSes for other purposes, such as identifying problems
with security policies, documenting existing threats and deterring individuals from
violating security policies.

NIDS(Network Intrusion Detection Systems)

Network Intrusion Detection Systems (NIDS) are placed at a strategic point or points
within the network to monitor traffic to and from all devices on the network.

It performs an analysis of passing traffic on the entire subnet, works in a promiscuous


mode, and matches the traffic that is passed on the subnets to the library of known
attacks.

Once an attack is identified, or abnormal behavior is sensed, the alert can be sent to
the administrator

Man-in-the-middle attack

Aman-in-the-middle attackis an attack where a user gets between


the sender and receiver of information andsniffsany information being
sent.

Scenario

In all the cases where data transfer is done between customer, application and the
accounts.

Example: Changing any data in the application may bring out a big loss to one of the
parties.

Defense
Cryptographic hash function

The most common is a lightweight procedure called a one-way hash, simply a hash,
or more commonly amessage digest.

The hash or digest algorithm creates a unique and relatively small fixedsizedigestthat cannot be reversed.

The resulting hash or digest is sometimes called afingerprintsince it uniquely


describes or identifies the plain text.

The messages being sent include both the plain text (unencrypted) and adigestof
the message.

The hash algorithm is applied to the received plain text and if the result matches the
received message digest then the received data was not altered.

Thank You

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy