Network Security Case Study
Network Security Case Study
Network Security Case Study
COMPANY
Presented By:
Emireddy, Mamatha Reddy
NimmaReddy, Vanitha
Sree, Venkata Lakshmi Geetha Swetha
OBJECTIVES
Basic structure of a small business company
General security measures
Firewalls.
Block Pings.
Password Protection.
Man-In-The-Middle attack
Cryptographic Hash Function
Deductions
5. Account
validates claims
4.
A
ll
da
ta
Invoice
Account/Manufacturer
(Companys client)
1. Order
2. Invoice
3. C
laim
s
6.
S
Remainder
en
ds
Em
Administrat
ion
ai
l
Customer
(Accounts client)
Firewall is a perimeter device that permits or denies traffic based on a set of rules
configured by the administrator.
Block Pings
One of the simplest methods that a hacker uses to find a network is by sending a ping
request, which is just a network request to see if something will respond.
If a network device responds, there is something there that the hacker can then
explore further and potentially exploit.
Your administrative password is the most important password of all, since anyone with
that password can configure any and all servers on your computer.
One of the most common mistakes in configuring network equipment is keeping the
default password.
Take the time to make this easy fix. Log into your router/firewall, and you'll get the
option to set a password.
Intruder tries to log in with unauthorized access continuously, trying to increase load on
the server.
Intruder or hacker continuously perform actions on the applications thereby making the
server down and inaccessible to the active users.
Defense
IDPS( INTRUSION DETECTION PREVENTION SYSTEM)
Intrusion detection and prevention systems (IDPS) are primarily focused on identifying
possible incidents, logging information about them, and reporting attempts.
In addition, organizations use IDPSes for other purposes, such as identifying problems
with security policies, documenting existing threats and deterring individuals from
violating security policies.
Network Intrusion Detection Systems (NIDS) are placed at a strategic point or points
within the network to monitor traffic to and from all devices on the network.
Once an attack is identified, or abnormal behavior is sensed, the alert can be sent to
the administrator
Man-in-the-middle attack
Scenario
In all the cases where data transfer is done between customer, application and the
accounts.
Example: Changing any data in the application may bring out a big loss to one of the
parties.
Defense
Cryptographic hash function
The most common is a lightweight procedure called a one-way hash, simply a hash,
or more commonly amessage digest.
The hash or digest algorithm creates a unique and relatively small fixedsizedigestthat cannot be reversed.
The messages being sent include both the plain text (unencrypted) and adigestof
the message.
The hash algorithm is applied to the received plain text and if the result matches the
received message digest then the received data was not altered.
Thank You